The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dengguo Feng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gang Yao, Dengguo Feng
    Proxy Oblivious Transfer Protocol. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:190-197 [Conf]
  2. Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng
    Certificateless Public-Key Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:293-308 [Conf]
  3. Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng
    Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:343-356 [Conf]
  4. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:303-309 [Conf]
  5. Fan Zhang, Dengguo Feng
    Identity-based PKI Scheme for Machine Readable Travel Document. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:461-465 [Conf]
  6. Bin Zhang, Dengguo Feng
    New Guess-and-Determine Attack on the Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:54-68 [Conf]
  7. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    ID-Based Aggregate Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:110-119 [Conf]
  8. Zhenfeng Zhang, Jing Xu, Dengguo Feng
    Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:200-210 [Conf]
  9. Xin Lü, Dengguo Feng
    An Arbitrated Quantum Message Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:1054-1060 [Conf]
  10. Zaiqiang Liu, Dengguo Feng
    Incremental Fuzzy Decision Tree-Based Network Forensic System. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:995-1002 [Conf]
  11. Peng Wang, Dengguo Feng, Wenling Wu
    HCTR: A Variable-Input-Length Enciphering Mode. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:175-188 [Conf]
  12. Dengguo Feng, Ji Xiang
    Experiences on Intrusion Tolerance Distributed Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:270-271 [Conf]
  13. Yuqing Zhang, Xiuying Liu, Dengguo Feng
    An approach to the formal verification of the three-principal security protocols. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:163-169 [Conf]
  14. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    A Fast Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:72-86 [Conf]
  15. Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu
    Cryptanalysis of the Hash Functions MD4 and RIPEMD. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:1-18 [Conf]
  16. Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing
    Cryptanalysis of some AES Candidate Algorithms. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:13-21 [Conf]
  17. Zhen Xu, Dengguo Feng, Lan Li, Hua Chen
    UC-RBAC: A Usage Constrained Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:337-347 [Conf]
  18. Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou
    Efficient ID-Based Optimistic Fair Exchange with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:14-26 [Conf]
  19. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Security Analysis of the Generalized Self-shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:388-400 [Conf]
  20. Hua Chen, Dengguo Feng
    An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:352-361 [Conf]
  21. Wenling Wu, Wentao Zhang, Dengguo Feng
    Integral Cryptanalysis of Reduced FOX Block Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:229-241 [Conf]
  22. Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang
    Weaknesses of COSvd (2, 128) Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:270-283 [Conf]
  23. Purui Su, Dengguo Feng
    The Design of an Artificial Immune System. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:195- [Conf]
  24. Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng
    A Packet Marking Scheme for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:964-971 [Conf]
  25. Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng
    Detecting the Deviations of Privileged Process Execution. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:980-988 [Conf]
  26. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:73-83 [Conf]
  27. Peng Wang, Dengguo Feng, Wenling Wu
    Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:280-286 [Conf]
  28. Hong Wang, Yuqing Zhang, Dengguo Feng
    Short Threshold Signature Schemes Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:297-310 [Conf]
  29. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    ID-Based Proxy Signature Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:359-367 [Conf]
  30. Zhenfeng Zhang, Dengguo Feng
    Efficient Fair Certified E-Mail Delivery Based on RSA. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:368-377 [Conf]
  31. Liwu Zhang, Dengguo Feng
    Intrusion Tolerant CA Scheme with Cheaters Detection Ability. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:378-386 [Conf]
  32. Peng Wang, Dengguo Feng, Wenling Wu
    On the Security of Tweakable Modes of Operation: TBC and TAE. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:274-287 [Conf]
  33. Xianfeng Zhao, Yingxia Dai, Dengguo Feng
    A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:204-217 [Conf]
  34. Xianfeng Zhao, Yingxia Dai, Dengguo Feng
    Towards the Public but Noninvertible Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:218-231 [Conf]
  35. Yan Zhu, Dengguo Feng, Wei Zou
    Collusion Secure Convolutional Spread Spectrum Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:67-83 [Conf]
  36. Wenling Wu, Dengguo Feng, Hua Chen
    Collision Attack and Pseudorandomness of Reduced-Round Camellia. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:252-266 [Conf]
  37. Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng
    The Defense Framework for Large-scale Computer Network System. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:69-78 [Conf]
  38. Wang Mingsheng, Sihan Qing, Dengguo Feng
    A Simple Algorithm for Computing Several Sequences Synthesis. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:211-220 [Conf]
  39. Shaoquan Jiang, Dengguo Feng, Sihan Qing
    Analysis and Design of E-voting Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:281-290 [Conf]
  40. Wenling Wu, Dengguo Feng, Sihan Qing
    Power Analysis of RC6 and Serpent. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:201-209 [Conf]
  41. Honggang Hu, Dengguo Feng
    On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences. [Citation Graph (0, 0)][DBLP]
    SETA, 2004, pp:185-196 [Conf]
  42. Honggang Hu, Lei Hu, Dengguo Feng
    On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. [Citation Graph (0, 0)][DBLP]
    SETA, 2006, pp:199-208 [Conf]
  43. Zhi Ma, Xin Lu, Keqin Feng, Dengguo Feng
    On Non-binary Quantum BCH Codes. [Citation Graph (0, 0)][DBLP]
    TAMC, 2006, pp:675-683 [Conf]
  44. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    A Ring Signature Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:160-169 [Conf]
  45. Gang Yao, Dengguo Feng
    A New k-Anonymous Message Transmission Protocol. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:388-399 [Conf]
  46. Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng
    Generic yet Practical ZK Arguments from any Public-Coin HVZK [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2005, v:, n:162, pp:- [Journal]
  47. Qingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng
    Study on Strand Space Model Theory. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:5, pp:553-570 [Journal]
  48. Hong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li
    Oblivious Polynomial Evaluation. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:4, pp:550-554 [Journal]
  49. Hong-Da Li, Xiong Yang, Dengguo Feng, Bao Li
    Distributed Oblivious Function Evaluation and Its Applications. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:6, pp:942-947 [Journal]
  50. Rui Xue, Dengguo Feng
    New Semantic Model for Authentication Protocols in ASMs. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:4, pp:555-563 [Journal]
  51. Dengguo Feng, Xiaoyun Wang
    Progress and Prospect of Some Fundamental Research on Information Security in China. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:5, pp:740-755 [Journal]
  52. Dengguo Feng
    Three Characterizations of Correlation-immune Functions over Rings ZN. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:37-43 [Journal]
  53. Honggang Hu, Dengguo Feng, Wenling Wu
    Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2260-2265 [Journal]
  54. Zhongwei Sun, Dengguo Feng, Chuankun Wu
    DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:11, pp:1920-1926 [Journal]
  55. Xiao feng Li, Feng Deng Guo
    Composing Administrative Scope of Delegation Policies based on extended XACML. [Citation Graph (0, 0)][DBLP]
    EDOC, 2006, pp:467-470 [Conf]
  56. Hua Chen, Wenling Wu, Dengguo Feng
    Differential Fault Analysis on CLEFIA. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:284-295 [Conf]
  57. Rui Xue, Dengguo Feng
    Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:239-253 [Conf]
  58. Wentao Zhang, Wenling Wu, Dengguo Feng
    New Results on Impossible Differential Cryptanalysis of Reduced AES. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:239-250 [Conf]
  59. Bin Zhang, Dengguo Feng
    Multi-pass Fast Correlation Attack on Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:234-248 [Conf]
  60. Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
    Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:15-27 [Conf]
  61. Wen-Ling Wu, Wentao Zhang, Dengguo Feng
    Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:3, pp:449-456 [Journal]

  62. Improved Client-to-Client Password-Authenticated Key Exchange Protocol. [Citation Graph (, )][DBLP]


  63. On the Unprovable Security of 2-Key XCBC. [Citation Graph (, )][DBLP]


  64. Efficient Anonymous Electronic Metering Scheme. [Citation Graph (, )][DBLP]


  65. Fault-tolerate Multiparty Electronic Contract Signing Protocol. [Citation Graph (, )][DBLP]


  66. An Effective Genetic Algorithm for Self-Inverse S-Boxes. [Citation Graph (, )][DBLP]


  67. Exploring Malware Behaviors Based on Environment Constitution. [Citation Graph (, )][DBLP]


  68. Security of Truncated MACs. [Citation Graph (, )][DBLP]


  69. Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. [Citation Graph (, )][DBLP]


  70. Bring Efficient Connotation Expressible Policies to Trust Management. [Citation Graph (, )][DBLP]


  71. Practical Rebound Attack on 12-Round Cheetah-256. [Citation Graph (, )][DBLP]


  72. Related-Key Differential-Linear Attacks on Reduced AES-192. [Citation Graph (, )][DBLP]


  73. Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. [Citation Graph (, )][DBLP]


  74. On the Correctness of an Approach against Side-Channel Attacks. [Citation Graph (, )][DBLP]


  75. Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. [Citation Graph (, )][DBLP]


  76. Reconstructing a Packed DLL Binary for Static Analysis. [Citation Graph (, )][DBLP]


  77. Privacy Preserving of Trust Management Credentials Based on Trusted Computing. [Citation Graph (, )][DBLP]


  78. An Improved Fast Correlation Attack on Stream Ciphers. [Citation Graph (, )][DBLP]


  79. Cryptanalysis of the LANE Hash Function. [Citation Graph (, )][DBLP]


  80. Real-Time Remote Attestation with Privacy Protection. [Citation Graph (, )][DBLP]


  81. Research on Malicious Transaction Processing Method of Database System. [Citation Graph (, )][DBLP]


  82. Fine-Grained Cloud DB Damage Examination Based on Bloom Filters. [Citation Graph (, )][DBLP]


  83. SEPCOM: customizable zero copy model. [Citation Graph (, )][DBLP]


  84. L-UCON: Towards Layered Access Control with UCON. [Citation Graph (, )][DBLP]


  85. TBDRM: A TPM-Based Secure DRM Architecture. [Citation Graph (, )][DBLP]


  86. An Anonymous Property-Based Attestation Protocol from Bilinear Maps. [Citation Graph (, )][DBLP]


  87. BIFI: Architectural Support for Information Flow Integrity Measurement. [Citation Graph (, )][DBLP]


  88. A Fast Implementation of Computing the Transparency Order of S-Boxes. [Citation Graph (, )][DBLP]


  89. A New Direct Anonymous Attestation Scheme from Bilinear Maps. [Citation Graph (, )][DBLP]


  90. A New Client-to-Client Password-Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP]


  91. ReconBin: Reconstructing Binary File from Execution for Software Analysis. [Citation Graph (, )][DBLP]


Search in 0.169secs, Finished in 0.172secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002