Robert H. Deng

According to our database1, Robert H. Deng authored at least 360 papers between 1987 and 2018.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to security algorithms, protocols and systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control.
IEEE Trans. Vehicular Technology, 2018

Resonance Attacks on Load Frequency Control of Smart Grids.
IEEE Trans. Smart Grid, 2018

Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things.
IEEE Trans. Industrial Informatics, 2018

Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Industrial Informatics, 2018

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Information Forensics and Security, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Sec. Comput., 2018

Empirical Study of Face Authentication Systems Under OSNFD Attacks.
IEEE Trans. Dependable Sec. Comput., 2018

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Sec. Comput., 2018

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018

Expressive query over outsourced encrypted data.
Inf. Sci., 2018

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.
IEEE Internet of Things Journal, 2018

Anonymous Privacy-Preserving Task Matching in Crowdsourcing.
IEEE Internet of Things Journal, 2018

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management.
Int. J. Inf. Sec., 2018

Hybrid privacy-preserving clinical decision support system in fog-cloud computing.
Future Generation Comp. Syst., 2018

Attribute-based cloud storage with secure provenance over encrypted data.
Future Generation Comp. Syst., 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
CoRR, 2018

TinyVisor: An extensible secure framework on android platforms.
Computers & Security, 2018

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Computer Networks, 2018

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
An Efficient Privacy-Preserving Outsourced Computation over Public Data.
IEEE Trans. Services Computing, 2017

Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems.
IEEE Trans. Intelligent Transportation Systems, 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Information Forensics and Security, 2017

A Secure, Usable, and Transparent Middleware for Permission Managers on Android.
IEEE Trans. Dependable Sec. Comput., 2017

Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Sec. Comput., 2017

Adaptable key-policy attribute-based encryption with time interval.
Soft Comput., 2017

A study on a feasible no-root approach on Android.
Journal of Computer Security, 2017

Cryptography and Data Security in Cloud Computing.
Inf. Sci., 2017

CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications.
Inf. Sci., 2017

Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017

Encrypted data processing with Homomorphic Re-Encryption.
Inf. Sci., 2017

HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive.
IEEE Access, 2017

Attribute-Based Secure Messaging in the Public Cloud.
Proceedings of the A Systems Approach to Cyber Security, 2017

Fuzzy Public-Key Encryption Based on Biometric Data.
Proceedings of the Provable Security, 2017

IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Secure Encrypted Data Deduplication with Ownership Proof and User Revocation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Proceedings of the Computer Security - ESORICS 2017, 2017

Fair deposits against double-spending for Bitcoin transactions.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Editorial: Trust Management for Multimedia Big Data.
TOMCCAP, 2016

Trustworthy Authentication on Scalable Surveillance Video with Background Model Support.
TOMCCAP, 2016

ICCDetector: ICC-Based Malware Detection on Android.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving Outsourced Calculation on Floating Point Numbers.
IEEE Trans. Information Forensics and Security, 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Information Forensics and Security, 2016

On the security of two identity-based conditional proxy re-encryption schemes.
Theor. Comput. Sci., 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

Deduplication on Encrypted Big Data in Cloud.
IEEE Trans. Big Data, 2016

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
Security and Communication Networks, 2016

Escrow free attribute-based signature with self-revealability.
Inf. Sci., 2016

SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016

Revocable and Decentralized Attribute-Based Encryption.
Comput. J., 2016

A Survey on Future Internet Security Architectures.
IEEE Access, 2016

Privacy-Preserving and Verifiable Data Aggregation.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

H-Binder: A Hardened Binder Framework on Android Systems.
Proceedings of the Security and Privacy in Communication Networks, 2016

Attribute-Based Encryption with Granular Revocation.
Proceedings of the Security and Privacy in Communication Networks, 2016

An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016

CCA-Secure Keyed-Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Server-Aided Revocable Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2016, 2016

Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

CDRep: Automatic Repair of Cryptographic Misuses in Android Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

A Feasible No-Root Approach on Android.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Leakage Resilient Password Systems
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-17503-4, 2015

Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks.
IEEE Trans. Information Forensics and Security, 2015

Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption.
IEEE Trans. Information Forensics and Security, 2015

A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

On robust image spam filtering via comprehensive visual modeling.
Pattern Recognition, 2015

Security and privacy of electronic health information systems.
Int. J. Inf. Sec., 2015

Efficient revocable certificateless encryption against decryption key exposure.
IET Information Security, 2015

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security.
IACR Cryptology ePrint Archive, 2015

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.
IACR Cryptology ePrint Archive, 2015

Leakage-resilient password entry: Challenges, design, and evaluation.
Computers & Security, 2015

Privacy leakage analysis in online social networks.
Computers & Security, 2015

CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Electronic Contract Signing Without Using Trusted Third Party.
Proceedings of the Network and System Security - 9th International Conference, 2015

Multidimensional Context Awareness in Mobile Devices.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

Automatic Accident Detection and Alarm System.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

Server-Aided Revocable Identity-Based Encryption.
Proceedings of the Computer Security - ESORICS 2015, 2015

On Security of Content-Based Video Stream Authentication.
Proceedings of the Computer Security - ESORICS 2015, 2015

Active Semi-supervised Approach for Checking App Behavior against Its Description.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

A Hybrid Scheme for Authenticating Scalable Video Codestreams.
IEEE Trans. Information Forensics and Security, 2014

Efficient authentication and access control of scalable multimedia streams over packet-lossy networks.
Security and Communication Networks, 2014

Efficient block-based transparent encryption for H.264/SVC bitstreams.
Multimedia Syst., 2014

Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks.
J. Comput. Syst. Sci., 2014

Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014

Unforgeability of an improved certificateless signature scheme in the standard model.
IET Information Security, 2014

Cryptography in Cloud Computing.
Future Generation Comp. Syst., 2014

Editorial: Special issue on trust in cyber, physical and social computing.
Computers & Security, 2014

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
SCIENCE CHINA Information Sciences, 2014

ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Generic attacks on content-based video stream authentication.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

Generic attacks on content-based video stream authentication.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

Detecting Camouflaged Applications on Mobile Application Markets.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Verifiable Computation on Outsourced Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Understanding OSN-based facial disclosure against face authentication systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
RFID Security and Privacy
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2013

Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks.
IEEE Trans. Multimedia, 2013

A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting.
IEEE Trans. Multimedia, 2013

DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows.
ACM Trans. Inf. Syst. Secur., 2013

Attribute-Based Encryption With Verifiable Outsourced Decryption.
IEEE Trans. Information Forensics and Security, 2013

A revocable certificateless signature scheme.
IACR Cryptology ePrint Archive, 2013

A novel service-oriented intelligent seamless migration algorithm and application for pervasive computing environments.
Future Generation Comp. Syst., 2013

Adaptable Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Comparing Mobile Privacy Protection through Cross-Platform Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks.
Proceedings of the Information Security Practice and Experience, 2013

Revocable Identity-Based Signature without Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Technique for authenticating H.264/SVC streams in surveillance applications.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Accountable Authority Identity-Based Encryption with Public Traceability.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Expressive search on encrypted data.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Secure access to outsourced data.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2012

A scalable and format-compliant encryption scheme for H.264/SVC bitstreams.
Sig. Proc.: Image Comm., 2012

Detecting node replication attacks in mobile sensor networks: theory and approaches.
Security and Communication Networks, 2012

Enhanced authentication for commercial video services.
Security and Communication Networks, 2012

TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications.
Personal and Ubiquitous Computing, 2012

Detecting node replication attacks in wireless sensor networks: A survey.
J. Network and Computer Applications, 2012

Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012

A Survey on Privacy Frameworks for RFID Authentication.
IEICE Transactions, 2012

A secure and efficient discovery service system in EPCglobal network.
Computers & Security, 2012

An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A Pollution Attack to Public-key Watermarking Schemes.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

SecDS: a secure EPC discovery service system in EPCglobal network.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption.
Proceedings of the Communications and Multimedia Security, 2012

Expressive CP-ABE with partially hidden access structures.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

A New Framework for Privacy of RFID Path Authentication.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2011

On two RFID privacy notions and their relations.
ACM Trans. Inf. Syst. Secur., 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Information Forensics and Security, 2011

Database Access Pattern Protection Without Full-Shuffles.
IEEE Trans. Information Forensics and Security, 2011

Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Security and Communication Networks, 2011

General Construction of Chameleon All-But-One Trapdoor Functions.
J. Internet Serv. Inf. Secur., 2011

A zero-knowledge based framework for RFID privacy.
Journal of Computer Security, 2011

Cryptanalysis of a certificateless signcryption scheme in the standard model.
Inf. Sci., 2011

Secure localization with attack detection in wireless sensor networks.
Int. J. Inf. Sec., 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

Editorial: special issue on ubiquitous electronic commerce systems.
Electronic Commerce Research, 2011

Secure mobile agents with controlled resources.
Concurrency and Computation: Practice and Experience, 2011

Zero-error watermarking on jpeg images by shuffling huffman tree nodes.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

On Detection of Erratic Arguments.
Proceedings of the Security and Privacy in Communication Networks, 2011

General Construction of Chameleon All-But-One Trapdoor Functions.
Proceedings of the Provable Security - 5th International Conference, 2011

Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Fully Secure Cipertext-Policy Hiding CP-ABE.
Proceedings of the Information Security Practice and Experience, 2011

Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

DriverGuard: A Fine-Grained Protection on I/O Flows.
Proceedings of the Computer Security - ESORICS 2011, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Hierarchical Identity-Based Chameleon Hash and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
TeleOph: a secure real-time teleophthalmology system.
IEEE Trans. Information Technology in Biomedicine, 2010

Shifting Inference Control to User Side: Architecture and Protocol.
IEEE Trans. Dependable Sec. Comput., 2010

A Multi-Key Pirate Decoder Against Traitor Tracing Schemes.
J. Comput. Sci. Technol., 2010

New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.
J. Comput. Sci. Technol., 2010

Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings.
Inf. Sci., 2010

A new hardware-assisted PIR with O(n) shuffle cost.
Int. J. Inf. Sec., 2010

Achieving high security and efficiency in RFID-tagged supply chains.
IJACT, 2010

Time-Bound Hierarchical Key Assignment: An Overview.
IEICE Transactions, 2010

Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme.
IEICE Transactions, 2010

CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles.
IACR Cryptology ePrint Archive, 2010

A New Framework for RFID Privacy.
IACR Cryptology ePrint Archive, 2010

Practical ID-based Encryption for Wireless Sensor Network.
IACR Cryptology ePrint Archive, 2010

Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptography, 2010

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
SCIENCE CHINA Information Sciences, 2010

Time cost evaluation for executing RFID authentication protocols.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

A New Framework for RFID Privacy.
Proceedings of the Computer Security, 2010

Efficient CCA-Secure PKE from Identity-Based Techniques.
Proceedings of the Topics in Cryptology, 2010

Practical ID-based encryption for wireless sensor network.
Proceedings of the 5th ACM Symposium on Information, 2010

Efficient Unidirectional Proxy Re-Encryption.
Proceedings of the Progress in Cryptology, 2010

Revisiting Unpredictability-Based RFID Privacy Models.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications.
TOMCCAP, 2009

Privacy-preserving rental services using one-show anonymous credentials.
Security and Communication Networks, 2009

n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009

Multiuser private queries over encrypted databases.
IJACT, 2009

Efficient Unidirectional Proxy Re-Encryption.
IACR Cryptology ePrint Archive, 2009

Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

Secure Mobile Agents with Designated Hosts.
Proceedings of the Third International Conference on Network and System Security, 2009

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security, 12th International Conference, 2009

Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009

RSA-Based Certificateless Public Key Encryption.
Proceedings of the Information Security Practice and Experience, 2009

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
Proceedings of the Information Security Practice and Experience, 2009

Remote Attestation on Function Execution (Work-in-Progress).
Proceedings of the Trusted Systems, First International Conference, 2009

Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection.
Proceedings of the IEEE International Conference on Web Services, 2009

On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Insights into Malware Detection and Prevention on Mobile Phones.
Proceedings of the Security Technology, 2009

On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2009

Conditional proxy re-encryption secure against chosen-ciphertext attack.
Proceedings of the 2009 ACM Symposium on Information, 2009

RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
The security and improvement of an ultra-lightweight RFID authentication protocol.
Security and Communication Networks, 2008

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
JSW, 2008

On the Security of Fully Collusion Resistant Traitor Tracing Schemes.
IACR Cryptology ePrint Archive, 2008

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptology ePrint Archive, 2008

An Efficient PIR Construction Using Trusted Hardware.
Proceedings of the Information Security, 11th International Conference, 2008

Distinguishing between FE and DDoS Using Randomness Check.
Proceedings of the Information Security, 11th International Conference, 2008

Private Query on Encrypted Data in Multi-user Settings.
Proceedings of the Information Security Practice and Experience, 2008

Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks.
Proceedings of IEEE International Conference on Communications, 2008

Efficient Client-to-Client Password Authenticated Key Exchange.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Remote attestation on program execution.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Flexible Access Control to JPEG 2000 Image Code-Streams.
IEEE Trans. Multimedia, 2007

Access control protocols with two-layer architecture for wireless networks.
Computer Networks, 2007

Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers.
Proceedings of the Information Security Practice and Experience, 2007

Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems.
Proceedings of the Information Security Practice and Experience, 2007

n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks.
Proceedings of the Global Communications Conference, 2007

New Paradigm of Inference Control with Trusted Computing.
Proceedings of the Data and Applications Security XXI, 2007

Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Security analysis on a conference scheme for mobile communications.
IEEE Trans. Wireless Communications, 2006

A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Vehicular Technology, 2006

Scalable authentication of MPEG-4 streams.
IEEE Trans. Multimedia, 2006

A Practical Password-Based Two-Server Authentication and Key Exchange System.
IEEE Trans. Dependable Sec. Comput., 2006

Minimizing TTP's involvement in signature validation.
Int. J. Inf. Sec., 2006

Private Information Retrieval Using Trusted Hardware.
IACR Cryptology ePrint Archive, 2006

Three architectures for trusted data dissemination in edge computing.
Data Knowl. Eng., 2006

A secure extension of the Kwak-Moon group signcryption scheme.
Computers & Security, 2006

Routing optimization security in mobile IPv6.
Computer Networks, 2006

Efficient key tree construction for group key agreement in ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Practical Inference Control for Data Cubes (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, 2006

Rights Protection for Data Cubes.
Proceedings of the Information Security, 9th International Conference, 2006

Private Information Retrieval Using Trusted Hardware.
Proceedings of the Computer Security, 2006

Privacy-enhanced superdistribution of layered content with trusted access control.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

Practical private data matching deterrent to spoofing attacks.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

Fortifying password authentication in integrated healthcare delivery systems.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Publicly verifiable ownership protection for relational databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Tailored reversible watermarking schemes for authentication of electronic clinical atlas.
IEEE Trans. Information Technology in Biomedicine, 2005

Security of an ill-posed operator for image authentication.
IEEE Trans. Circuits Syst. Video Techn., 2005

New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures.
IEEE Trans. Computers, 2005

New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures.
IEEE Trans. Computers, 2005

Scalable trusted online dissemination of JPEG2000 images.
Multimedia Syst., 2005

Generic yet Practical ZK Arguments from any Public-Coin HVZK
Electronic Colloquium on Computational Complexity (ECCC), 2005

Efficient and robust key management for large mobile ad hoc networks.
Computer Networks, 2005

Protocols that hide user's preferences in electronic transactions.
Computer Networks, 2005

Practical Zero-Knowledge Arguments from Sigma-Protocols.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

DoS-resistant access control protocol with identity confidentiality for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Protecting Group Dynamic Information in Large Scale Multicast Groups.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Secure Person-To-Person Communications Based on Biometrics Signals.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

An efficient certified e-mail scheme suitable for wireless mobile environments.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Security Analysis and Improvement of Return Routability Protocol.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Authenticating Query Results in Data Publishing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Privacy and Ownership Preserving of Outsourced Medical Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

Security Analysis and Fix of an Anonymous Credential System.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004

A smart-card-enabled privacy preserving E-prescription system.
IEEE Trans. Information Technology in Biomedicine, 2004

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IACR Cryptology ePrint Archive, 2004

New efficient user identification and key distribution scheme providing enhanced security.
Computers & Security, 2004

Highly reliable trust establishment scheme in ad hoc networks.
Computer Networks, 2004

On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Anonymous Secure Routing in Mobile Ad-Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

On Security Notions of Steganographic Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Security Analysis of Two Signcryption Schemes.
Proceedings of the Information Security, 7th International Conference, 2004

A Block Oriented Fingerprinting Scheme in Relational Database.
Proceedings of the Information Security and Cryptology, 2004

On Security Notions for Steganalysis.
Proceedings of the Information Security and Cryptology, 2004

Progressive protection of jpeg2000 codestreams.
Proceedings of the 2004 International Conference on Image Processing, 2004

Compliant encryption of jpeg2000 codestreanis.
Proceedings of the 2004 International Conference on Image Processing, 2004

Dynamic Access Control for Multi-privileged Group Communications.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Trust Establishment in Large Scale Grid Settings.
Proceedings of the Grid and Cooperative Computing, 2004

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Content-aware authentication of motion JPEG2000 stream in lossy networks.
IEEE Trans. Consumer Electronics, 2003

Computing of Trust in Distributed Networks.
IACR Cryptology ePrint Archive, 2003

Security Analysis of Some Proxy Signatures.
IACR Cryptology ePrint Archive, 2003

Flexible authentication of images.
Proceedings of the Visual Communications and Image Processing 2003, 2003

A flexible and scalable authentication scheme for JPEG2000 image codestreams.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.
Proceedings of the Information Security, 6th International Conference, 2003

Secure the image-based simulated telesurgery system.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Security Analysis of Some Proxy Signatures.
Proceedings of the Information Security and Cryptology, 2003

An Efficient Public-Key Framework.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

An Efficient Known Plaintext Attack on FEA-M.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Security Remarks on a Group Signature Scheme with Member Deletion.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Variations of Diffie-Hellman Problem.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

An improved personal CA for personal area networks.
Proceedings of the Global Telecommunications Conference, 2003

Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes.
Informatica (Slovenia), 2002

Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
IACR Cryptology ePrint Archive, 2002

Defending against redirect attacks in mobile IP.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Security Analysis and Improvement of the Global Key Recovery System.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Proceedings of the Public Key Cryptography, 2001

Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems.
Proceedings of the Public Key Cryptography, 2001

An Optical Watermarking Solution for Authenticating Printed Documents.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Privacy Protection for Transactions of Digital Goods.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Multicast Internet protocol.
Computer Communications, 2000

On the validity of digital signatures.
Computer Communication Review, 2000

Electronic Payment Systems with Fair On-line Verification.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Some Remarks on a Fair Exchange Protocol.
Proceedings of the Public Key Cryptography, 2000

An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods.
Proceedings of the Information Security and Cryptology, 2000

Cryptanalysis of Polynominal Authentication and Signature Scheme.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Cryptanalysis of the m-Permutation Protection Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum.
Computer Communications, 1999

Recovering modified watermarked images with reference to the original image.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation.
Proceedings of the Public Key Cryptography, 1999

Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Evolution of Fair Non-repudiation with TTP.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
A Ubiquitous Secure and Reliable Digital Data Depository System.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Efficient and Practical Fair Exchange Protocols with Off-Line TTP.
Proceedings of the Security and Privacy, 1998

A Signcryption Scheme with Signature Directly Verifiable by Public Key.
Proceedings of the Public Key Cryptography, 1998

Improved Truncated Differential Attacks on SAFER.
Proceedings of the Advances in Cryptology, 1998

Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers.
Proceedings of the Advances in Cryptology, 1998

1997
Integrating Security in the CORBA Architecture.
TAPOS, 1997

Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults.
Proceedings of the Security Protocols, 1997

Modified Finite Automata Public Key Cryptosystem.
Proceedings of the Information Security, First International Workshop, 1997

RSA-type Signatures in the Presence of Transient Faults.
Proceedings of the Cryptography and Coding, 1997

A New On-Line Cash Check Scheme.
Proceedings of the CCS '97, 1997

Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Practical Protocols for Certified Electronic Mail.
J. Network Syst. Manage., 1996

1995
A type I hybrid ARQ system with adaptive code rates.
IEEE Trans. Communications, 1995

Integrating security in CORBA based object architectures.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

1994
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems.
IEEE Trans. Information Theory, 1994

Hybrid ARQ schemes employing coded modulation and sequence combining.
IEEE Trans. Communications, 1994

Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems.
Computer Communications, 1994

Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems.
Computer Communications, 1994

Simulating a Multimedia FDDI Backbone Network.
Comput. J., 1994

1993
Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels.
IEEE Trans. Communications, 1993

A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks.
IEEE Journal on Selected Areas in Communications, 1993

Performance analysis of two bridged CSMA/CD networks.
Computer Communications, 1993

Performance of a token-passing system with batch arrivals and its application to file transfers.
Computer Communications, 1993

LAN-based medical visualization communication system.
Computer Communications, 1993

Effects of station buffer capacity on token ring network performance.
Computer Communications, 1993

Performance Analysis of Interconnected LANs with Server/Client Configuration.
Computer Networks and ISDN Systems, 1993

A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks.
Proceedings of the Integrated Network Management III, 1993

1991
End-to-end performance of interconnected LANs.
Computer Communications, 1991

Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

1990
Trellis-coded multidimensional phase modulation.
IEEE Trans. Information Theory, 1990

Gateway Design for LAN Interconnection via ISDN.
Computer Networks and ISDN Systems, 1990

1989
Parity retransmission hybrid ARQ using rate 1/2 convolutional codes on a nonstationary channel.
IEEE Trans. Communications, 1989

High rate concatenated coding systems using multidimensional bandwidth-efficient trellis inner codes.
IEEE Trans. Communications, 1989

High rate concatenated coding systems using bandwidth efficient trellis inner codes.
IEEE Trans. Communications, 1989

1988
DC-free coset codes.
IEEE Trans. Information Theory, 1988

1987
Reliability and Throughput Analysis of a Concatenated Coding Scheme.
IEEE Trans. Communications, 1987

Decoding of DBEC-TBED Reed-Solomon Codes.
IEEE Trans. Computers, 1987


  Loading...