default search action
Robert H. Deng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j342]Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Bing Mao, Yuekang Li, Yaowen Zheng, Yeting Li, Li Pan, Yang Liu, Robert H. Deng:
A Survey of Protocol Fuzzing. ACM Comput. Surv. 57(2): 35:1-35:36 (2025) - 2024
- [j341]Yangguang Tian, Yingjiu Li, Robert H. Deng, Guomin Yang, Nan Li:
Policy-Based Remote User Authentication From Multi-Biometrics. Comput. J. 67(5): 1814-1825 (2024) - [j340]Feng Li, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Jianting Ning, Robert H. Deng:
A Survey on Searchable Symmetric Encryption. ACM Comput. Surv. 56(5): 119:1-119:42 (2024) - [j339]Yunbo Yang, Yiwei Hu, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Guomin Yang, Robert H. Deng:
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT. IEEE Internet Things J. 11(8): 13793-13809 (2024) - [j338]Shuqin Liu, Yinbin Miao, Feng Li, Xinghua Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Practical Revocable Keyword Search Over Mobile Cloud-Assisted Internet of Things. IEEE Internet Things J. 11(16): 27494-27508 (2024) - [j337]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, HweeHwa Pang, Robert H. Deng:
AnoPas: Practical anonymous transit pass from group signatures with time-bound keys. J. Syst. Archit. 153: 103184 (2024) - [j336]Ju Jia, Siqi Ma, Lina Wang, Yang Liu, Robert H. Deng:
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services. IEEE Trans. Computers 73(1): 58-72 (2024) - [j335]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. IEEE Trans. Dependable Secur. Comput. 21(4): 1544-1556 (2024) - [j334]Yang Yang, Wenyi Xue, Yonghua Zhan, Minming Huang, Yingjiu Li, Robert H. Deng:
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential. IEEE Trans. Dependable Secur. Comput. 21(4): 1621-1638 (2024) - [j333]Guowen Xu, Xingshuo Han, Tianwei Zhang, Shengmin Xu, Jianting Ning, Xinyi Huang, Hongwei Li, Robert H. Deng:
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients. IEEE Trans. Dependable Secur. Comput. 21(4): 1708-1723 (2024) - [j332]Yinbin Miao, Feng Li, Xinghua Li, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System. IEEE Trans. Dependable Secur. Comput. 21(4): 1845-1862 (2024) - [j331]Yinbin Miao, Ziteng Liu, Xinghua Li, Meng Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation. IEEE Trans. Dependable Secur. Comput. 21(4): 2361-2375 (2024) - [j330]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert H. Deng:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. IEEE Trans. Dependable Secur. Comput. 21(4): 2585-2602 (2024) - [j329]Man Zhang, Xinghua Li, Yanbing Ren, Bin Luo, Yinbin Miao, Ximeng Liu, Robert H. Deng:
Privacy-Preserved Data Trading Via Verifiable Data Disturbance. IEEE Trans. Dependable Secur. Comput. 21(4): 3126-3140 (2024) - [j328]Yinbin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data. IEEE Trans. Dependable Secur. Comput. 21(4): 3247-3261 (2024) - [j327]Yinbin Miao, Rongpeng Xie, Xinghua Li, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient and Secure Federated Learning Against Backdoor Attacks. IEEE Trans. Dependable Secur. Comput. 21(5): 4619-4636 (2024) - [j326]Ju Jia, Siqi Ma, Yang Liu, Lina Wang, Robert H. Deng:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 19: 59-73 (2024) - [j325]Zekai Chen, Shengxing Yu, Mingyuan Fan, Ximeng Liu, Robert H. Deng:
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data. IEEE Trans. Inf. Forensics Secur. 19: 693-707 (2024) - [j324]Xiaoguo Li, Zixi Huang, Bowen Zhao, Guomin Yang, Tao Xiang, Robert H. Deng:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. IEEE Trans. Inf. Forensics Secur. 19: 1440-1454 (2024) - [j323]Jianchang Lai, Willy Susilo, Robert H. Deng, Fuchun Guo:
SDSS: Sequential Data Sharing System in IoT. IEEE Trans. Inf. Forensics Secur. 19: 2288-2299 (2024) - [j322]Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng:
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage. IEEE Trans. Inf. Forensics Secur. 19: 2746-2760 (2024) - [j321]Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Wanyun Xu, Yanbing Ren, Robert H. Deng:
Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading. IEEE Trans. Inf. Forensics Secur. 19: 5545-5560 (2024) - [j320]Bowen Zhao, Weiquan Deng, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Robert H. Deng:
SOCI+: An Enhanced Toolkit for Secure Outsourced Computation on Integers. IEEE Trans. Inf. Forensics Secur. 19: 5607-5619 (2024) - [j319]Yinbin Miao, Xinru Yan, Xinghua Li, Shujiang Xu, Ximeng Liu, Hongwei Li, Robert H. Deng:
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack. IEEE Trans. Inf. Forensics Secur. 19: 5814-5827 (2024) - [j318]Yinbin Miao, Da Kuang, Xinghua Li, Shujiang Xu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings. IEEE Trans. Inf. Forensics Secur. 19: 5828-5841 (2024) - [j317]Yang Yang, Wenyi Xue, Jianfei Sun, Guomin Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 19: 6097-6112 (2024) - [j316]Mengdi Hu, Lanxiang Chen, Gaolin Chen, Yi Mu, Robert H. Deng:
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph. IEEE Trans. Inf. Forensics Secur. 19: 6351-6363 (2024) - [j315]Zekai Chen, Shengxing Yu, Farong Chen, Fuyi Wang, Ximeng Liu, Robert H. Deng:
Lightweight Privacy-Preserving Cross-Cluster Federated Learning With Heterogeneous Data. IEEE Trans. Inf. Forensics Secur. 19: 7404-7419 (2024) - [j314]Zhe Chen, Haiyan Zhang, Xinghua Li, Yinbin Miao, Xiaohan Zhang, Man Zhang, Siqi Ma, Robert H. Deng:
FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 8140-8154 (2024) - [j313]Yanrong Liang, Jianfeng Ma, Yinbin Miao, Yuan Su, Robert H. Deng:
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data. IEEE Trans. Inf. Forensics Secur. 19: 9085-9099 (2024) - [j312]Yunbo Yang, Xiang Chen, Yuhao Pan, Jiachen Shen, Zhenfu Cao, Xiaolei Dong, Xiaoguo Li, Jianfei Sun, Guomin Yang, Robert H. Deng:
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving. IEEE Trans. Inf. Forensics Secur. 19: 9670-9681 (2024) - [j311]Yifan Zhang, Yinbin Miao, Xinghua Li, Linfeng Wei, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing. IEEE Trans. Ind. Informatics 20(3): 3316-3326 (2024) - [j310]Yinbin Miao, Yutao Yang, Xinghua Li, Linfeng Wei, Zhiquan Liu, Robert H. Deng:
Efficient Privacy-Preserving Spatial Data Query in Cloud Computing. IEEE Trans. Knowl. Data Eng. 36(1): 122-136 (2024) - [j309]Zhuoran Ma, Yang Liu, Yinbin Miao, Guowen Xu, Ximeng Liu, Jianfeng Ma, Robert H. Deng:
FlGan: GAN-Based Unbiased Federated Learning Under Non-IID Settings. IEEE Trans. Knowl. Data Eng. 36(4): 1566-1581 (2024) - [j308]Haiyan Zhang, Xinghua Li, Mengfan Xu, Ximeng Liu, Tong Wu, Jian Weng, Robert H. Deng:
BADFL: Backdoor Attack Defense in Federated Learning From Local Model Perspective. IEEE Trans. Knowl. Data Eng. 36(11): 5661-5674 (2024) - [j307]Yinbin Miao, Feng Li, Xinghua Li, Zhiquan Liu, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud. IEEE Trans. Mob. Comput. 23(5): 3650-3665 (2024) - [j306]Zhe Ren, Xinghua Li, Yinbin Miao, Zhuowen Li, Zihao Wang, Mengyao Zhu, Ximeng Liu, Robert H. Deng:
Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement Learning. IEEE Trans. Mob. Comput. 23(6): 6563-6578 (2024) - [j305]Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Arbitrary Geometric Range Query in Mobile Internet of Vehicles. IEEE Trans. Mob. Comput. 23(7): 7725-7738 (2024) - [j304]Zihao Wang, Hang Wang, Zhuowen Li, Xinghua Li, Yinbin Miao, Yanbing Ren, Yunwei Wang, Zhe Ren, Robert H. Deng:
Robust Permissioned Blockchain Consensus for Unstable Communication in FANET. IEEE/ACM Trans. Netw. 32(1): 699-712 (2024) - [j303]Bin Luo, Xinghua Li, Yinbin Miao, Man Zhang, Ximeng Liu, Yanbing Ren, Xizhao Luo, Robert H. Deng:
PAM3S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS. IEEE/ACM Trans. Netw. 32(1): 729-744 (2024) - [j302]Shengmin Xu, Jianting Ning, Xiaoguo Li, Jiaming Yuan, Xinyi Huang, Robert H. Deng:
A Privacy-Preserving and Redactable Healthcare Blockchain System. IEEE Trans. Serv. Comput. 17(2): 364-377 (2024) - [j301]Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Siqi Ma, Kim-Kwang Raymond Choo, Robert H. Deng:
Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS. IEEE Trans. Serv. Comput. 17(2): 589-603 (2024) - [j300]Shengmin Xu, Xingshuo Han, Guowen Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption. IEEE Trans. Serv. Comput. 17(3): 776-788 (2024) - [j299]Yonghua Zhan, Yang Yang, Hongju Cheng, Xiangyang Luo, Zhangshuang Guan, Robert H. Deng:
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles. IEEE Trans. Serv. Comput. 17(5): 2762-2775 (2024) - [c230]Robert H. Deng:
Toward Practical Client-Side Encryption in Cloud Computing. AsiaCCS 2024 - [c229]Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. CCS 2024: 899-913 - [c228]Zhe Ren, Xinghua Li, Yinbin Miao, Mengyao Zhu, Shunjie Yuan, Robert H. Deng:
PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT Networks. CCS 2024: 3645-3658 - [c227]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. NDSS 2024 - [c226]Xiaoguo Li, Guomin Yang, Tao Xiang, Shengmin Xu, Bowen Zhao, HweeHwa Pang, Robert H. Deng:
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption. SP 2024: 3109-3127 - [i40]Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Yuekang Li, Yaowen Zheng, Yeting Li, Bing Mao, Yang Liu, Robert H. Deng:
A Survey of Protocol Fuzzing. CoRR abs/2401.01568 (2024) - [i39]Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng:
Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning. CoRR abs/2404.13860 (2024) - [i38]Ziyu Lin, Zhiwei Lin, Run Guo, Jianjun Chen, Mingming Zhang, Ximeng Liu, Tianhao Yang, Zhuoran Cao, Robert H. Deng:
Detecting and Measuring Security Implications of Entangled Domain Verification in CDN. CoRR abs/2409.01887 (2024) - [i37]Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. IACR Cryptol. ePrint Arch. 2024: 1355 (2024) - [i36]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. IACR Cryptol. ePrint Arch. 2024: 1783 (2024) - [i35]Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, Robert H. Deng:
Siniel: Distributed Privacy-Preserving zkSNARK. IACR Cryptol. ePrint Arch. 2024: 1803 (2024) - 2023
- [j298]Xinru Yan, Yinbin Miao, Xinghua Li, Kim-Kwang Raymond Choo, Xiangdong Meng, Robert H. Deng:
Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT. IEEE Internet Things J. 10(15): 13281-13291 (2023) - [j297]Peilei Xue, Xinghua Li, Zhongyuan Jiang, Bin Luo, Yinbin Miao, Ximeng Liu, Robert H. Deng:
A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction. IEEE Internet Things J. 10(23): 20899-20913 (2023) - [j296]Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng:
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. J. Parallel Distributed Comput. 180: 104721 (2023) - [j295]Zhenzhu Chen, Jie Wu, Anmin Fu, Mang Su, Robert H. Deng:
MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN. Knowl. Based Syst. 270: 110527 (2023) - [j294]Yanrong Liang, Jianfeng Ma, Yinbin Miao, Da Kuang, Xiangdong Meng, Robert H. Deng:
Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data. IEEE Trans. Computers 72(11): 3086-3098 (2023) - [j293]Yang Yang, Robert H. Deng, Wenzhong Guo, Hongju Cheng, Xiangyang Luo, Xianghan Zheng, Chunming Rong:
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer. IEEE Trans. Cloud Comput. 11(1): 247-262 (2023) - [j292]Jianfei Sun, Guowen Xu, Tianwei Zhang, Hu Xiong, Hongwei Li, Robert H. Deng:
Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing. IEEE Trans. Cloud Comput. 11(1): 822-838 (2023) - [j291]Feng Li, Jianfeng Ma, Yinbin Miao, Zhiquan Liu, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng:
Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 11(1): 839-853 (2023) - [j290]Bowen Zhao, Ximeng Liu, An Song, Wei-Neng Chen, Kuei-Kuei Lai, Jun Zhang, Robert H. Deng:
PriMPSO: A Privacy-Preserving Multiagent Particle Swarm Optimization Algorithm. IEEE Trans. Cybern. 53(11): 7136-7149 (2023) - [j289]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. IEEE Trans. Dependable Secur. Comput. 20(1): 53-67 (2023) - [j288]Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng:
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges. IEEE Trans. Dependable Secur. Comput. 20(2): 1002-1016 (2023) - [j287]Hua Deng, Zheng Qin, Qianhong Wu, Robert H. Deng, Zhenyu Guan, Yupeng Hu, Fangmin Li:
Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds. IEEE Trans. Dependable Secur. Comput. 20(2): 1364-1377 (2023) - [j286]Boyu Kuang, Anmin Fu, Yansong Gao, Yuqing Zhang, Jianying Zhou, Robert H. Deng:
FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(4): 2954-2969 (2023) - [j285]Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Yinbin Miao, Yang Liu, Robert H. Deng:
Forward/Backward and Content Private DSSE for Spatial Keyword Queries. IEEE Trans. Dependable Secur. Comput. 20(4): 3358-3370 (2023) - [j284]Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu, Robert H. Deng:
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(5): 4325-4342 (2023) - [j283]Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng:
Hercules: Boosting the Performance of Privacy-Preserving Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 4418-4433 (2023) - [j282]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng:
VerifyTL: Secure and Verifiable Collaborative Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(6): 5087-5101 (2023) - [j281]Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert H. Deng:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. IEEE Trans. Inf. Forensics Secur. 18: 101-116 (2023) - [j280]Jianfei Sun, Guowen Xu, Tianwei Zhang, Xuehuan Yang, Mamoun Alazab, Robert H. Deng:
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds. IEEE Trans. Inf. Forensics Secur. 18: 683-698 (2023) - [j279]Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
Authenticable Data Analytics Over Encrypted Data in the Cloud. IEEE Trans. Inf. Forensics Secur. 18: 1800-1813 (2023) - [j278]Yinbin Miao, Wei Zheng, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Secure Model-Contrastive Federated Learning With Improved Compressive Sensing. IEEE Trans. Inf. Forensics Secur. 18: 3430-3444 (2023) - [j277]Wenyi Xue, Yang Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots. IEEE Trans. Inf. Forensics Secur. 18: 3720-3734 (2023) - [j276]Yinbin Miao, Yutao Yang, Xinghua Li, Zhiquan Liu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data. IEEE Trans. Inf. Forensics Secur. 18: 3921-3933 (2023) - [j275]Jianfei Sun, Guowen Xu, Tianwei Zhang, Xuehuan Yang, Mamoun Alazab, Robert H. Deng:
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption. IEEE Trans. Inf. Forensics Secur. 18: 4345-4360 (2023) - [j274]Xueqiao Liu, Guomin Yang, Willy Susilo, Kai He, Robert H. Deng, Jian Weng:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j273]Bowen Zhao, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Yingjiu Li, Robert H. Deng:
CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics. IEEE Trans. Inf. Forensics Secur. 18: 5416-5430 (2023) - [j272]Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng:
LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes. IEEE Trans. Ind. Informatics 19(6): 7676-7688 (2023) - [j271]Yinbin Miao, Yutao Yang, Xinghua Li, Kim-Kwang Raymond Choo, Xiangdong Meng, Robert H. Deng:
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(12): 13603-13616 (2023) - [j270]Qiuyun Tong, Xinghua Li, Yinbin Miao, Ximeng Liu, Jian Weng, Robert H. Deng:
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing. IEEE Trans. Knowl. Data Eng. 35(5): 5159-5172 (2023) - [j269]Qiuyun Tong, Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security. IEEE Trans. Knowl. Data Eng. 35(5): 5386-5399 (2023) - [j268]Yanbing Ren, Xinghua Li, Yinbin Miao, Robert H. Deng, Jian Weng, Siqi Ma, Jianfeng Ma:
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services. IEEE Trans. Mob. Comput. 22(6): 3287-3302 (2023) - [j267]Qiuyun Tong, Yinbin Miao, Hongwei Li, Ximeng Liu, Robert H. Deng:
Privacy-Preserving Ranked Spatial Keyword Query in Mobile Cloud-Assisted Fog Computing. IEEE Trans. Mob. Comput. 22(6): 3604-3618 (2023) - [j266]Bowen Zhao, Ximeng Liu, Wei-Neng Chen, Robert H. Deng:
CrowdFL: Privacy-Preserving Mobile Crowdsensing System Via Federated Learning. IEEE Trans. Mob. Comput. 22(8): 4607-4619 (2023) - [j265]Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng:
Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries. ACM Trans. Storage 19(4): 38:1-38:25 (2023) - [j264]Bowen Zhao, Yingjiu Li, Ximeng Liu, Xiaoguo Li, HweeHwa Pang, Robert H. Deng:
Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme. IEEE Trans. Reliab. 72(4): 1295-1307 (2023) - [j263]Yinbin Miao, Wei Zheng, Xiaohua Jia, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method. IEEE Trans. Serv. Comput. 16(1): 525-536 (2023) - [j262]Lanxiang Chen, Yujie Xue, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data. IEEE Trans. Serv. Comput. 16(2): 1011-1022 (2023) - [j261]Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
Threshold Attribute-Based Credentials With Redactable Signature. IEEE Trans. Serv. Comput. 16(5): 3751-3765 (2023) - [j260]Yinbin Miao, Yueming Yu, Xinghua Li, Yu Guo, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Defending Against Membership Inference Attack by Shielding Membership Signals. IEEE Trans. Serv. Comput. 16(6): 4087-4101 (2023) - [j259]Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials. IEEE Trans. Serv. Comput. 16(6): 4444-4455 (2023) - [j258]Zhan Zhang, Xinghua Li, Yunwei Wang, Yinbin Miao, Ximeng Liu, Jian Weng, Robert H. Deng:
TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET. IEEE Trans. Veh. Technol. 72(11): 14987-15001 (2023) - [c225]Robert H. Deng:
Data Security & Privacy Protection in IoT MGC Systems. CPSS@AsiaCCS 2023: 1 - [c224]Yinbin Miao, Chao Xu, Yifeng Zheng, Ximeng Liu, Xiangdong Meng, Robert H. Deng:
Efficient and Secure Spatial Range Query over Large-scale Encrypted Data. ICDCS 2023: 1-11 - [i34]Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng:
A Survey of Secure Computation Using Trusted Execution Environments. CoRR abs/2302.12150 (2023) - [i33]Bowen Zhao, Weiquan Deng, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Robert H. Deng:
SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers. CoRR abs/2309.15406 (2023) - 2022
- [j257]Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang:
Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification. Comput. J. 65(10): 2570-2588 (2022) - [j256]Tong Liu, Yinbin Miao, Kim-Kwang Raymond Choo, Hongwei Li, Ximeng Liu, Xiangdong Meng, Robert H. Deng:
Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT. IEEE Internet Things J. 9(13): 11017-11029 (2022) - [j255]Lin Song, Yinbin Miao, Jian Weng, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng:
Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things. IEEE Internet Things J. 9(15): 13598-13611 (2022) - [j254]Yilin Li, Shushu Liu, Zheng Yan, Robert H. Deng:
Secure 5G Positioning With Truth Discovery, Attack Detection, and Tracing. IEEE Internet Things J. 9(22): 22220-22229 (2022) - [j253]Yujie Xue, Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
Structured encryption for knowledge graphs. Inf. Sci. 605: 43-70 (2022) - [j252]Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu:
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things. IEEE Trans. Cloud Comput. 10(1): 474-490 (2022) - [j251]Yinbin Miao, Qiuyun Tong, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Hongwei Li:
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage. IEEE Trans. Cloud Comput. 10(2): 835-848 (2022) - [j250]Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong:
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata. IEEE Trans. Cloud Comput. 10(3): 2020-2037 (2022) - [j249]Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Hongwei Li:
Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing. IEEE Trans. Cloud Comput. 10(3): 2146-2162 (2022) - [j248]Qiuyun Tong, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Hongwei Li:
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things. IEEE Trans. Cloud Comput. 10(4): 2964-2976 (2022) - [j247]Jinhua Ma, Xinyi Huang, Yi Mu, Robert H. Deng:
Authenticated Data Redaction With Accountability and Transparency. IEEE Trans. Dependable Secur. Comput. 19(1): 149-160 (2022) - [j246]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - [j245]Jiayun Xu, Yingjiu Li, Robert H. Deng, Ke Xu:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. IEEE Trans. Dependable Secur. Comput. 19(2): 1149-1163 (2022) - [j244]Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. IEEE Trans. Dependable Secur. Comput. 19(2): 1164-1180 (2022) - [j243]Guowen Xu, Hongwei Li, Yun Zhang, Shengmin Xu, Jianting Ning, Robert H. Deng:
Privacy-Preserving Federated Deep Learning With Irregular Users. IEEE Trans. Dependable Secur. Comput. 19(2): 1364-1381 (2022) - [j242]Willy Susilo, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, Robert H. Deng:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable Secur. Comput. 19(3): 2138-2148 (2022) - [j241]Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [j240]Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng:
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(5): 3448-3463 (2022) - [j239]Yanbing Ren, Xinghua Li, Yinbin Miao, Bin Luo, Jian Weng, Kim-Kwang Raymond Choo, Robert H. Deng:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 17: 804-818 (2022) - [j238]Yang Yang, Ke Mu, Robert H. Deng:
Lightweight Privacy-Preserving GAN Framework for Model Training and Image Synthesis. IEEE Trans. Inf. Forensics Secur. 17: 1083-1098 (2022) - [j237]Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Redactable Blockchain in Decentralized Setting. IEEE Trans. Inf. Forensics Secur. 17: 1227-1242 (2022) - [j236]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Yingjiu Li, Robert H. Deng:
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. IEEE Trans. Inf. Forensics Secur. 17: 1639-1654 (2022) - [j235]Zhenzhu Chen, Shang Wang, Anmin Fu, Yansong Gao, Shui Yu, Robert H. Deng:
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check. IEEE Trans. Inf. Forensics Secur. 17: 2000-2014 (2022) - [j234]Yinbin Miao, Ziteng Liu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems. IEEE Trans. Inf. Forensics Secur. 17: 2848-2861 (2022) - [j233]Jianfei Sun, Guowen Xu, Tianwei Zhang, Mamoun Alazab, Robert H. Deng:
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System. IEEE Trans. Inf. Forensics Secur. 17: 2862-2877 (2022) - [j232]Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, HweeHwa Pang, Robert H. Deng:
SOCI: A Toolkit for Secure Outsourced Computation on Integers. IEEE Trans. Inf. Forensics Secur. 17: 3637-3648 (2022) - [j231]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Yu Gao, Robert H. Deng:
Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(2): 953-964 (2022) - [j230]Ximeng Liu, Robert H. Deng, Yinbin Miao, Athanasios V. Vasilakos:
Guest Editorial: 5G-Enabled Intelligent Application for Distributed Industrial Internet-of-Thing System. IEEE Trans. Ind. Informatics 18(4): 2807-2810 (2022) - [j229]Zuobin Ying, Shuanglong Cao, Ximeng Liu, Zhuo Ma, Jianfeng Ma, Robert H. Deng:
PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 23(9): 16290-16303 (2022) - [j228]Zheng Yan, Xinren Qian, Shushu Liu, Robert H. Deng:
Privacy Protection in 5G Positioning and Location-based Services Based on SGX. ACM Trans. Sens. Networks 18(3): 41:1-41:19 (2022) - [j227]Haoran Yuan, Xiaofeng Chen, Jin Li, Tao Jiang, Jianfeng Wang, Robert H. Deng:
Secure Cloud Data Deduplication with Efficient Re-Encryption. IEEE Trans. Serv. Comput. 15(1): 442-456 (2022) - [j226]Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng:
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs. IEEE Trans. Serv. Comput. 15(5): 2551-2564 (2022) - [j225]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud. IEEE Trans. Serv. Comput. 15(6): 3429-3442 (2022) - [j224]Zuobin Ying, Wenjie Jiang, Ximeng Liu, Shengmin Xu, Robert H. Deng:
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing. IEEE Trans. Serv. Comput. 15(6): 3485-3498 (2022) - [j223]Qiuyun Tong, Yinbin Miao, Lei Chen, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings. IEEE Trans. Serv. Comput. 15(6): 3606-3619 (2022) - [c223]Yinbin Miao, Rongpeng Xie, Xinghua Li, Ximeng Liu, Zhuo Ma, Robert H. Deng:
Compressed Federated Learning Based on Adaptive Local Differential Privacy. ACSAC 2022: 159-170 - [c222]Bowen Zhao, Yingjiu Li, Ximeng Liu, HweeHwa Pang, Robert H. Deng:
FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification. DSC 2022: 1-8 - [c221]Yutao Yang, Yinbin Miao, Kim-Kwang Raymond Choo, Robert H. Deng:
Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data. ICDCS 2022: 392-402 - [c220]Jiaming Yuan, Yingjiu Li, Jianting Ning, Robert H. Deng:
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption. ISPEC 2022: 606-623 - [c219]Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng, Zhiguo Wan:
An Efficient and Secure Scheme of Verifiable Computation for Intel SGX. TrustCom 2022: 473-482 - [i32]Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng:
Hercules: Boosting the Performance of Privacy-preserving Federated Learning. CoRR abs/2207.04620 (2022) - [i31]Guowen Xu, Xingshuo Han, Tianwei Zhang, Hongwei Li, Robert H. Deng:
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients. CoRR abs/2207.04637 (2022) - [i30]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. CoRR abs/2210.03014 (2022) - [i29]Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng:
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. CoRR abs/2210.10244 (2022) - 2021
- [j222]Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng:
Attribute-based Encryption for Cloud Computing Access Control: A Survey. ACM Comput. Surv. 53(4): 83:1-83:41 (2021) - [j221]Zheng Yan, Qinghua Zheng, Laurence T. Yang, Robert H. Deng:
Data Fusion for Trust Evaluation. Inf. Fusion 76: 187-188 (2021) - [j220]Zhenzhu Chen, Anmin Fu, Yinghui Zhang, Zhe Liu, Fanjian Zeng, Robert H. Deng:
Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things. IEEE Internet Things J. 8(7): 5839-5849 (2021) - [j219]Bowen Zhao, Ximeng Liu, Wei-Neng Chen, Wei Liang, Xinglin Zhang, Robert H. Deng:
PRICE: Privacy and Reliability-Aware Real-Time Incentive System for Crowdsensing. IEEE Internet Things J. 8(24): 17584-17595 (2021) - [j218]Xiangyu Wang, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Dan Zhu, Robert H. Deng:
Fast and Secure Location-Based Services in Smart Cities on Outsourced Data. IEEE Internet Things J. 8(24): 17639-17654 (2021) - [j217]Zhenzhu Chen, Anmin Fu, Robert H. Deng, Ximeng Liu, Yang Yang, Yinghui Zhang:
Secure and verifiable outsourced data dimension reduction on dynamic data. Inf. Sci. 573: 182-193 (2021) - [j216]Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert H. Deng:
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. KSII Trans. Internet Inf. Syst. 15(8): 2827-2848 (2021) - [j215]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-based remote user authentication from reusable fuzzy signature. J. Comput. Secur. 29(3): 273-298 (2021) - [j214]Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, Robert H. Deng:
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing. IEEE Trans. Dependable Secur. Comput. 18(1): 117-130 (2021) - [j213]Tong Wu, Guomin Yang, Yi Mu, Fuchun Guo, Robert H. Deng:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Trans. Dependable Secur. Comput. 18(2): 563-575 (2021) - [j212]Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang, Robert H. Deng:
Looking Back! Using Early Versions of Android Apps as Attack Vectors. IEEE Trans. Dependable Secur. Comput. 18(2): 652-666 (2021) - [j211]Yinghui Zhang, Robert H. Deng, Elisa Bertino, Dong Zheng:
Robust and Universal Seamless Handover Authentication in 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(2): 858-874 (2021) - [j210]Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Jiguo Li, Hongwei Li, Jian-Feng Ma:
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Trans. Dependable Secur. Comput. 18(3): 1080-1094 (2021) - [j209]Yinbin Miao, Robert H. Deng, Ximeng Liu, Kim-Kwang Raymond Choo, Hongjun Wu, Hongwei Li:
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 18(4): 1667-1680 (2021) - [j208]Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Jianting Ning, Hongwei Li:
Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings. IEEE Trans. Dependable Secur. Comput. 18(4): 1804-1820 (2021) - [j207]Pengfei Wu, Robert H. Deng, Qingni Shen, Ximeng Liu, Qi Li, Zhonghai Wu:
ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Trans. Dependable Secur. Comput. 18(5): 2331-2348 (2021) - [j206]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang:
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes. IEEE Trans. Emerg. Top. Comput. 9(1): 456-470 (2021) - [j205]Yan Li, Yao Cheng, Weizhi Meng, Yingjiu Li, Robert H. Deng:
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. IEEE Trans. Inf. Forensics Secur. 16: 307-321 (2021) - [j204]Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, Robert H. Deng:
K-Time Modifiable and Epoch-Based Redactable Blockchain. IEEE Trans. Inf. Forensics Secur. 16: 4507-4520 (2021) - [j203]Yang Yang, Zhangshuang Guan, Zhiguo Wan, Jian Weng, HweeHwa Pang, Robert H. Deng:
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting. IEEE Trans. Inf. Forensics Secur. 16: 4705-4720 (2021) - [j202]Shengmin Xu, Jianting Ning, Xinyi Huang, Jianying Zhou, Robert H. Deng:
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups. IEEE Trans. Inf. Forensics Secur. 16: 4746-4761 (2021) - [j201]Xiangyu Wang, Jianfeng Ma, Feng Li, Ximeng Liu, Yinbin Miao, Robert H. Deng:
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees. IEEE Trans. Inf. Forensics Secur. 16: 4909-4923 (2021) - [j200]Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghua Zheng:
Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory. IEEE Trans. Parallel Distributed Syst. 32(3): 587-600 (2021) - [j199]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang:
Privacy-Preserving Outsourced Clinical Decision Support System in the Cloud. IEEE Trans. Serv. Comput. 14(1): 222-234 (2021) - [j198]Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng:
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing. IEEE Trans. Serv. Comput. 14(4): 1152-1166 (2021) - [c218]Ximing Liu, Yingjiu Li, Robert H. Deng:
UltraPIN: Inferring PIN Entries via Ultrasound. AsiaCCS 2021: 944-957 - [c217]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [c216]Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky K. C. Chang:
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid. DSN 2021: 543-554 - [c215]Shengmin Xu, Jianting Ning, Jinhua Ma, Guowen Xu, Jiaming Yuan, Robert H. Deng:
Revocable Policy-Based Chameleon Hash. ESORICS (1) 2021: 327-347 - [c214]Haoran Yuan, Xiaofeng Chen, Guowen Xu, Jianting Ning, Joseph K. Liu, Robert H. Deng:
Efficient and Verifiable Proof of Replication with Fast Fault Localization. INFOCOM 2021: 1-10 - [c213]Jiayun Xu, Yingjiu Li, Robert H. Deng:
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection. NDSS 2021 - [c212]Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, HweeHwa Pang, Robert H. Deng:
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. SACMAT 2021: 143-154 - [e16]Robert H. Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang:
Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings. Lecture Notes in Computer Science 13107, Springer 2021, ISBN 978-3-030-93206-0 [contents] - [i28]Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng:
An efficient and secure scheme of verifiable computation for Intel SGX. CoRR abs/2106.14253 (2021) - [i27]Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Robert H. Deng:
IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability. IACR Cryptol. ePrint Arch. 2021: 1244 (2021) - 2020
- [j197]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang:
A New Construction for Linkable Secret Handshake. Comput. J. 63(4): 536-548 (2020) - [j196]Xueqin Liang, Zheng Yan, Robert H. Deng:
Game theoretical study on client-controlled cloud data deduplication. Comput. Secur. 91: 101730 (2020) - [j195]Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang:
Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. Pract. Exp. 32(14) (2020) - [j194]Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang:
Lightning-fast and privacy-preserving outsourced computation in the cloud. Cybersecur. 3(1): 17 (2020) - [j193]Kuo-Hui Yeh, Robert H. Deng, Hiroaki Kikuchi:
Special Issue on FinTech Security and Privacy. Future Gener. Comput. Syst. 112: 1172-1173 (2020) - [j192]Qiu-Hong Wang, Steven M. Miller, Robert H. Deng:
Driving Cybersecurity Policy Insights From Information on the Internet. IEEE Secur. Priv. 18(6): 42-50 (2020) - [j191]Kuo-Hui Yeh, Chunhua Su, Robert H. Deng, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. Int. J. Inf. Sec. 19(3): 243-244 (2020) - [j190]Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng:
Editing-Enabled Signatures: A New Tool for Editing Authenticated Data. IEEE Internet Things J. 7(6): 4997-5007 (2020) - [j189]Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng:
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health. IEEE Internet Things J. 7(7): 6566-6575 (2020) - [j188]Hui Cui, Robert H. Deng, Baodong Qin, Jian Weng:
Key regeneration-free ciphertext-policy attribute-based encryption and its application. Inf. Sci. 517: 217-229 (2020) - [j187]Yujue Wang, HweeHwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin, Kefeng Fan:
Secure server-aided data sharing clique with attestation. Inf. Sci. 522: 80-98 (2020) - [j186]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Pengfei Wu, Anyi Liu:
A new framework for privacy-preserving biometric-based remote user authentication. J. Comput. Secur. 28(4): 469-498 (2020) - [j185]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang:
Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery. IEEE Trans. Cloud Comput. 8(2): 610-622 (2020) - [j184]Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li:
Lightweight Sharable and Traceable Secure Mobile Health System. IEEE Trans. Dependable Secur. Comput. 17(1): 78-91 (2020) - [j183]Yang Yang, Ximeng Liu, Robert H. Deng:
Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language. IEEE Trans. Dependable Secur. Comput. 17(2): 320-334 (2020) - [j182]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Privacy-Preserving Data Processing with Flexible Access Control. IEEE Trans. Dependable Secur. Comput. 17(2): 363-376 (2020) - [j181]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang, HweeHwa Pang:
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. IEEE Trans. Dependable Secur. Comput. 17(5): 898-911 (2020) - [j180]Xueqiao Liu, Guomin Yang, Yi Mu, Robert H. Deng:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 17(6): 1322-1332 (2020) - [j179]Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou:
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. IEEE Trans. Inf. Forensics Secur. 15: 3168-3180 (2020) - [j178]Yulei Wu, Zheng Yan, F. Richard Yu, Robert H. Deng, Vijay Varadharajan, Wei Chen:
Guest Editorial: Blockchain and Healthcare Computing. IEEE J. Biomed. Health Informatics 24(8): 2144-2145 (2020) - [j177]Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong:
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control. IEEE Trans. Netw. Serv. Manag. 17(2): 918-930 (2020) - [j176]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-preserving Network Path Validation. ACM Trans. Internet Techn. 20(1): 5:1-5:27 (2020) - [j175]Yang Yang, Ximeng Liu, Robert H. Deng, Jian Weng:
Flexible Wildcard Searchable Encryption System. IEEE Trans. Serv. Comput. 13(3): 464-477 (2020) - [j174]Jianfei Sun, Hu Xiong, Shufan Zhang, Ximeng Liu, Jiaming Yuan, Robert H. Deng:
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(11): 12938-12950 (2020) - [c211]Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haomiao Yang, Kan Yang, Robert H. Deng:
Secure and Verifiable Inference in Deep Neural Networks. ACSAC 2020: 784-797 - [c210]Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yinghui Zhang, Jianfei Sun, Robert H. Deng:
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems. AsiaCCS 2020: 178-192 - [c209]En He, Daoyuan Wu, Robert H. Deng:
Understanding Android VoIP Security: A System-Level Vulnerability Assessment. DIMVA 2020: 110-131 - [c208]Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Ch'ng Loh, Jian Weng, Robert H. Deng:
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment. ESORICS (1) 2020: 3-22 - [c207]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren:
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing. ICDCS 2020: 1-11 - [c206]Guowen Xu, Hongwei Li, Yuan Zhang, Xiaodong Lin, Robert H. Deng, Xuemin Shen:
A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing. ICPADS 2020: 438-446 - [c205]Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Robert H. Deng, Yinbin Miao, Dan Zhu, Zhuoran Ma:
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data. INFOCOM 2020: 2253-2262 - [e15]Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan:
Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings. Lecture Notes in Computer Science 12472, Springer 2020, ISBN 978-3-030-62973-1 [contents] - [i26]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng:
VerifyTL: Secure and Verifiable Collaborative Transfer Learning. CoRR abs/2005.08997 (2020) - [i25]Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky K. C. Chang:
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid. CoRR abs/2005.11527 (2020) - [i24]Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong:
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata. CoRR abs/2005.11688 (2020) - [i23]Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud. CoRR abs/2009.10918 (2020)
2010 – 2019
- 2019
- [j173]Guowen Xu, Hongwei Li, Hao Ren, Kan Yang, Robert H. Deng:
Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities. IEEE Commun. Mag. 57(11): 116-122 (2019) - [j172]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Comput. Secur. 80: 90-107 (2019) - [j171]Mengmeng Yang, Tianqing Zhu, Kaitai Liang, Wanlei Zhou, Robert H. Deng:
A blockchain-based location privacy-preserving crowdsensing system. Future Gener. Comput. Syst. 94: 408-418 (2019) - [j170]Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng:
Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks. IEEE Internet Things J. 6(2): 1617-1627 (2019) - [j169]Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng:
SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing. IEEE Internet Things J. 6(2): 3003-3013 (2019) - [j168]Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Hongjun Wu, Hongwei Li:
Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything. IEEE Internet Things J. 6(4): 7201-7212 (2019) - [j167]Yinbin Miao, Qiuyun Tong, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng, Hongwei Li:
Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things. IEEE Internet Things J. 6(5): 8681-8691 (2019) - [j166]Lin Liu, Jinshu Su, Ximeng Liu, Rongmao Chen, Kai Huang, Robert H. Deng, Xiaofeng Wang:
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data. IEEE Internet Things J. 6(6): 9841-9852 (2019) - [j165]Yujue Wang, HweeHwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin:
Securing messaging services through efficient signcryption with designated equality test. Inf. Sci. 490: 146-165 (2019) - [j164]Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng:
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin. J. Comput. Secur. 27(3): 375-403 (2019) - [j163]Zhiguo Wan, Robert H. Deng, David Lee, Ying Li:
MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains. J. Comput. Sci. Technol. 34(2): 403-415 (2019) - [j162]Hui Cui, Robert H. Deng, Yingjiu Li, Guowei Wu:
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. IEEE Trans. Big Data 5(3): 330-342 (2019) - [j161]Yinbin Miao, Ximeng Liu, Robert H. Deng, Hongjun Wu, Hongwei Li, Jiguo Li, Dapeng Wu:
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things. IEEE Trans. Ind. Informatics 15(6): 3206-3217 (2019) - [j160]Yinghui Zhang, Robert H. Deng, Dong Zheng, Jin Li, Pengfei Wu, Jin Cao:
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Trans. Ind. Informatics 15(9): 5099-5108 (2019) - [j159]Hui Cui, Robert H. Deng, Guilin Wang:
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks. IEEE/ACM Trans. Netw. 27(2): 721-733 (2019) - [j158]Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng:
CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing. IEEE Trans. Parallel Distributed Syst. 30(6): 1251-1266 (2019) - [c204]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c203]Pengfei Wu, Qingni Shen, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu:
ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. AsiaCCS 2019: 86-99 - [c202]Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. AsiaCCS 2019: 241-246 - [c201]Daoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng:
Towards Understanding Android System Vulnerabilities: Techniques and Insights. AsiaCCS 2019: 295-306 - [c200]Jianfei Sun, Hu Xiong, Robert H. Deng, Yinghui Zhang, Ximeng Liu, Mingsheng Cao:
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT. DSC 2019: 1-8 - [c199]Yongdong Wu, Jian Weng, Bo Qiu, Zhuo Wei, Fan Qian, Robert H. Deng:
Random Delay Attack and Its Applications on Load Frequency Control of Power Systems. DSC 2019: 1-8 - [c198]Siqi Ma, Elisa Bertino, Surya Nepal, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [c197]Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen, Jiayun Xu:
DroidEvolver: Self-Evolving Android Malware Detection System. EuroS&P 2019: 47-62 - [c196]Wenxiu Ding, Zheng Yan, Xinren Qian, Robert H. Deng:
Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control. GLOBECOM 2019: 1-7 - [c195]Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, Robert H. Deng:
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment. NDSS 2019 - [c194]Xueqin Liang, Zheng Yan, Wenxiu Ding, Robert H. Deng:
Game Theoretical Study on a Client-Controlled Deduplication Scheme. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1154-1161 - [p1]Zheng Yan, Xueqin Liang, Wenxiu Ding, Xixun Yu, Mingjun Wang, Robert H. Deng:
Encrypted Big Data Deduplication in Cloud Storage. Smart Data 2019: 63-92 - [e14]Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung:
Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11464, Springer 2019, ISBN 978-3-030-21567-5 [contents] - [e13]Jianying Zhou, Robert H. Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11605, Springer 2019, ISBN 978-3-030-29728-2 [contents] - [e12]Yi Mu, Robert H. Deng, Xinyi Huang:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings. Lecture Notes in Computer Science 11829, Springer 2019, ISBN 978-3-030-31577-1 [contents] - [i22]Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng:
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing. CoRR abs/1907.10218 (2019) - [i21]Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang:
Lightning-Fast and Privacy-Preserving Outsourced Computation in the Cloud. CoRR abs/1909.12540 (2019) - [i20]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-Preserving Network Path Validation. IACR Cryptol. ePrint Arch. 2019: 407 (2019) - [i19]Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. IACR Cryptol. ePrint Arch. 2019: 743 (2019) - 2018
- [j157]Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, Dong Zheng:
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain. IEEE Access 6: 31077-31087 (2018) - [j156]Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal:
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Comput. Networks 133: 157-165 (2018) - [j155]Dong Shen, Zhoujun Li, Xiaojing Su, Jinxin Ma, Robert Huijie Deng:
TinyVisor: An extensible secure framework on android platforms. Comput. Secur. 72: 145-162 (2018) - [j154]Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng:
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. Cybersecur. 1(1): 7 (2018) - [j153]Ximeng Liu, Robert H. Deng, Yang Yang, Ngoc Hieu Tran, Shangping Zhong:
Hybrid privacy-preserving clinical decision support system in fog-cloud computing. Future Gener. Comput. Syst. 78: 825-837 (2018) - [j152]Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-based cloud storage with secure provenance over encrypted data. Future Gener. Comput. Syst. 79: 461-472 (2018) - [j151]Yujue Wang, HweeHwa Pang, Robert H. Deng:
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management. Int. J. Inf. Sec. 17(3): 347-363 (2018) - [j150]Yinghui Zhang, Dong Zheng, Robert H. Deng:
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control. IEEE Internet Things J. 5(3): 2130-2145 (2018) - [j149]Jiangang Shu, Ximeng Liu, Xiaohua Jia, Kan Yang, Robert H. Deng:
Anonymous Privacy-Preserving Task Matching in Crowdsourcing. IEEE Internet Things J. 5(4): 3068-3078 (2018) - [j148]Yang Yang, Ximeng Liu, Robert H. Deng:
Expressive query over outsourced encrypted data. Inf. Sci. 442-443: 33-53 (2018) - [j147]Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng:
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462: 262-277 (2018) - [j146]Yinghui Zhang, Robert H. Deng, Gang Han, Dong Zheng:
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J. Netw. Comput. Appl. 123: 89-100 (2018) - [j145]Jiangang Shu, Ximeng Liu, Yinghui Zhang, Xiaohua Jia, Robert H. Deng:
Dual-side privacy-preserving task matching for spatial crowdsourcing. J. Netw. Comput. Appl. 123: 101-111 (2018) - [j144]Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng:
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE Trans. Dependable Secur. Comput. 15(1): 27-39 (2018) - [j143]Yan Li, Yingjiu Li, Ke Xu, Qiang Yan, Robert H. Deng:
Empirical Study of Face Authentication Systems Under OSNFD Attacks. IEEE Trans. Dependable Secur. Comput. 15(2): 231-245 (2018) - [j142]Hui Cui, Zhiguo Wan, Robert H. Deng, Guilin Wang, Yingjiu Li:
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud. IEEE Trans. Dependable Secur. Comput. 15(3): 409-422 (2018) - [j141]Zhiguo Wan, Robert H. Deng:
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 15(6): 1083-1095 (2018) - [j140]Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng:
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(8): 2101-2113 (2018) - [j139]Yang Yang, Ximeng Liu, Robert H. Deng:
Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things. IEEE Trans. Ind. Informatics 14(8): 3610-3617 (2018) - [j138]Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li:
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices. IEEE Trans. Ind. Informatics 14(8): 3724-3732 (2018) - [j137]Yongdong Wu, Zhuo Wei, Jian Weng, Xin Li, Robert H. Deng:
Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Trans. Smart Grid 9(5): 4490-4502 (2018) - [j136]Yongdong Wu, Zhuo Wei, Jian Weng, Robert H. Deng:
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Trans. Veh. Technol. 67(6): 5287-5301 (2018) - [c193]Ximing Liu, Yingjiu Li, Robert H. Deng:
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings. ACSAC 2018: 53-65 - [c192]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching, Weiwei Liu:
Privacy-Preserving Remote User Authentication with k-Times Untraceability. Inscrypt 2018: 647-657 - [c191]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CODASPY 2018: 299-306 - [c190]Yangguang Tian, Yingjiu Li, Ximeng Liu, Robert H. Deng, Binanda Sengupta:
PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication. DSC 2018: 1-8 - [c189]Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen:
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. EuroS&P 2018: 473-487 - [c188]Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng:
SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing. GLOBECOM 2018: 1-6 - [c187]Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Yang Yang, Yinghui Zhang:
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains. TrustCom/BigDataSE 2018: 958-963 - [e11]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - [i18]Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng:
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. CoRR abs/1801.04372 (2018) - [i17]Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. CoRR abs/1810.07665 (2018) - 2017
- [j135]Zhuo Wei, Yanjiang Yang, Yongdong Wu, Jian Weng, Robert H. Deng:
HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive. IEEE Access 5: 16314-16323 (2017) - [j134]Zheng Yan, Robert H. Deng, Vijay Varadharajan:
Cryptography and Data Security in Cloud Computing. Inf. Sci. 387: 53-55 (2017) - [j133]Baodong Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu:
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman. Inf. Sci. 406: 1-11 (2017) - [j132]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Encrypted data processing with Homomorphic Re-Encryption. Inf. Sci. 409: 35-55 (2017) - [j131]Yujue Wang, HweeHwa Pang, Ngoc Hieu Tran, Robert H. Deng:
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Inf. Sci. 414: 289-305 (2017) - [j130]Yao Cheng, Yingjiu Li, Robert H. Deng, Lingyun Ying, Wei He:
A study on a feasible no-root approach on Android. J. Comput. Secur. 25(3): 231-253 (2017) - [j129]Siqi Ma, Junzuo Lai, Robert H. Deng, Xuhua Ding:
Adaptable key-policy attribute-based encryption with time interval. Soft Comput. 21(20): 6191-6200 (2017) - [j128]Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang:
Universally Composable RFID Mutual Authentication. IEEE Trans. Dependable Secur. Comput. 14(1): 83-94 (2017) - [j127]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng:
A Secure, Usable, and Transparent Middleware for Permission Managers on Android. IEEE Trans. Dependable Secur. Comput. 14(4): 350-362 (2017) - [j126]Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert H. Deng, Jiankun Hu:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. IEEE Trans. Inf. Forensics Secur. 12(4): 940-952 (2017) - [j125]Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert H. Deng:
Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems. IEEE Trans. Intell. Transp. Syst. 18(4): 814-823 (2017) - [j124]Ximeng Liu, Baodong Qin, Robert H. Deng, Yingjiu Li:
An Efficient Privacy-Preserving Outsourced Computation over Public Data. IEEE Trans. Serv. Comput. 10(5): 756-770 (2017) - [c186]Hui Cui, Robert H. Deng, Joseph K. Liu, Yingjiu Li:
Attribute-Based Encryption with Expressive and Authorized Keyword Search. ACISP (1) 2017: 106-126 - [c185]Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng:
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses. AsiaCCS 2017: 327-333 - [c184]Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng:
Fair deposits against double-spending for Bitcoin transactions. DSC 2017: 44-51 - [c183]Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert H. Deng:
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. ESORICS (2) 2017: 229-246 - [c182]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Secure Encrypted Data Deduplication with Ownership Proof and User Revocation. ICA3PP 2017: 297-312 - [c181]Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng:
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). ISPEC 2017: 638-647 - [c180]Hui Cui, Man Ho Au, Baodong Qin, Robert H. Deng, Xun Yi:
Fuzzy Public-Key Encryption Based on Biometric Data. ProvSec 2017: 400-409 - [c179]Zhi Yuan Poh, Hui Cui, Robert H. Deng, Yingjiu Li:
Attribute-Based Secure Messaging in the Public Cloud. SG-CRC 2017: 86-96 - [e10]Robert H. Deng, Jian Weng, Kui Ren, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 198, Springer 2017, ISBN 978-3-319-59607-5 [contents] - 2016
- [j123]Wenxiu Ding, Zheng Yan, Robert H. Deng:
A Survey on Future Internet Security Architectures. IEEE Access 4: 4374-4393 (2016) - [j122]Hui Cui, Robert H. Deng:
Revocable and Decentralized Attribute-Based Encryption. Comput. J. 59(8): 1220-1235 (2016) - [j121]Hui Cui, Guilin Wang, Robert H. Deng, Baodong Qin:
Escrow free attribute-based signature with self-revealability. Inf. Sci. 367-368: 660-672 (2016) - [j120]Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li:
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur. Commun. Networks 9(18): 4897-4913 (2016) - [j119]Zheng Yan, Wenxiu Ding, Xixun Yu, Haiqi Zhu, Robert H. Deng:
Deduplication on Encrypted Big Data in Cloud. IEEE Trans. Big Data 2(2): 138-150 (2016) - [j118]Ximeng Liu, Baodong Qin, Robert H. Deng, Rongxing Lu, Jianfeng Ma:
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains. IEEE Trans. Computers 65(12): 3567-3579 (2016) - [j117]Kai He, Jian Weng, Robert H. Deng, Joseph K. Liu:
On the security of two identity-based conditional proxy re-encryption schemes. Theor. Comput. Sci. 652: 18-27 (2016) - [j116]Ke Xu, Yingjiu Li, Robert H. Deng:
ICCDetector: ICC-Based Malware Detection on Android. IEEE Trans. Inf. Forensics Secur. 11(6): 1252-1264 (2016) - [j115]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Jian Weng:
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys. IEEE Trans. Inf. Forensics Secur. 11(11): 2401-2414 (2016) - [j114]Ximeng Liu, Robert H. Deng, Wenxiu Ding, Rongxing Lu, Baodong Qin:
Privacy-Preserving Outsourced Calculation on Floating Point Numbers. IEEE Trans. Inf. Forensics Secur. 11(11): 2513-2527 (2016) - [j113]Zheng Yan, Jun Liu, Robert H. Deng, Francisco Herrera:
Editorial: Trust Management for Multimedia Big Data. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 57:1-57:2 (2016) - [j112]Zhuo Wei, Zheng Yan, Yongdong Wu, Robert Huijie Deng:
Trustworthy Authentication on Scalable Surveillance Video with Background Model Support. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 64:1-64:20 (2016) - [c178]Kai He, Jian Weng, Man Ho Au, Yijun Mao, Robert H. Deng:
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. ACISP (2) 2016: 207-222 - [c177]Yao Cheng, Yingjiu Li, Robert H. Deng:
A Feasible No-Root Approach on Android. ACISP (2) 2016: 481-489 - [c176]Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng:
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. AsiaCCS 2016: 247-255 - [c175]Ngoc Hieu Tran, HweeHwa Pang, Robert H. Deng:
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data. AsiaCCS 2016: 605-616 - [c174]Siqi Ma, David Lo, Teng Li, Robert H. Deng:
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications. AsiaCCS 2016: 711-722 - [c173]Hui Cui, Robert H. Deng, Yingjiu Li, Baodong Qin:
Server-Aided Revocable Attribute-Based Encryption. ESORICS (2) 2016: 570-587 - [c172]Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng:
CCA-Secure Keyed-Fully Homomorphic Encryption. Public Key Cryptography (1) 2016: 70-98 - [c171]Hui Cui, Robert H. Deng, Guowei Wu, Junzuo Lai:
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures. ProvSec 2016: 19-38 - [c170]Dong Shen, Zhangkai Zhang, Xuhua Ding, Zhoujun Li, Robert H. Deng:
H-Binder: A Hardened Binder Framework on Android Systems. SecureComm 2016: 24-43 - [c169]Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li:
Attribute-Based Encryption with Granular Revocation. SecureComm 2016: 165-181 - [c168]Ngoc Hieu Tran, Robert H. Deng, HweeHwa Pang:
Privacy-Preserving and Verifiable Data Aggregation. SG-CRC 2016: 115-122 - [e9]Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - [i16]Daoyuan Wu, Debin Gao, Yingjiu Li, Robert H. Deng:
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications. CoRR abs/1609.03322 (2016) - 2015
- [b2]Yingjiu Li, Qiang Yan, Robert H. Deng:
Leakage Resilient Password Systems. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-17502-7, pp. 1-64 - [j111]Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng:
Leakage-resilient password entry: Challenges, design, and evaluation. Comput. Secur. 48: 196-211 (2015) - [j110]Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng:
Privacy leakage analysis in online social networks. Comput. Secur. 49: 239-254 (2015) - [j109]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
Efficient revocable certificateless encryption against decryption key exposure. IET Inf. Secur. 9(3): 158-166 (2015) - [j108]Elisa Bertino, Robert H. Deng, Xinyi Huang, Jianying Zhou:
Security and privacy of electronic health information systems. Int. J. Inf. Sec. 14(6): 485-486 (2015) - [j107]Jialie Shen, Robert H. Deng, Zhiyong Cheng, Liqiang Nie, Shuicheng Yan:
On robust image spam filtering via comprehensive visual modeling. Pattern Recognit. 48(10): 3227-3238 (2015) - [j106]Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [j105]Yongdong Wu, Zhigang Zhao, Feng Bao, Robert H. Deng:
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks. IEEE Trans. Inf. Forensics Secur. 10(1): 168-177 (2015) - [j104]Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma:
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 10(7): 1384-1393 (2015) - [c167]Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
Efficient Virtualization-Based Application Protection Against Untrusted Operating System. AsiaCCS 2015: 345-356 - [c166]Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng:
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication. CCS 2015: 1558-1569 - [c165]Siqi Ma, Shaowei Wang, David Lo, Robert Huijie Deng, Cong Sun:
Active Semi-supervised Approach for Checking App Behavior against Its Description. COMPSAC 2015: 179-184 - [c164]Baodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu:
Server-Aided Revocable Identity-Based Encryption. ESORICS (1) 2015: 286-304 - [c163]Swee-Won Lo, Zhuo Wei, Robert H. Deng, Xuhua Ding:
On Security of Content-Based Video Stream Authentication. ESORICS (1) 2015: 366-383 - [c162]Zhuo Wei, Swee-Won Lo, Yu Liang, Tieyan Li, Jialie Shen, Robert H. Deng:
Automatic Accident Detection and Alarm System. ACM Multimedia 2015: 781-784 - [c161]Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu:
Multidimensional Context Awareness in Mobile Devices. MMM (2) 2015: 38-49 - [c160]Zhiguo Wan, Robert H. Deng, David Lee:
Electronic Contract Signing Without Using Trusted Third Party. NSS 2015: 386-394 - [c159]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 - [c158]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng:
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. WISEC 2015: 6:1-6:6 - [i15]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. IACR Cryptol. ePrint Arch. 2015: 3 (2015) - [i14]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2015: 297 (2015) - 2014
- [j103]Dehua Zhou, Jian Weng, Chaowen Guan, Robert H. Deng, Min-Rong Chen, Kefei Chen:
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext. Sci. China Inf. Sci. 57(7): 1-5 (2014) - [j102]Zheng Yan, Guojun Wang, Valtteri Niemi, Robert H. Deng:
Editorial: Special issue on trust in cyber, physical and social computing. Comput. Secur. 47: 1-2 (2014) - [j101]Robert H. Deng, Yang Xiang, Man Ho Au:
Cryptography in Cloud Computing. Future Gener. Comput. Syst. 30: 90 (2014) - [j100]Chaowen Guan, Jian Weng, Robert H. Deng, Min-Rong Chen, Dehua Zhou:
Unforgeability of an improved certificateless signature scheme in the standard model. IET Inf. Secur. 8(5): 273-276 (2014) - [j99]Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng, Chaowen Guan, Qiang Yan:
Towards semantically secure outsourcing of association rule mining on categorical data. Inf. Sci. 267: 267-286 (2014) - [j98]Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding:
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks. J. Comput. Syst. Sci. 80(3): 520-532 (2014) - [j97]Robert Huijie Deng, Xuhua Ding, Yongdong Wu, Zhuo Wei:
Efficient block-based transparent encryption for H.264/SVC bitstreams. Multim. Syst. 20(2): 165-178 (2014) - [j96]Robert H. Deng, Xuhua Ding, Swee-Won Lo:
Efficient authentication and access control of scalable multimedia streams over packet-lossy networks. Secur. Commun. Networks 7(3): 611-625 (2014) - [j95]Zhuo Wei, Yongdong Wu, Robert H. Deng, Xuhua Ding:
A Hybrid Scheme for Authenticating Scalable Video Codestreams. IEEE Trans. Inf. Forensics Secur. 9(4): 543-553 (2014) - [j94]Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng:
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(2): 468-477 (2014) - [c157]Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng:
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. AsiaCCS 2014: 239-248 - [c156]Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng:
Understanding OSN-based facial disclosure against face authentication systems. AsiaCCS 2014: 413-424 - [c155]Junzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng:
Verifiable Computation on Outsourced Encrypted Data. ESORICS (1) 2014: 273-291 - [c154]Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng:
Authorized Keyword Search on Encrypted Data. ESORICS (1) 2014: 419-435 - [c153]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. EUROCRYPT 2014: 77-92 - [c152]Su Mon Kywe, Yingjiu Li, Robert H. Deng, Jason I. Hong:
Detecting Camouflaged Applications on Mobile Application Markets. ICISC 2014: 241-254 - [c151]Swee-Won Lo, Zhuo Wei, Xuhua Ding, Robert H. Deng:
Generic attacks on content-based video stream authentication. ICME Workshops 2014: 1-2 - [c150]Swee-Won Lo, Zhuo Wei, Xuhua Ding, Robert H. Deng:
Generic attacks on content-based video stream authentication. ICME Workshops 2014: 1-6 - [c149]Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, Robert H. Deng:
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. NDSS 2014 - [e8]Robert H. Deng, Elaine Shi, Kui Ren:
Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014. ACM 2014, ISBN 978-1-4503-2805-0 [contents] - 2013
- [b1]Yingjiu Li, Robert H. Deng, Elisa Bertino:
RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01212-9 - [j93]Haibin Cai, Chao Peng, Robert H. Deng, Linhua Jiang:
A novel service-oriented intelligent seamless migration algorithm and application for pervasive computing environments. Future Gener. Comput. Syst. 29(8): 1919-1930 (2013) - [j92]Junzuo Lai, Robert H. Deng, Chaowen Guan, Jian Weng:
Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 8(8): 1343-1354 (2013) - [j91]Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows. ACM Trans. Inf. Syst. Secur. 16(2): 6 (2013) - [j90]Yongdong Wu, Zhuo Wei, Robert H. Deng:
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks. IEEE Trans. Multim. 15(4): 778-788 (2013) - [j89]Zhiguo Wan, Jun-e Liu, Rui Zhang, Robert H. Deng:
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting. IEEE Trans. Multim. 15(6): 1353-1364 (2013) - [c148]Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou:
Launching Generic Attacks on iOS with Approved Third-Party Applications. ACNS 2013: 272-289 - [c147]Robert H. Deng:
Secure access to outsourced data. SCC@ASIACCS 2013: 1-2 - [c146]Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng:
Designing leakage-resilient password entry on touchscreen mobile devices. AsiaCCS 2013: 37-48 - [c145]Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen:
Expressive search on encrypted data. AsiaCCS 2013: 243-252 - [c144]Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng:
Accountable Authority Identity-Based Encryption with Public Traceability. CT-RSA 2013: 326-342 - [c143]Zhuo Wei, Robert H. Deng, Jialie Shen, Yongdong Wu, Xuhua Ding, Swee-Won Lo:
Technique for authenticating H.264/SVC streams in surveillance applications. ICME Workshops 2013: 1-4 - [c142]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
Revocable Identity-Based Signature without Pairing. INCoS 2013: 363-365 - [c141]Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg:
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. ISPEC 2013: 174-188 - [c140]Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Robert H. Deng:
Comparing Mobile Privacy Protection through Cross-Platform Applications. NDSS 2013 - [c139]Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng:
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks. NSS 2013: 671-677 - [c138]Junzuo Lai, Robert H. Deng, Yanjiang Yang, Jian Weng:
Adaptable Ciphertext-Policy Attribute-Based Encryption. Pairing 2013: 199-214 - [e7]Robert H. Deng, Tao Feng:
Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings. Lecture Notes in Computer Science 7863, Springer 2013, ISBN 978-3-642-38032-7 [contents] - [i13]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
A revocable certificateless signature scheme. IACR Cryptol. ePrint Arch. 2013: 53 (2013) - 2012
- [j88]Jie Shi, Yingjiu Li, Robert H. Deng:
A secure and efficient discovery service system in EPCglobal network. Comput. Secur. 31(8): 870-885 (2012) - [j87]Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou:
A Survey on Privacy Frameworks for RFID Authentication. IEICE Trans. Inf. Syst. 95-D(1): 2-11 (2012) - [j86]Dengpan Ye, Zhuo Wei, Xuhua Ding, Robert H. Deng:
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory. Int. J. Comput. Intell. Syst. 5(5): 953-963 (2012) - [j85]Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao:
Detecting node replication attacks in wireless sensor networks: A survey. J. Netw. Comput. Appl. 35(3): 1022-1034 (2012) - [j84]Zheng Yan, Peng Zhang, Robert H. Deng:
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications. Pers. Ubiquitous Comput. 16(5): 485-506 (2012) - [j83]Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao:
Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Networks 5(5): 496-507 (2012) - [j82]Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng:
Enhanced authentication for commercial video services. Secur. Commun. Networks 5(11): 1248-1259 (2012) - [j81]Zhuo Wei, Yongdong Wu, Xuhua Ding, Robert H. Deng:
A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Signal Process. Image Commun. 27(9): 1011-1024 (2012) - [j80]Zhiguo Wan, Jun-e Liu, Robert H. Deng:
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 7(2): 743-754 (2012) - [c137]Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao:
A New Framework for Privacy of RFID Path Authentication. ACNS 2012: 473-488 - [c136]Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng:
Dynamic Secure Cloud Storage with Provenance. Cryptography and Security 2012: 442-464 - [c135]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Expressive CP-ABE with partially hidden access structures. AsiaCCS 2012: 18-19 - [c134]Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu:
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption. Communications and Multimedia Security 2012: 72-86 - [c133]Jie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng:
SecDS: a secure EPC discovery service system in EPCglobal network. CODASPY 2012: 267-274 - [c132]Yongdong Wu, Robert H. Deng:
A Pollution Attack to Public-key Watermarking Schemes. ICME 2012: 230-235 - [c131]Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng:
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability. NDSS 2012 - [c130]Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding:
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. NSS 2012: 192-205 - [c129]Jie Shi, Yingjiu Li, Robert H. Deng, Kevin Chiew:
Design and Implementation of a Secure Prototype for EPCglobal Network Services. RFIDSec Asia 2012: 45-56 - 2011
- [j79]Qi Zhang, Yi Mu, Minjie Zhang, Robert H. Deng:
Secure mobile agents with controlled resources. Concurr. Comput. Pract. Exp. 23(12): 1348-1366 (2011) - [j78]Robert H. Deng, Jari Veijalainen, Shiguo Lian, Dimitris Kanellopoulos:
Editorial: special issue on ubiquitous electronic commerce systems. Electron. Commer. Res. 11(1): 1-4 (2011) - [j77]Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng:
Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method. Int. J. Comput. Intell. Syst. 4(5): 777-787 (2011) - [j76]Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao:
Secure localization with attack detection in wireless sensor networks. Int. J. Inf. Sec. 10(3): 155-171 (2011) - [j75]Jian Weng, Guoxiang Yao, Robert H. Deng, Min-Rong Chen, Xiangxue Li:
Cryptanalysis of a certificateless signcryption scheme in the standard model. Inf. Sci. 181(3): 661-667 (2011) - [j74]Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A zero-knowledge based framework for RFID privacy. J. Comput. Secur. 19(6): 1109-1146 (2011) - [j73]Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. J. Internet Serv. Inf. Secur. 1(2/3): 74-88 (2011) - [j72]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Secur. Commun. Networks 4(1): 11-22 (2011) - [j71]Xuhua Ding, Yanjiang Yang, Robert H. Deng:
Database Access Pattern Protection Without Full-Shuffles. IEEE Trans. Inf. Forensics Secur. 6(1): 189-201 (2011) - [j70]Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng:
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. IEEE Trans. Inf. Forensics Secur. 6(2): 498-512 (2011) - [j69]Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma:
On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4): 30:1-30:23 (2011) - [j68]Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng:
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. IEEE Trans. Parallel Distributed Syst. 22(8): 1390-1397 (2011) - [c128]Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219 - [c127]Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng:
Secure mobile subscription of sensor-encrypted data. AsiaCCS 2011: 228-237 - [c126]Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li:
A software-based root-of-trust primitive on multicore platforms. AsiaCCS 2011: 334-343 - [c125]Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
DriverGuard: A Fine-Grained Protection on I/O Flows. ESORICS 2011: 227-244 - [c124]Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao:
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. ICICS 2011: 306-318 - [c123]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Fully Secure Cipertext-Policy Hiding CP-ABE. ISPEC 2011: 24-39 - [c122]Junzuo Lai, Robert H. Deng, Shengli Liu:
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. Public Key Cryptography 2011: 228-245 - [c121]Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. ProvSec 2011: 257-265 - [c120]Jin Han, Qiang Yan, Robert H. Deng, Debin Gao:
On Detection of Erratic Arguments. SecureComm 2011: 172-189 - [c119]Yongdong Wu, Robert H. Deng:
Zero-error watermarking on jpeg images by shuffling huffman tree nodes. VCIP 2011: 1-4 - 2010
- [j67]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3): 593-606 (2010) - [j66]Changshe Ma, Jian Weng, Yingjiu Li, Robert H. Deng:
Efficient discrete logarithm based multi-signature scheme in the plain public key model. Des. Codes Cryptogr. 54(2): 121-133 (2010) - [j65]Jian Weng, Min-Rong Chen, Kefei Chen, Robert H. Deng:
Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(4): 854-856 (2010) - [j64]Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao:
Time-Bound Hierarchical Key Assignment: An Overview. IEICE Trans. Inf. Syst. 93-D(5): 1044-1052 (2010) - [j63]Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng, Haixia Yao:
Achieving high security and efficiency in RFID-tagged supply chains. Int. J. Appl. Cryptogr. 2(1): 3-12 (2010) - [j62]Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong Wang:
A new hardware-assisted PIR with O(n) shuffle cost. Int. J. Inf. Sec. 9(4): 237-252 (2010) - [j61]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen:
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Inf. Sci. 180(24): 5077-5089 (2010) - [j60]Yongdong Wu, Robert H. Deng:
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes. J. Comput. Sci. Technol. 25(2): 362-374 (2010) - [j59]Junzuo Lai, Wen Tao Zhu, Robert H. Deng, Shengli Liu, Weidong Kou:
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. J. Comput. Sci. Technol. 25(4): 793-806 (2010) - [j58]Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao:
Shifting Inference Control to User Side: Architecture and Protocol. IEEE Trans. Dependable Secur. Comput. 7(2): 189-202 (2010) - [j57]Yongdong Wu, Zhou Wei, Haixia Yao, Zhigang Zhao, Lek Heng Ngoh, Robert H. Deng, Shengsheng Yu:
TeleOph: a secure real-time teleophthalmology system. IEEE Trans. Inf. Technol. Biomed. 14(5): 1259-1266 (2010) - [c118]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Revisiting Unpredictability-Based RFID Privacy Models. ACNS 2010: 475-492 - [c117]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. AFRICACRYPT 2010: 316-332 - [c116]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based encryption for wireless sensor network. AsiaCCS 2010: 337-340 - [c115]Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou:
Efficient CCA-Secure PKE from Identity-Based Techniques. CT-RSA 2010: 132-147 - [c114]Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. ESORICS 2010: 1-18 - [c113]Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng, Tieyan Li:
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. ICISS 2010: 246-260 - [c112]Kevin Chiew, Yingjiu Li, Tieyan Li, Robert H. Deng, Manfred Aigner:
Time cost evaluation for executing RFID authentication protocols. IOT 2010 - [e6]Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang:
Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings. Lecture Notes in Computer Science 6047, Springer 2010, ISBN 978-3-642-12826-4 [contents] - [i12]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based Encryption for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2010: 2 (2010) - [i11]Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. IACR Cryptol. ePrint Arch. 2010: 59 (2010) - [i10]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 265 (2010)
2000 – 2009
- 2009
- [j56]Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng:
Multiuser private queries over encrypted databases. Int. J. Appl. Cryptogr. 1(4): 309-319 (2009) - [j55]Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel, Ming Gu:
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. J. Comput. Sci. Technol. 24(1): 138-151 (2009) - [j54]Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-preserving rental services using one-show anonymous credentials. Secur. Commun. Networks 2(6): 531-545 (2009) - [j53]Robert H. Deng, Yanjiang Yang:
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications. ACM Trans. Multim. Comput. Commun. Appl. 5(4): 28:1-28:20 (2009) - [c111]Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng:
Conditional Proxy Broadcast Re-Encryption. ACISP 2009: 327-342 - [c110]Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li:
RFID privacy: relation between two notions, minimal condition, and efficient construction. CCS 2009: 54-65 - [c109]Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai:
Conditional proxy re-encryption secure against chosen-ciphertext attack. AsiaCCS 2009: 322-332 - [c108]Jin Han, Debin Gao, Robert H. Deng:
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. DIMVA 2009: 127-146 - [c107]Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng:
Insights into Malware Detection and Prevention on Mobile Phones. FGIT-SecTech 2009: 242-249 - [c106]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149 - [c105]Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng:
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. ICICS 2009: 150-164 - [c104]Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng:
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. ICISS 2009: 71-85 - [c103]Kar Way Tan, Robert H. Deng:
Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. ICWS 2009: 67-74 - [c102]Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert H. Deng, Yao Guo, Weizhong Shao:
Remote Attestation on Function Execution (Work-in-Progress). INTRUST 2009: 60-72 - [c101]Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou:
RSA-Based Certificateless Public Key Encryption. ISPEC 2009: 24-34 - [c100]Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng:
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383 - [c99]Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu:
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395 - [c98]Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 - [c97]Qi Zhang, Yi Mu, Minjie Zhang, Robert Huijie Deng:
Secure Mobile Agents with Designated Hosts. NSS 2009: 286-293 - [c96]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. SecureComm 2009: 285-295 - [c95]Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58 - [i9]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2009: 189 (2009) - 2008
- [j52]Tieyan Li, Guilin Wang, Robert H. Deng:
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. J. Softw. 3(3): 1-10 (2008) - [j51]Tieyan Li, Robert H. Deng, Guilin Wang:
The security and improvement of an ultra-lightweight RFID authentication protocol. Secur. Commun. Networks 1(2): 135-146 (2008) - [c94]Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen:
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17 - [c93]Liang Gu, Xuhua Ding, Robert Huijie Deng, Bing Xie, Hong Mei:
Remote attestation on program execution. STC 2008: 11-20 - [c92]Yanjiang Yang, Feng Bao, Robert H. Deng:
Efficient Client-to-Client Password Authenticated Key Exchange. EUC (2) 2008: 202-207 - [c91]Huafei Zhu, Feng Bao, Robert H. Deng:
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641 - [c90]Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei:
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. ICYCS 2008: 2347-2353 - [c89]Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 - [c88]Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao:
An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 - [c87]Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng:
Distinguishing between FE and DDoS Using Randomness Check. ISC 2008: 131-145 - [i8]Yongdong Wu, Robert H. Deng:
On the Security of Fully Collusion Resistant Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2008: 450 (2008) - [i7]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xu An Wang:
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2008: 509 (2008) - 2007
- [j50]Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda:
Access control protocols with two-layer architecture for wireless networks. Comput. Networks 51(3): 655-670 (2007) - [j49]Yongdong Wu, Di Ma, Robert H. Deng:
Flexible Access Control to JPEG 2000 Image Code-Streams. IEEE Trans. Multim. 9(6): 1314-1324 (2007) - [c86]Tieyan Li, Robert H. Deng:
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. ARES 2007: 238-245 - [c85]Yongdong Wu, Feng Bao, Robert H. Deng:
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183 - [c84]Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau:
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481 - [c83]Yanjiang Yang, Yingjiu Li, Robert H. Deng:
New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258 - [c82]Feng Bao, Robert H. Deng:
Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. GLOBECOM 2007: 188-192 - [c81]Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel:
n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. ICICS 2007: 31-43 - [c80]Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192 - [c79]Robert H. Deng, Yanjiang Yang:
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. ISPEC 2007: 284-300 - 2006
- [j48]Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng:
Routing optimization security in mobile IPv6. Comput. Networks 50(13): 2401-2419 (2006) - [j47]Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng:
A secure extension of the Kwak-Moon group signcryption scheme. Comput. Secur. 25(6): 435-444 (2006) - [j46]Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao:
Three architectures for trusted data dissemination in edge computing. Data Knowl. Eng. 58(3): 381-409 (2006) - [j45]Jianying Zhou, Feng Bao, Robert H. Deng:
Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006) - [j44]Yanjiang Yang, Robert H. Deng, Feng Bao:
A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Secur. Comput. 3(2): 105-114 (2006) - [j43]Yongdong Wu, Robert H. Deng:
Scalable authentication of MPEG-4 streams. IEEE Trans. Multim. 8(1): 152-161 (2006) - [j42]Kui Ren, Wenjing Lou, Kwangjo Kim, Robert H. Deng:
A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Trans. Veh. Technol. 55(4): 1373-1384 (2006) - [j41]Zhiguo Wan, Feng Bao, Robert H. Deng, Akkihebbal L. Ananda:
Security analysis on a conference scheme for mobile communications. IEEE Trans. Wirel. Commun. 5(6): 1238-1240 (2006) - [c78]Yingjiu Li, Robert Huijie Deng:
Publicly verifiable ownership protection for relational databases. AsiaCCS 2006: 78-89 - [c77]Yanjiang Yang, Robert H. Deng, Feng Bao:
Fortifying password authentication in integrated healthcare delivery systems. AsiaCCS 2006: 255-265 - [c76]Yanjiang Yang, Robert H. Deng, Feng Bao:
Practical private data matching deterrent to spoofing attacks. CIKM 2006: 852-853 - [c75]Daniel J. T. Chong, Robert H. Deng:
Privacy-enhanced superdistribution of layered content with trusted access control. Digital Rights Management Workshop 2006: 37-44 - [c74]Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware. ESORICS 2006: 49-64 - [c73]Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen:
Rights Protection for Data Cubes. ISC 2006: 359-372 - [c72]Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks. SECON 2006: 70-79 - [c71]Yingjiu Li, Haibing Lu, Robert H. Deng:
Practical Inference Control for Data Cubes (Extended Abstract). S&P 2006: 115-120 - [c70]Ying Qiu, Jianying Zhou, Feng Bao, Robert H. Deng:
Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830 - [c69]Zhiguo Wan, Bo Zhu, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda:
Efficient key tree construction for group key agreement in ad hoc networks. WCNC 2006: 652-658 - [e5]Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou:
Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings. Lecture Notes in Computer Science 3903, Springer 2006, ISBN 3-540-33052-6 [contents] - [i6]Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware. IACR Cryptol. ePrint Arch. 2006: 208 (2006) - 2005
- [j40]Feng Bao, Robert H. Deng:
Protocols that hide user's preferences in electronic transactions. Comput. Networks 48(4): 503-515 (2005) - [j39]Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang:
Efficient and robust key management for large mobile ad hoc networks. Comput. Networks 48(4): 657-682 (2005) - [j38]Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu:
Scalable trusted online dissemination of JPEG2000 images. Multim. Syst. 11(1): 60-67 (2005) - [j37]Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen:
New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. IEEE Trans. Computers 54(9): 1071-1080 (2005) - [j36]Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen:
New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. IEEE Trans. Computers 54(12): 1473-1483 (2005) - [j35]Yongdong Wu, Robert H. Deng:
Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Technol. 15(1): 161-163 (2005) - [j34]Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang:
Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans. Inf. Technol. Biomed. 9(4): 554-563 (2005) - [c68]Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Fix of an Anonymous Credential System. ACISP 2005: 537-547 - [c67]Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng:
Privacy and Ownership Preserving of Outsourced Medical Data. ICDE 2005: 521-532 - [c66]Shuhong Wang, Feng Bao, Robert H. Deng:
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. ICICS 2005: 53-60 - [c65]Huafei Zhu, Feng Bao, Robert H. Deng:
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219 - [c64]Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou:
Authenticating Query Results in Data Publishing. ICICS 2005: 376-388 - [c63]Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 - [c62]Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao:
Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. LCN 2005: 328-335 - [c61]Ying Qiu, Jianying Zhou, Robert H. Deng:
Security Analysis and Improvement of Return Routability Protocol. MADNES 2005: 174-181 - [c60]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
An efficient certified e-mail scheme suitable for wireless mobile environments. PIMRC 2005: 1994-1998 - [c59]Yanjiang Yang, Feng Bao, Robert H. Deng:
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112 - [c58]Yongdong Wu, Feng Bao, Robert H. Deng:
Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222 - [c57]Yongdong Wu, Tieyan Li, Robert H. Deng:
Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476 - [c56]Zhiguo Wan, Bo Zhu, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda:
DoS-resistant access control protocol with identity confidentiality for wireless networks. WCNC 2005: 1521-1526 - [c55]Yunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao:
Practical Zero-Knowledge Arguments from Sigma-Protocols. WINE 2005: 288-298 - [e4]Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou:
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings. Lecture Notes in Computer Science 3439, Springer 2005, ISBN 3-540-25584-2 [contents] - [e3]Jianying Zhou, Javier López, Robert H. Deng, Feng Bao:
Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings. Lecture Notes in Computer Science 3650, Springer 2005, ISBN 3-540-29001-X [contents] - [i5]Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng:
Generic yet Practical ZK Arguments from any Public-Coin HVZK. Electron. Colloquium Comput. Complex. TR05 (2005) - 2004
- [j33]Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim:
Highly reliable trust establishment scheme in ad hoc networks. Comput. Networks 45(6): 687-699 (2004) - [j32]Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng:
New efficient user identification and key distribution scheme providing enhanced security. Comput. Secur. 23(8): 697-704 (2004) - [j31]Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng:
A smart-card-enabled privacy preserving E-prescription system. IEEE Trans. Inf. Technol. Biomed. 8(1): 47-58 (2004) - [j30]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) - [c54]Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 - [c53]Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 - [c52]Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91 - [c51]Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519 - [c50]Yongdong Wu, Robert H. Deng:
Compliant encryption of jpeg2000 codestreanis. ICIP 2004: 3439-3442 - [c49]Yongdong Wu, Di Ma, Robert H. Deng:
Progressive protection of jpeg2000 codestreams. ICIP 2004: 3447-3450 - [c48]Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim:
On Security Notions for Steganalysis. ICISC 2004: 440-454 - [c47]Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao:
A Block Oriented Fingerprinting Scheme in Relational Database. ICISC 2004: 455-466 - [c46]Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon:
Security Analysis of Two Signcryption Schemes. ISC 2004: 123-133 - [c45]Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim:
On Security Notions of Steganographic Systems. IWDW 2004: 137-151 - [c44]Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Anonymous Secure Routing in Mobile Ad-Hoc Networks. LCN 2004: 102-108 - [c43]Guilin Wang, Jianying Zhou, Robert H. Deng:
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298 - [e2]Feng Bao, Robert H. Deng, Jianying Zhou:
Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Lecture Notes in Computer Science 2947, Springer 2004, ISBN 3-540-21018-0 [contents] - [i4]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2004: 54 (2004) - 2003
- [j29]Yongdong Wu, Robert H. Deng:
Content-aware authentication of motion JPEG2000 stream in lossy networks. IEEE Trans. Consumer Electron. 49(4): 792-801 (2003) - [c42]Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng:
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 - [c41]Robert H. Deng, Feng Bao:
An improved personal CA for personal area networks. GLOBECOM 2003: 1486-1490 - [c40]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 - [c39]Hongjun Wu, Feng Bao, Robert H. Deng:
An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87 - [c38]Jianying Zhou, Feng Bao, Robert H. Deng:
An Efficient Public-Key Framework. ICICS 2003: 88-99 - [c37]Yongdong Wu, Robert H. Deng:
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. ICICS 2003: 238-248 - [c36]Feng Bao, Robert H. Deng, Huafei Zhu:
Variations of Diffie-Hellman Problem. ICICS 2003: 301-312 - [c35]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319 - [c34]Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng:
Secure the image-based simulated telesurgery system. ISCAS (2) 2003: 596-599 - [c33]Jianying Zhou, Feng Bao, Robert H. Deng:
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110 - [c32]Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao:
A flexible and scalable authentication scheme for JPEG2000 image codestreams. ACM Multimedia 2003: 433-441 - [c31]Yanjiang Yang, Feng Bao, Robert H. Deng:
Flexible authentication of images. VCIP 2003: 1905-1911 - [i3]Huafei Zhu, Feng Bao, Robert H. Deng:
Computing of Trust in Distributed Networks. IACR Cryptol. ePrint Arch. 2003: 56 (2003) - [i2]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. IACR Cryptol. ePrint Arch. 2003: 196 (2003) - 2002
- [j28]Hongjun Wu, Feng Bao, Robert H. Deng:
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Informatica (Slovenia) 26(3) (2002) - [c30]Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Improvement of the Global Key Recovery System. ACISP 2002: 17-24 - [c29]Robert H. Deng, Jianying Zhou, Feng Bao:
Defending against redirect attacks in mobile IP. CCS 2002: 59-67 - [e1]Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou:
Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings. Lecture Notes in Computer Science 2513, Springer 2002, ISBN 3-540-00164-6 [contents] - [i1]Guilin Wang, Jianying Zhou, Robert H. Deng:
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. IACR Cryptol. ePrint Arch. 2002: 150 (2002) - 2001
- [c28]Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu:
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ACISP 2001: 190-205 - [c27]Feng Bao, Robert H. Deng:
Privacy Protection for Transactions of Digital Goods. ICICS 2001: 202-213 - [c26]Qibin Sun, Peirong Feng, Robert H. Deng:
An Optical Watermarking Solution for Authenticating Printed Documents. ITCC 2001: 65-70 - [c25]Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu:
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164 - [c24]Hongjun Wu, Feng Bao, Robert H. Deng:
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: 173-179 - 2000
- [j27]Jianying Zhou, Robert H. Deng:
On the validity of digital signatures. Comput. Commun. Rev. 30(2): 29-34 (2000) - [j26]X.-K. Wang, Robert H. Deng, Feng Bao:
Multicast Internet protocol. Comput. Commun. 23(11): 1047-1054 (2000) - [c23]Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111 - [c22]Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288 - [c21]Feng Bao, Robert H. Deng, Peirong Feng:
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. ICISC 2000: 162-170 - [c20]Jianying Zhou, Robert H. Deng, Feng Bao:
Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57 - [c19]Feng Bao, Robert H. Deng, Jianying Zhou:
Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460
1990 – 1999
- 1999
- [j25]Robert H. Deng:
Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. Comput. Commun. 22(6): 591 (1999) - [c18]Jianying Zhou, Robert H. Deng, Feng Bao:
Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269 - [c17]Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan:
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863 - [c16]Feng Bao, Robert H. Deng:
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Public Key Cryptography 1999: 1-11 - [c15]Qibin Sun, Jiankang Wu, Robert H. Deng:
Recovering modified watermarked images with reference to the original image. Security and Watermarking of Multimedia Contents 1999: 415-424 - 1998
- [c14]Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye:
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. ASIACRYPT 1998: 126-132 - [c13]Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye:
Improved Truncated Differential Attacks on SAFER. ASIACRYPT 1998: 133-147 - [c12]Feng Bao, Robert H. Deng:
A Signcryption Scheme with Signature Directly Verifiable by Public Key. Public Key Cryptography 1998: 55-59 - [c11]Feng Bao, Robert H. Deng, Wenbo Mao:
Efficient and Practical Fair Exchange Protocols with Off-Line TTP. S&P 1998: 77-85 - [c10]Robert H. Deng, Jian Hu, Feng Bao, Arcot Desai Narasimhalu:
A Ubiquitous Secure and Reliable Digital Data Depository System. WETICE 1998: 354-358 - 1997
- [j24]Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar:
Integrating Security in the CORBA Architecture. Theory Pract. Object Syst. 3(1): 3-13 (1997) - [c9]Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng:
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. ACISP 1997: 261-270 - [c8]Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair:
A New On-Line Cash Check Scheme. CCS 1997: 111-116 - [c7]Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng:
RSA-type Signatures in the Presence of Transient Faults. IMACC 1997: 155-160 - [c6]Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi:
Modified Finite Automata Public Key Cryptosystem. ISW 1997: 82-95 - [c5]Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, Arcot Desai Narasimhalu, Teow-Hin Ngair:
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Security Protocols Workshop 1997: 115-124 - 1996
- [j23]Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang:
Practical Protocols for Certified Electronic Mail. J. Netw. Syst. Manag. 4(3): 279-297 (1996) - 1995
- [j22]Robert H. Deng, Michael L. Lin:
A type I hybrid ARQ system with adaptive code rates. IEEE Trans. Commun. 43(2/3/4): 733-737 (1995) - [c4]Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar:
Integrating security in CORBA based object architectures. S&P 1995: 50-61 - 1994
- [j21]Kisenchand Ranai, Koon-Seng Lim, Robert H. Deng:
Simulating a Multimedia FDDI Backbone Network. Comput. J. 37(3): 188-198 (1994) - [j20]Koon-Seng Lim, Robert Huijie Deng, Kisenchand Ranai:
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems. Comput. Commun. 17(2): 83-93 (1994) - [j19]Koon-Seng Lim, Robert H. Deng, Kisenchand Ranai:
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. Comput. Commun. 17(4): 251-256 (1994) - [j18]Robert H. Deng:
Hybrid ARQ schemes employing coded modulation and sequence combining. IEEE Trans. Commun. 42(6): 2239-2245 (1994) - [j17]Yuanxing Li, Robert H. Deng, Xinmei Wang:
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Trans. Inf. Theory 40(1): 271-273 (1994) - 1993
- [j16]Jiangling Du, Robert H. Deng, Chi Chung Ko:
Performance Analysis of Interconnected LANs with Server/Client Configuration. Comput. Networks ISDN Syst. 25(12): 1321-1333 (1993) - [j15]Robert H. Deng, Wendy C. L. Chiew:
Effects of station buffer capacity on token ring network performance. Comput. Commun. 16(6): 366-375 (1993) - [j14]Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang:
Performance of a token-passing system with batch arrivals and its application to file transfers. Comput. Commun. 16(7): 422-431 (1993) - [j13]Chi Chung Ko, W. C. Wong, J. L. Du, Robert H. Deng, Kin Mun Lye:
Performance analysis of two bridged CSMA/CD networks. Comput. Commun. 16(8): 501-510 (1993) - [j12]Robert H. Deng, Renben Shu:
LAN-based medical visualization communication system. Comput. Commun. 16(8): 518-525 (1993) - [j11]Robert H. Deng, Aurel A. Lazar, Weiguo Wang:
A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks. IEEE J. Sel. Areas Commun. 11(9): 1438-1448 (1993) - [j10]Robert H. Deng:
Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels. IEEE Trans. Commun. 41(9): 1379-1387 (1993) - [c3]Robert H. Deng, Aurel A. Lazar, Weiguo Wang:
A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks. Integrated Network Management 1993: 697-708 - 1991
- [j9]Brigitte Berg, Robert H. Deng:
End-to-end performance of interconnected LANs. Comput. Commun. 14(2): 105-112 (1991) - [c2]Robert H. Deng, Wendy C. L. Chiew, Kuan-Tsae Huang:
Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations. INFOCOM 1991: 202-210 - [c1]Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang:
Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs. INFOCOM 1991: 1041-1049 - 1990
- [j8]Xian-Yu Zhang, Robert H. Deng:
Gateway Design for LAN Interconnection via ISDN. Comput. Networks ISDN Syst. 19(1): 43-51 (1990) - [j7]Steven S. Pietrobon, Robert H. Deng, Alain Lafanechére, Gottfried Ungerboeck, Daniel J. Costello Jr.:
Trellis-coded multidimensional phase modulation. IEEE Trans. Inf. Theory 36(1): 63-89 (1990)
1980 – 1989
- 1989
- [j6]Robert H. Deng, Daniel J. Costello Jr.:
High rate concatenated coding systems using bandwidth efficient trellis inner codes. IEEE Trans. Commun. 37(5): 420-427 (1989) - [j5]Laurent R. Lugand, Daniel J. Costello Jr., Robert H. Deng:
Parity retransmission hybrid ARQ using rate 1/2 convolutional codes on a nonstationary channel. IEEE Trans. Commun. 37(7): 755-765 (1989) - [j4]Robert H. Deng, Daniel J. Costello Jr.:
High rate concatenated coding systems using multidimensional bandwidth-efficient trellis inner codes. IEEE Trans. Commun. 37(10): 1091-1096 (1989) - 1988
- [j3]Robert H. Deng, Mark A. Herro:
DC-free coset codes. IEEE Trans. Inf. Theory 34(4): 786-792 (1988) - 1987
- [j2]Robert H. Deng, Daniel J. Costello Jr.:
Decoding of DBEC-TBED Reed-Solomon Codes. IEEE Trans. Computers 36(11): 1359-1363 (1987) - [j1]Robert H. Deng, Daniel J. Costello Jr.:
Reliability and Throughput Analysis of a Concatenated Coding Scheme. IEEE Trans. Commun. 35(7): 698-705 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint