Robert Huijie Deng
List of publications from the DBLP Bibliography Server - FAQ
2010 | ||
---|---|---|
154 | Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou: Efficient CCA-Secure PKE from Identity-Based Techniques. CT-RSA 2010: 132-147 | |
153 | Changshe Ma, Jian Weng, Yingjiu Li, Robert H. Deng: Efficient discrete logarithm based multi-signature scheme in the plain public key model. Des. Codes Cryptography 54(2): 121-133 (2010) | |
2009 | ||
152 | Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng: Conditional Proxy Broadcast Re-Encryption. ACISP 2009: 327-342 | |
151 | Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li: RFID privacy: relation between two notions, minimal condition, and efficient construction. ACM Conference on Computer and Communications Security 2009: 54-65 | |
150 | Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai: Conditional proxy re-encryption secure against chosen-ciphertext attack. ASIACCS 2009: 322-332 | |
149 | Jin Han, Debin Gao, Robert H. Deng: On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. DIMVA 2009: 127-146 | |
148 | Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao: Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149 | |
147 | Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng: Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. ICICS 2009: 150-164 | |
146 | Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng: On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. ICISS 2009: 71-85 | |
145 | Kar Way Tan, Robert H. Deng: Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. ICWS 2009: 67-74 | |
144 | Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao: Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 | |
143 | Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou: RSA-Based Certificateless Public Key Encryption. ISPEC 2009: 24-34 | |
142 | Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng: Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383 | |
141 | Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu: Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395 | |
140 | Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58 | |
139 | Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng: Multiuser private queries over encrypted databases. IJACT 1(4): 309-319 (2009) | |
138 | Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel, Ming Gu: n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. J. Comput. Sci. Technol. 24(1): 138-151 (2009) | |
137 | Yanjiang Yang, Robert H. Deng, Feng Bao: Privacy-preserving rental services using one-show anonymous credentials. Security and Communication Networks 2(6): 531-545 (2009) | |
136 | Robert H. Deng, Yanjiang Yang: A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications. TOMCCAP 5(4): (2009) | |
2008 | ||
135 | Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17 | |
134 | Yanjiang Yang, Feng Bao, Robert H. Deng: Efficient Client-to-Client Password Authenticated Key Exchange. EUC (2) 2008: 202-207 | |
133 | Huafei Zhu, Feng Bao, Robert H. Deng: Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641 | |
132 | Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei: Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. ICYCS 2008: 2347-2353 | |
131 | Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng: Distinguishing between FE and DDoS Using Randomness Check. ISC 2008: 131-145 | |
130 | Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao: An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 | |
129 | Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang: Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 | |
128 | Liang Gu, Xuhua Ding, Robert Huijie Deng, Bing Xie, Hong Mei: Remote attestation on program execution. STC 2008: 11-20 | |
127 | Tieyan Li, Guilin Wang, Robert H. Deng: Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. JSW 3(3): 1-10 (2008) | |
126 | Tieyan Li, Robert H. Deng, Guilin Wang: The security and improvement of an ultra-lightweight RFID authentication protocol. Security and Communication Networks 1(2): 135-146 (2008) | |
2007 | ||
125 | Yongdong Wu, Feng Bao, Robert H. Deng: Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183 | |
124 | Tieyan Li, Robert H. Deng: Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. ARES 2007: 238-245 | |
123 | Yanjiang Yang, Yingjiu Li, Robert H. Deng: New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258 | |
122 | Feng Bao, Robert H. Deng: Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. GLOBECOM 2007: 188-192 | |
121 | Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel: n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. ICICS 2007: 31-43 | |
120 | Yanjiang Yang, Robert H. Deng, Feng Bao: Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192 | |
119 | Robert H. Deng, Yanjiang Yang: Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. ISPEC 2007: 284-300 | |
118 | Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau: Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481 | |
117 | Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda: Access control protocols with two-layer architecture for wireless networks. Computer Networks 51(3): 655-670 (2007) | |
116 | Yongdong Wu, Di Ma, Robert H. Deng: Flexible Access Control to JPEG 2000 Image Code-Streams. IEEE Transactions on Multimedia 9(6): 1314-1324 (2007) | |
2006 | ||
115 | Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006 | |
114 | Yanjiang Yang, Robert H. Deng, Feng Bao: Fortifying password authentication in integrated healthcare delivery systems. ASIACCS 2006: 255-265 | |
113 | Yingjiu Li, Robert Huijie Deng: Publicly verifiable ownership protection for relational databases. ASIACCS 2006: 78-89 | |
112 | Yanjiang Yang, Robert H. Deng, Feng Bao: Practical private data matching deterrent to spoofing attacks. CIKM 2006: 852-853 | |
111 | Daniel J. T. Chong, Robert H. Deng: Privacy-enhanced superdistribution of layered content with trusted access control. Digital Rights Management Workshop 2006: 37-44 | |
110 | Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao: Private Information Retrieval Using Trusted Hardware. ESORICS 2006: 49-64 | |
109 | Yingjiu Li, Haibing Lu, Robert H. Deng: Practical Inference Control for Data Cubes (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 115-120 | |
108 | Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen: Rights Protection for Data Cubes. ISC 2006: 359-372 | |
107 | Ying Qiu, Jianying Zhou, Feng Bao, Robert H. Deng: Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830 | |
106 | Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006) | |
105 | Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng: A secure extension of the Kwak-Moon group signcryption scheme. Computers & Security 25(6): 435-444 (2006) | |
104 | Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao: Three architectures for trusted data dissemination in edge computing. Data Knowl. Eng. 58(3): 381-409 (2006) | |
103 | Yanjiang Yang, Robert H. Deng, Feng Bao: A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Sec. Comput. 3(2): 105-114 (2006) | |
102 | Yongdong Wu, Robert H. Deng: Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia 8(1): 152-161 (2006) | |
101 | Zhiguo Wan, Feng Bao, Robert H. Deng, Akkihebbal L. Ananda: Security analysis on a conference scheme for mobile communications. IEEE Transactions on Wireless Communications 5(6): 1238-1240 (2006) | |
100 | Jianying Zhou, Feng Bao, Robert H. Deng: Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006) | |
2005 | ||
99 | Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Springer 2005 | |
98 | Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005 | |
97 | Yanjiang Yang, Feng Bao, Robert H. Deng: Security Analysis and Fix of an Anonymous Credential System. ACISP 2005: 537-547 | |
96 | Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng: Privacy and Ownership Preserving of Outsourced Medical Data. ICDE 2005: 521-532 | |
95 | Huafei Zhu, Feng Bao, Robert H. Deng: Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219 | |
94 | Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou: Authenticating Query Results in Data Publishing. ICICS 2005: 376-388 | |
93 | Shuhong Wang, Feng Bao, Robert H. Deng: Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. ICICS 2005: 53-60 | |
92 | Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 | |
91 | Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao: Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. LCN 2005: 328-335 | |
90 | Ying Qiu, Jianying Zhou, Robert H. Deng: Security Analysis and Improvement of Return Routability Protocol. MADNES 2005: 174-181 | |
89 | Yongdong Wu, Feng Bao, Robert H. Deng: Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222 | |
88 | Yongdong Wu, Tieyan Li, Robert H. Deng: Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476 | |
87 | Yanjiang Yang, Feng Bao, Robert H. Deng: A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112 | |
86 | Yunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao: Practical Zero-Knowledge Arguments from Sigma-Protocols. WINE 2005: 288-298 | |
85 | Feng Bao, Robert H. Deng: Protocols that hide user's preferences in electronic transactions. Computer Networks 48(4): 503-515 (2005) | |
84 | Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang: Efficient and robust key management for large mobile ad hoc networks. Computer Networks 48(4): 657-682 (2005) | |
83 | Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng: Generic yet Practical ZK Arguments from any Public-Coin HVZK Electronic Colloquium on Computational Complexity (ECCC)(162): (2005) | |
82 | Yongdong Wu, Robert H. Deng: Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Techn. 15(1): 161-163 (2005) | |
81 | Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen: New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. IEEE Trans. Computers 54(12): 1473-1483 (2005) | |
80 | Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen: New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. IEEE Trans. Computers 54(9): 1071-1080 (2005) | |
79 | Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang: Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Transactions on Information Technology in Biomedicine 9(4): 554-563 (2005) | |
78 | Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu: Scalable trusted online dissemination of JPEG2000 images. Multimedia Syst. 11(1): 60-67 (2005) | |
2004 | ||
77 | Feng Bao, Robert H. Deng, Jianying Zhou: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Springer 2004 | |
76 | Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi: Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 | |
75 | Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 | |
74 | Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li: Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519 | |
73 | Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91 | |
72 | Yongdong Wu, Robert H. Deng: Compliant encryption of jpeg2000 codestreanis. ICIP 2004: 3439-3442 | |
71 | Yongdong Wu, Di Ma, Robert H. Deng: Progressive protection of jpeg2000 codestreams. ICIP 2004: 3447-3450 | |
70 | Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim: On Security Notions for Steganalysis. ICISC 2004: 440-454 | |
69 | Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao: A Block Oriented Fingerprinting Scheme in Relational Database. ICISC 2004: 455-466 | |
68 | Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon: Security Analysis of Two Signcryption Schemes. ISC 2004: 123-133 | |
67 | Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim: On Security Notions of Steganographic Systems. IWDW 2004: 137-151 | |
66 | Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Anonymous Secure Routing in Mobile Ad-Hoc Networks. LCN 2004: 102-108 | |
65 | Guilin Wang, Jianying Zhou, Robert H. Deng: On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298 | |
64 | Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim: Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45(6): 687-699 (2004) | |
63 | Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng: New efficient user identification and key distribution scheme providing enhanced security. Computers & Security 23(8): 697-704 (2004) | |
62 | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) | |
61 | Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng: A smart-card-enabled privacy preserving E-prescription system. IEEE Transactions on Information Technology in Biomedicine 8(1): 47-58 (2004) | |
2003 | ||
60 | Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao: A flexible and scalable authentication scheme for JPEG2000 image codestreams. ACM Multimedia 2003: 433-441 | |
59 | Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 | |
58 | Yongdong Wu, Robert H. Deng: Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. ICICS 2003: 238-248 | |
57 | Feng Bao, Robert H. Deng, Huafei Zhu: Variations of Diffie-Hellman Problem. ICICS 2003: 301-312 | |
56 | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 | |
55 | Hongjun Wu, Feng Bao, Robert H. Deng: An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87 | |
54 | Jianying Zhou, Feng Bao, Robert H. Deng: An Efficient Public-Key Framework. ICICS 2003: 88-99 | |
53 | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319 | |
52 | Jianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110 | |
51 | Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng: Secure the image-based simulated telesurgery system. ISCAS (2) 2003: 596-599 | |
50 | Yanjiang Yang, Feng Bao, Robert H. Deng: Flexible authentication of images. VCIP 2003: 1905-1911 | |
2002 | ||
49 | Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Springer 2002 | |
48 | Yanjiang Yang, Feng Bao, Robert H. Deng: Security Analysis and Improvement of the Global Key Recovery System. ACISP 2002: 17-24 | |
47 | Robert H. Deng, Jianying Zhou, Feng Bao: Defending against redirect attacks in mobile IP. ACM Conference on Computer and Communications Security 2002: 59-67 | |
46 | Hongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Informatica (Slovenia) 26(3): (2002) | |
2001 | ||
45 | Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu: Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ACISP 2001: 190-205 | |
44 | Feng Bao, Robert H. Deng: Privacy Protection for Transactions of Digital Goods. ICICS 2001: 202-213 | |
43 | Qibin Sun, Peirong Feng, Robert H. Deng: An Optical Watermarking Solution for Authenticating Printed Documents. ITCC 2001: 65-70 | |
42 | Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu: Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164 | |
41 | Hongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: 173-179 | |
2000 | ||
40 | Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288 | |
39 | Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111 | |
38 | Feng Bao, Robert H. Deng, Peirong Feng: An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. ICISC 2000: 162-170 | |
37 | Jianying Zhou, Robert H. Deng, Feng Bao: Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57 | |
36 | Feng Bao, Robert H. Deng, Jianying Zhou: Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460 | |
35 | Jianying Zhou, Robert H. Deng: On the validity of digital signatures. Computer Communication Review 30(2): 29-34 (2000) | |
34 | Xinkai Wang, Robert H. Deng, Feng Bao: Multicast Internet protocol. Computer Communications 23(11): 1047-1054 (2000) | |
1999 | ||
33 | Jianying Zhou, Robert H. Deng, Feng Bao: Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269 | |
32 | Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan: Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863 | |
31 | Feng Bao, Robert H. Deng: A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Public Key Cryptography 1999: 1-11 | |
30 | Robert H. Deng: Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. Computer Communications 22(6): 591- (1999) | |
1998 | ||
29 | Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. ASIACRYPT 1998: 126-132 | |
28 | Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Improved Truncated Differential Attacks on SAFER. ASIACRYPT 1998: 133-147 | |
27 | Feng Bao, Robert H. Deng, Wenbo Mao: Efficient and Practical Fair Exchange Protocols with Off-Line TTP. IEEE Symposium on Security and Privacy 1998: 77-85 | |
26 | Feng Bao, Robert H. Deng: A Signcryption Scheme with Signature Directly Verifiable by Public Key. Public Key Cryptography 1998: 55-59 | |
25 | Robert H. Deng, Jian Hu, Feng Bao, A. Desai Narasimhalu: A Ubiquitous Secure and Reliable Digital Data Depository System. WETICE 1998: 354-358 | |
1997 | ||
24 | Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng: Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. ACISP 1997: 261-270 | |
23 | Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair: A New On-Line Cash Check Scheme. ACM Conference on Computer and Communications Security 1997: 111-116 | |
22 | Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng: RSA-type Signatures in the Presence of Transient Faults. IMA Int. Conf. 1997: 155-160 | |
21 | Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi: Modified Finite Automata Public Key Cryptosystem. ISW 1997: 82-95 | |
20 | Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair: Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Security Protocols Workshop 1997: 115-124 | |
19 | Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar: Integrating Security in the CORBA Architecture. TAPOS 3(1): 3-13 (1997) | |
1996 | ||
18 | Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang: Practical Protocols for Certified Electronic Mail. J. Network Syst. Manage. 4(3): (1996) | |
1994 | ||
17 | Kisenchand Ranai, Koon Seng Lim, Robert H. Deng: Simulating a Multimedia FDDI Backbone Network. Comput. J. 37(3): 188-198 (1994) | |
16 | Koon Seng Lim, Robert H. Deng, Kisenchand Ranai: Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. Computer Communications 17(4): 251-256 (1994) | |
15 | Yuan Xing Li, Robert H. Deng, Xin-mei Wang: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Transactions on Information Theory 40(1): 271- (1994) | |
1993 | ||
14 | Robert H. Deng, Aurel A. Lazar, Weiguo Wang: A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks. Integrated Network Management 1993: 697-708 | |
13 | Robert H. Deng, Wendy C. L. Chiew: Effects of station buffer capacity on token ring network performance. Computer Communications 16(6): 366-375 (1993) | |
12 | Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang: Performance of a token-passing system with batch arrivals and its application to file transfers. Computer Communications 16(7): 422-431 (1993) | |
11 | Chi Chung Ko, W. C. Wong, J. L. Du, Robert H. Deng, Kin Mun Lye: Performance analysis of two bridged CSMA/CD networks. Computer Communications 16(8): 501-510 (1993) | |
10 | Robert H. Deng, Renben Shu: LAN-based medical visualization communication system. Computer Com |