Robert H. Deng

Orcid: 0000-0003-3491-8146

According to our database1, Robert H. Deng authored at least 558 papers between 1987 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to security algorithms, protocols and systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024

A Survey on Searchable Symmetric Encryption.
ACM Comput. Surv., May, 2024

FlGan: GAN-Based Unbiased Federated Learning Under Non-IID Settings.
IEEE Trans. Knowl. Data Eng., April, 2024

OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT.
IEEE Internet Things J., April, 2024

Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing.
IEEE Trans. Ind. Informatics, March, 2024

Robust Permissioned Blockchain Consensus for Unstable Communication in FANET.
IEEE/ACM Trans. Netw., February, 2024

PAM<sup>3</sup>S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS.
IEEE/ACM Trans. Netw., February, 2024

Efficient Privacy-Preserving Spatial Data Query in Cloud Computing.
IEEE Trans. Knowl. Data Eng., January, 2024

A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024

Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS.
IEEE Trans. Serv. Comput., 2024

A Privacy-Preserving and Redactable Healthcare Blockchain System.
IEEE Trans. Serv. Comput., 2024

Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage.
IEEE Trans. Inf. Forensics Secur., 2024

STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
IEEE Trans. Inf. Forensics Secur., 2024

SDSS: Sequential Data Sharing System in IoT.
IEEE Trans. Inf. Forensics Secur., 2024

A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data.
IEEE Trans. Inf. Forensics Secur., 2024

A Survey of Protocol Fuzzing.
CoRR, 2024

2023
Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme.
IEEE Trans. Reliab., December, 2023

Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023

TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET.
IEEE Trans. Veh. Technol., November, 2023

Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries.
ACM Trans. Storage, November, 2023

PriMPSO: A Privacy-Preserving Multiagent Particle Swarm Optimization Algorithm.
IEEE Trans. Cybern., November, 2023

Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data.
IEEE Trans. Computers, November, 2023

CrowdFL: Privacy-Preserving Mobile Crowdsensing System Via Federated Learning.
IEEE Trans. Mob. Comput., August, 2023

Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT.
IEEE Internet Things J., August, 2023

Privacy-Preserving Ranked Spatial Keyword Query in Mobile Cloud-Assisted Fog Computing.
IEEE Trans. Mob. Comput., June, 2023

DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023

LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes.
IEEE Trans. Ind. Informatics, June, 2023

Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security.
IEEE Trans. Knowl. Data Eng., May, 2023

Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing.
IEEE Trans. Knowl. Data Eng., May, 2023

Threshold Attribute-Based Credentials With Redactable Signature.
IEEE Trans. Serv. Comput., 2023

Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method.
IEEE Trans. Serv. Comput., 2023

Defending Against Membership Inference Attack by Shielding Membership Signals.
IEEE Trans. Serv. Comput., 2023

Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials.
IEEE Trans. Serv. Comput., 2023

CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2023

CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics.
IEEE Trans. Inf. Forensics Secur., 2023

ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots.
IEEE Trans. Inf. Forensics Secur., 2023

Accountable and Fine-Grained Controllable Rewriting in Blockchains.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption.
IEEE Trans. Inf. Forensics Secur., 2023

Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Model-Contrastive Federated Learning With Improved Compressive Sensing.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits.
IEEE Trans. Inf. Forensics Secur., 2023

Authenticable Data Analytics Over Encrypted Data in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges.
IEEE Trans. Dependable Secur. Comput., 2023

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control.
IEEE Trans. Dependable Secur. Comput., 2023

Hercules: Boosting the Performance of Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Forward/Backward and Content Private DSSE for Spatial Keyword Queries.
IEEE Trans. Dependable Secur. Comput., 2023

VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
IEEE Trans. Dependable Secur. Comput., 2023

FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds.
IEEE Trans. Dependable Secur. Comput., 2023

Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer.
IEEE Trans. Cloud Comput., 2023

Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2023

MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN.
Knowl. Based Syst., 2023

PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability.
J. Parallel Distributed Comput., 2023

A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction.
IEEE Internet Things J., 2023

SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers.
CoRR, 2023

A Survey of Secure Computation Using Trusted Execution Environments.
CoRR, 2023

Efficient and Secure Spatial Range Query over Large-scale Encrypted Data.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Data Security & Privacy Protection in IoT MGC Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

2022
Secure Cloud Data Deduplication with Efficient Re-Encryption.
IEEE Trans. Serv. Comput., 2022

Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing.
IEEE Trans. Serv. Comput., 2022

VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Serv. Comput., 2022

Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud.
IEEE Trans. Serv. Comput., 2022

A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs.
IEEE Trans. Serv. Comput., 2022

Privacy Protection in 5G Positioning and Location-based Services Based on SGX.
ACM Trans. Sens. Networks, 2022

PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: 5G-Enabled Intelligent Application for Distributed Industrial Internet-of-Thing System.
IEEE Trans. Ind. Informatics, 2022

SOCI: A Toolkit for Secure Outsourced Computation on Integers.
IEEE Trans. Inf. Forensics Secur., 2022

Lightweight Privacy-Preserving GAN Framework for Model Training and Image Synthesis.
IEEE Trans. Inf. Forensics Secur., 2022

A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System.
IEEE Trans. Inf. Forensics Secur., 2022

Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Redactable Blockchain in Decentralized Setting.
IEEE Trans. Inf. Forensics Secur., 2022

ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2022

LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
IEEE Trans. Inf. Forensics Secur., 2022

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Federated Deep Learning With Irregular Users.
IEEE Trans. Dependable Secur. Comput., 2022

SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering.
IEEE Trans. Dependable Secur. Comput., 2022

Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022

Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022

Orchestration or Automation: Authentication Flaw Detection in Android Apps.
IEEE Trans. Dependable Secur. Comput., 2022

Authenticated Data Redaction With Accountability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2022

Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022

VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2022

Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing.
IEEE Trans. Cloud Comput., 2022

Structured encryption for knowledge graphs.
Inf. Sci., 2022

Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022

Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.
IEEE Internet Things J., 2022

Secure 5G Positioning With Truth Discovery, Attack Detection, and Tracing.
IEEE Internet Things J., 2022

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication.
CoRR, 2022

EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry.
CoRR, 2022

SIMC 2.0: Improved Secure ML Inference Against Malicious Clients.
CoRR, 2022

Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification.
Comput. J., 2022

An Efficient and Secure Scheme of Verifiable Computation for Intel SGX.
Proceedings of the IEEE International Conference on Trust, 2022

M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption.
Proceedings of the Information Security Practice and Experience, 2022

Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Compressed Federated Learning Based on Adaptive Local Differential Privacy.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing.
IEEE Trans. Serv. Comput., 2021

Privacy-Preserving Outsourced Clinical Decision Support System in the Cloud.
IEEE Trans. Serv. Comput., 2021

Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory.
IEEE Trans. Parallel Distributed Syst., 2021

PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting.
IEEE Trans. Inf. Forensics Secur., 2021

K-Time Modifiable and Epoch-Based Redactable Blockchain.
IEEE Trans. Inf. Forensics Secur., 2021

Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021

Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2021

Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes.
IEEE Trans. Emerg. Top. Comput., 2021

Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model.
IEEE Trans. Dependable Secur. Comput., 2021

ObliComm: Towards Building an Efficient Oblivious Communication System.
IEEE Trans. Dependable Secur. Comput., 2021

Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2021

Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings.
IEEE Trans. Dependable Secur. Comput., 2021

Looking Back! Using Early Versions of Android Apps as Attack Vectors.
IEEE Trans. Dependable Secur. Comput., 2021

Robust and Universal Seamless Handover Authentication in 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing.
KSII Trans. Internet Inf. Syst., 2021

Secure and verifiable outsourced data dimension reduction on dynamic data.
Inf. Sci., 2021

PRICE: Privacy and Reliability-Aware Real-Time Incentive System for Crowdsensing.
IEEE Internet Things J., 2021

Fast and Secure Location-Based Services in Smart Cities on Outsourced Data.
IEEE Internet Things J., 2021

Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things.
IEEE Internet Things J., 2021

Data Fusion for Trust Evaluation.
Inf. Fusion, 2021

IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability.
IACR Cryptol. ePrint Arch., 2021

Attribute-based Encryption for Cloud Computing Access Control: A Survey.
ACM Comput. Surv., 2021

An efficient and secure scheme of verifiable computation for Intel SGX.
CoRR, 2021

Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Efficient and Verifiable Proof of Replication with Fast Fault Localization.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Revocable Policy-Based Chameleon Hash.
Proceedings of the Computer Security - ESORICS 2021, 2021

When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

UltraPIN: Inferring PIN Entries via Ultrasound.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Flexible Wildcard Searchable Encryption System.
IEEE Trans. Serv. Comput., 2020

An Extended Framework of Privacy-Preserving Computation With Flexible Access Control.
IEEE Trans. Netw. Serv. Manag., 2020

Guest Editorial: Blockchain and Healthcare Computing.
IEEE J. Biomed. Health Informatics, 2020

Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language.
IEEE Trans. Dependable Secur. Comput., 2020

Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2020

Privacy-Preserving Outsourced Calculation Toolkit in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2020

Privacy-Preserving Data Processing with Flexible Access Control.
IEEE Trans. Dependable Secur. Comput., 2020

Lightweight Sharable and Traceable Secure Mobile Health System.
IEEE Trans. Dependable Secur. Comput., 2020

Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.
IEEE Trans. Cloud Comput., 2020

A new framework for privacy-preserving biometric-based remote user authentication.
J. Comput. Secur., 2020

Secure server-aided data sharing clique with attestation.
Inf. Sci., 2020

Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020

Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020

Editing-Enabled Signatures: A New Tool for Editing Authenticated Data.
IEEE Internet Things J., 2020

Special issue on security and privacy of blockchain technologies.
Int. J. Inf. Sec., 2020

Driving Cybersecurity Policy Insights From Information on the Internet.
IEEE Secur. Priv., 2020

Special Issue on FinTech Security and Privacy.
Future Gener. Comput. Syst., 2020

Lightning-fast and privacy-preserving outsourced computation in the cloud.
Cybersecur., 2020

Server-aided revocable attribute-based encryption for cloud computing services.
Concurr. Comput. Pract. Exp., 2020

Game theoretical study on client-controlled cloud data deduplication.
Comput. Secur., 2020

A New Construction for Linkable Secret Handshake.
Comput. J., 2020

Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020

Understanding Android VoIP Security: A System-Level Vulnerability Assessment.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Secure and Verifiable Inference in Deep Neural Networks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing.
IEEE Trans. Parallel Distributed Syst., 2019

An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks.
IEEE/ACM Trans. Netw., 2019

Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud.
IEEE Trans. Big Data, 2019

MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains.
J. Comput. Sci. Technol., 2019

Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin.
J. Comput. Secur., 2019

Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.
IEEE Internet Things J., 2019

SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet Things J., 2019

Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.
IEEE Internet Things J., 2019

Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything.
IEEE Internet Things J., 2019

Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019

Lattice-Based Remote User Authentication from Reusable Fuzzy Signature.
IACR Cryptol. ePrint Arch., 2019

Privacy-Preserving Network Path Validation.
IACR Cryptol. ePrint Arch., 2019

A blockchain-based location privacy-preserving crowdsensing system.
Future Gener. Comput. Syst., 2019

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019

When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Comput. Secur., 2019

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities.
IEEE Commun. Mag., 2019

Game Theoretical Study on a Client-Controlled Deduplication Scheme.
Proceedings of the 2019 IEEE SmartWorld, 2019

Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

DroidEvolver: Self-Evolving Android Malware Detection System.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Finding Flaws from Password Authentication Code in Android Apps.
Proceedings of the Computer Security - ESORICS 2019, 2019

Random Delay Attack and Its Applications on Load Frequency Control of Power Systems.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Towards Understanding Android System Vulnerabilities: Techniques and Insights.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Encrypted Big Data Deduplication in Cloud Storage.
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019

2018
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control.
IEEE Trans. Veh. Technol., 2018

Resonance Attacks on Load Frequency Control of Smart Grids.
IEEE Trans. Smart Grid, 2018

Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things.
IEEE Trans. Ind. Informatics, 2018

Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Secur. Comput., 2018

Empirical Study of Face Authentication Systems Under OSNFD Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2018

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things.
J. Netw. Comput. Appl., 2018

Dual-side privacy-preserving task matching for spatial crowdsourcing.
J. Netw. Comput. Appl., 2018

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018

Expressive query over outsourced encrypted data.
Inf. Sci., 2018

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.
IEEE Internet Things J., 2018

Anonymous Privacy-Preserving Task Matching in Crowdsourcing.
IEEE Internet Things J., 2018

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management.
Int. J. Inf. Sec., 2018

Hybrid privacy-preserving clinical decision support system in fog-cloud computing.
Future Gener. Comput. Syst., 2018

Attribute-based cloud storage with secure provenance over encrypted data.
Future Gener. Comput. Syst., 2018

Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
Cybersecur., 2018

TinyVisor: An extensible secure framework on android platforms.
Comput. Secur., 2018

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2018

DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Privacy-Preserving Remote User Authentication with k-Times Untraceability.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
An Efficient Privacy-Preserving Outsourced Computation over Public Data.
IEEE Trans. Serv. Comput., 2017

Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems.
IEEE Trans. Intell. Transp. Syst., 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2017

A Secure, Usable, and Transparent Middleware for Permission Managers on Android.
IEEE Trans. Dependable Secur. Comput., 2017

Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Secur. Comput., 2017

Adaptable key-policy attribute-based encryption with time interval.
Soft Comput., 2017

A study on a feasible no-root approach on Android.
J. Comput. Secur., 2017

Cryptography and Data Security in Cloud Computing.
Inf. Sci., 2017

CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications.
Inf. Sci., 2017

Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017

Encrypted data processing with Homomorphic Re-Encryption.
Inf. Sci., 2017

HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive.
IEEE Access, 2017

Attribute-Based Secure Messaging in the Public Cloud.
Proceedings of the A Systems Approach to Cyber Security, 2017

Fuzzy Public-Key Encryption Based on Biometric Data.
Proceedings of the Provable Security, 2017

IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Secure Encrypted Data Deduplication with Ownership Proof and User Revocation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Proceedings of the Computer Security - ESORICS 2017, 2017

Fair deposits against double-spending for Bitcoin transactions.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Editorial: Trust Management for Multimedia Big Data.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Trustworthy Authentication on Scalable Surveillance Video with Background Model Support.
ACM Trans. Multim. Comput. Commun. Appl., 2016

ICCDetector: ICC-Based Malware Detection on Android.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving Outsourced Calculation on Floating Point Numbers.
IEEE Trans. Inf. Forensics Secur., 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Inf. Forensics Secur., 2016

On the security of two identity-based conditional proxy re-encryption schemes.
Theor. Comput. Sci., 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

Deduplication on Encrypted Big Data in Cloud.
IEEE Trans. Big Data, 2016

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
Secur. Commun. Networks, 2016

Escrow free attribute-based signature with self-revealability.
Inf. Sci., 2016

SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016

Revocable and Decentralized Attribute-Based Encryption.
Comput. J., 2016

A Survey on Future Internet Security Architectures.
IEEE Access, 2016

Privacy-Preserving and Verifiable Data Aggregation.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

H-Binder: A Hardened Binder Framework on Android Systems.
Proceedings of the Security and Privacy in Communication Networks, 2016

Attribute-Based Encryption with Granular Revocation.
Proceedings of the Security and Privacy in Communication Networks, 2016

An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016

CCA-Secure Keyed-Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Server-Aided Revocable Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2016, 2016

Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

CDRep: Automatic Repair of Cryptographic Misuses in Android Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

A Feasible No-Root Approach on Android.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Leakage Resilient Password Systems
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-17503-4, 2015

Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks.
IEEE Trans. Inf. Forensics Secur., 2015

Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption.
IEEE Trans. Inf. Forensics Secur., 2015

A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

On robust image spam filtering via comprehensive visual modeling.
Pattern Recognit., 2015

Security and privacy of electronic health information systems.
Int. J. Inf. Sec., 2015

Efficient revocable certificateless encryption against decryption key exposure.
IET Inf. Secur., 2015

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security.
IACR Cryptol. ePrint Arch., 2015

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2015

Leakage-resilient password entry: Challenges, design, and evaluation.
Comput. Secur., 2015

Privacy leakage analysis in online social networks.
Comput. Secur., 2015

CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Electronic Contract Signing Without Using Trusted Third Party.
Proceedings of the Network and System Security - 9th International Conference, 2015

Multidimensional Context Awareness in Mobile Devices.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

Automatic Accident Detection and Alarm System.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

Server-Aided Revocable Identity-Based Encryption.
Proceedings of the Computer Security - ESORICS 2015, 2015

On Security of Content-Based Video Stream Authentication.
Proceedings of the Computer Security - ESORICS 2015, 2015

Active Semi-supervised Approach for Checking App Behavior against Its Description.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

A Hybrid Scheme for Authenticating Scalable Video Codestreams.
IEEE Trans. Inf. Forensics Secur., 2014

Efficient authentication and access control of scalable multimedia streams over packet-lossy networks.
Secur. Commun. Networks, 2014

Efficient block-based transparent encryption for H.264/SVC bitstreams.
Multim. Syst., 2014

Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks.
J. Comput. Syst. Sci., 2014

Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014

Unforgeability of an improved certificateless signature scheme in the standard model.
IET Inf. Secur., 2014

Cryptography in Cloud Computing.
Future Gener. Comput. Syst., 2014

Editorial: Special issue on trust in cyber, physical and social computing.
Comput. Secur., 2014

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014

ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Generic attacks on content-based video stream authentication.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

Detecting Camouflaged Applications on Mobile Application Markets.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Verifiable Computation on Outsourced Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Understanding OSN-based facial disclosure against face authentication systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
RFID Security and Privacy
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02340-8, 2013

Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks.
IEEE Trans. Multim., 2013

A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting.
IEEE Trans. Multim., 2013

DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows.
ACM Trans. Inf. Syst. Secur., 2013

Attribute-Based Encryption With Verifiable Outsourced Decryption.
IEEE Trans. Inf. Forensics Secur., 2013

A revocable certificateless signature scheme.
IACR Cryptol. ePrint Arch., 2013

A novel service-oriented intelligent seamless migration algorithm and application for pervasive computing environments.
Future Gener. Comput. Syst., 2013

Adaptable Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Comparing Mobile Privacy Protection through Cross-Platform Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks.
Proceedings of the Information Security Practice and Experience, 2013

Revocable Identity-Based Signature without Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Technique for authenticating H.264/SVC streams in surveillance applications.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Accountable Authority Identity-Based Encryption with Public Traceability.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Expressive search on encrypted data.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Secure access to outsourced data.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2012

A scalable and format-compliant encryption scheme for H.264/SVC bitstreams.
Signal Process. Image Commun., 2012

Detecting node replication attacks in mobile sensor networks: theory and approaches.
Secur. Commun. Networks, 2012

Enhanced authentication for commercial video services.
Secur. Commun. Networks, 2012

TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications.
Pers. Ubiquitous Comput., 2012

Detecting node replication attacks in wireless sensor networks: A survey.
J. Netw. Comput. Appl., 2012

Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012

A Survey on Privacy Frameworks for RFID Authentication.
IEICE Trans. Inf. Syst., 2012

A secure and efficient discovery service system in EPCglobal network.
Comput. Secur., 2012

Design and Implementation of a Secure Prototype for EPCglobal Network Services.
Proceedings of the Radio Frequency Identification System Security, 2012

An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A Pollution Attack to Public-key Watermarking Schemes.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

SecDS: a secure EPC discovery service system in EPCglobal network.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption.
Proceedings of the Communications and Multimedia Security, 2012

Expressive CP-ABE with partially hidden access structures.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

A New Framework for Privacy of RFID Path Authentication.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2011

On two RFID privacy notions and their relations.
ACM Trans. Inf. Syst. Secur., 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011

Database Access Pattern Protection Without Full-Shuffles.
IEEE Trans. Inf. Forensics Secur., 2011

Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Secur. Commun. Networks, 2011

General Construction of Chameleon All-But-One Trapdoor Functions.
J. Internet Serv. Inf. Secur., 2011

A zero-knowledge based framework for RFID privacy.
J. Comput. Secur., 2011

Cryptanalysis of a certificateless signcryption scheme in the standard model.
Inf. Sci., 2011

Secure localization with attack detection in wireless sensor networks.
Int. J. Inf. Sec., 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

Editorial: special issue on ubiquitous electronic commerce systems.
Electron. Commer. Res., 2011

Secure mobile agents with controlled resources.
Concurr. Comput. Pract. Exp., 2011

Zero-error watermarking on jpeg images by shuffling huffman tree nodes.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

On Detection of Erratic Arguments.
Proceedings of the Security and Privacy in Communication Networks, 2011

Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Fully Secure Cipertext-Policy Hiding CP-ABE.
Proceedings of the Information Security Practice and Experience, 2011

Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

DriverGuard: A Fine-Grained Protection on I/O Flows.
Proceedings of the Computer Security - ESORICS 2011, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Hierarchical Identity-Based Chameleon Hash and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
TeleOph: a secure real-time teleophthalmology system.
IEEE Trans. Inf. Technol. Biomed., 2010

Shifting Inference Control to User Side: Architecture and Protocol.
IEEE Trans. Dependable Secur. Comput., 2010

A Multi-Key Pirate Decoder Against Traitor Tracing Schemes.
J. Comput. Sci. Technol., 2010

New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.
J. Comput. Sci. Technol., 2010

Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings.
Inf. Sci., 2010

A new hardware-assisted PIR with O(<i>n</i>) shuffle cost.
Int. J. Inf. Sec., 2010

Achieving high security and efficiency in RFID-tagged supply chains.
Int. J. Appl. Cryptogr., 2010

Time-Bound Hierarchical Key Assignment: An Overview.
IEICE Trans. Inf. Syst., 2010

Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A New Framework for RFID Privacy.
IACR Cryptol. ePrint Arch., 2010

Practical ID-based Encryption for Wireless Sensor Network.
IACR Cryptol. ePrint Arch., 2010

Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010

Time cost evaluation for executing RFID authentication protocols.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

A New Framework for RFID Privacy.
Proceedings of the Computer Security, 2010

Efficient CCA-Secure PKE from Identity-Based Techniques.
Proceedings of the Topics in Cryptology, 2010

Revisiting Unpredictability-Based RFID Privacy Models.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications.
ACM Trans. Multim. Comput. Commun. Appl., 2009

Privacy-preserving rental services using one-show anonymous credentials.
Secur. Commun. Networks, 2009

<i>n</i> PAKE<sup>+</sup>: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009

Multiuser private queries over encrypted databases.
Int. J. Appl. Cryptogr., 2009

Efficient Unidirectional Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2009

Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

Secure Mobile Agents with Designated Hosts.
Proceedings of the Third International Conference on Network and System Security, 2009

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security, 12th International Conference, 2009

Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009

RSA-Based Certificateless Public Key Encryption.
Proceedings of the Information Security Practice and Experience, 2009

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
Proceedings of the Information Security Practice and Experience, 2009

Remote Attestation on Function Execution (Work-in-Progress).
Proceedings of the Trusted Systems, First International Conference, 2009

Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection.
Proceedings of the IEEE International Conference on Web Services, 2009

On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Insights into Malware Detection and Prevention on Mobile Phones.
Proceedings of the Security Technology, 2009

On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2009

Conditional proxy re-encryption secure against chosen-ciphertext attack.
Proceedings of the 2009 ACM Symposium on Information, 2009

RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
The security and improvement of an ultra-lightweight RFID authentication protocol.
Secur. Commun. Networks, 2008

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
J. Softw., 2008

On the Security of Fully Collusion Resistant Traitor Tracing Schemes.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2008

An Efficient PIR Construction Using Trusted Hardware.
Proceedings of the Information Security, 11th International Conference, 2008

Distinguishing between FE and DDoS Using Randomness Check.
Proceedings of the Information Security, 11th International Conference, 2008

Private Query on Encrypted Data in Multi-user Settings.
Proceedings of the Information Security Practice and Experience, 2008

Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks.
Proceedings of IEEE International Conference on Communications, 2008

Efficient Client-to-Client Password Authenticated Key Exchange.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Remote attestation on program execution.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Flexible Access Control to JPEG 2000 Image Code-Streams.
IEEE Trans. Multim., 2007

Access control protocols with two-layer architecture for wireless networks.
Comput. Networks, 2007

Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers.
Proceedings of the Information Security Practice and Experience, 2007

Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems.
Proceedings of the Information Security Practice and Experience, 2007

<i>n</i> PAKE<sup> + </sup>: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks.
Proceedings of the Global Communications Conference, 2007

New Paradigm of Inference Control with Trusted Computing.
Proceedings of the Data and Applications Security XXI, 2007

Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Security analysis on a conference scheme for mobile communications.
IEEE Trans. Wirel. Commun., 2006

A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Veh. Technol., 2006

Scalable authentication of MPEG-4 streams.
IEEE Trans. Multim., 2006

A Practical Password-Based Two-Server Authentication and Key Exchange System.
IEEE Trans. Dependable Secur. Comput., 2006

Minimizing TTP's involvement in signature validation.
Int. J. Inf. Sec., 2006

Private Information Retrieval Using Trusted Hardware.
IACR Cryptol. ePrint Arch., 2006

Three architectures for trusted data dissemination in edge computing.
Data Knowl. Eng., 2006

A secure extension of the Kwak-Moon group signcryption scheme.
Comput. Secur., 2006

Routing optimization security in mobile IPv6.
Comput. Networks, 2006

Efficient key tree construction for group key agreement in ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Practical Inference Control for Data Cubes (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Rights Protection for Data Cubes.
Proceedings of the Information Security, 9th International Conference, 2006

Privacy-enhanced superdistribution of layered content with trusted access control.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

Practical private data matching deterrent to spoofing attacks.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

Fortifying password authentication in integrated healthcare delivery systems.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Publicly verifiable ownership protection for relational databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Tailored reversible watermarking schemes for authentication of electronic clinical atlas.
IEEE Trans. Inf. Technol. Biomed., 2005

Security of an ill-posed operator for image authentication.
IEEE Trans. Circuits Syst. Video Technol., 2005

New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures.
IEEE Trans. Computers, 2005

New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures.
IEEE Trans. Computers, 2005

Scalable trusted online dissemination of JPEG2000 images.
Multim. Syst., 2005

Generic yet Practical ZK Arguments from any Public-Coin HVZK
Electron. Colloquium Comput. Complex., 2005

Efficient and robust key management for large mobile ad hoc networks.
Comput. Networks, 2005

Protocols that hide user's preferences in electronic transactions.
Comput. Networks, 2005

Practical Zero-Knowledge Arguments from Sigma-Protocols.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

DoS-resistant access control protocol with identity confidentiality for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Protecting Group Dynamic Information in Large Scale Multicast Groups.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Secure Person-To-Person Communications Based on Biometrics Signals.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

An efficient certified e-mail scheme suitable for wireless mobile environments.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Security Analysis and Improvement of Return Routability Protocol.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Authenticating Query Results in Data Publishing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Privacy and Ownership Preserving of Outsourced Medical Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

Security Analysis and Fix of an Anonymous Credential System.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004

A smart-card-enabled privacy preserving E-prescription system.
IEEE Trans. Inf. Technol. Biomed., 2004

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2004

New efficient user identification and key distribution scheme providing enhanced security.
Comput. Secur., 2004

Highly reliable trust establishment scheme in ad hoc networks.
Comput. Networks, 2004

On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Anonymous Secure Routing in Mobile Ad-Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

On Security Notions of Steganographic Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Security Analysis of Two Signcryption Schemes.
Proceedings of the Information Security, 7th International Conference, 2004

A Block Oriented Fingerprinting Scheme in Relational Database.
Proceedings of the Information Security and Cryptology, 2004

On Security Notions for Steganalysis.
Proceedings of the Information Security and Cryptology, 2004

Progressive protection of jpeg2000 codestreams.
Proceedings of the 2004 International Conference on Image Processing, 2004

Compliant encryption of jpeg2000 codestreanis.
Proceedings of the 2004 International Conference on Image Processing, 2004

Dynamic Access Control for Multi-privileged Group Communications.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Trust Establishment in Large Scale Grid Settings.
Proceedings of the Grid and Cooperative Computing, 2004

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Content-aware authentication of motion JPEG2000 stream in lossy networks.
IEEE Trans. Consumer Electron., 2003

Computing of Trust in Distributed Networks.
IACR Cryptol. ePrint Arch., 2003

Security Analysis of Some Proxy Signatures.
IACR Cryptol. ePrint Arch., 2003

Flexible authentication of images.
Proceedings of the Visual Communications and Image Processing 2003, 2003

A flexible and scalable authentication scheme for JPEG2000 image codestreams.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.
Proceedings of the Information Security, 6th International Conference, 2003

Secure the image-based simulated telesurgery system.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

An Efficient Public-Key Framework.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

An Efficient Known Plaintext Attack on FEA-M.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Security Remarks on a Group Signature Scheme with Member Deletion.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Variations of Diffie-Hellman Problem.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

An improved personal CA for personal area networks.
Proceedings of the Global Telecommunications Conference, 2003

Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes.
Informatica (Slovenia), 2002

Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
IACR Cryptol. ePrint Arch., 2002

Defending against redirect attacks in mobile IP.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Security Analysis and Improvement of the Global Key Recovery System.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Proceedings of the Public Key Cryptography, 2001

Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems.
Proceedings of the Public Key Cryptography, 2001

An Optical Watermarking Solution for Authenticating Printed Documents.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Privacy Protection for Transactions of Digital Goods.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Multicast Internet protocol.
Comput. Commun., 2000

On the validity of digital signatures.
Comput. Commun. Rev., 2000

Electronic Payment Systems with Fair On-line Verification.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Some Remarks on a Fair Exchange Protocol.
Proceedings of the Public Key Cryptography, 2000

An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods.
Proceedings of the Information Security and Cryptology, 2000

Cryptanalysis of Polynominal Authentication and Signature Scheme.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Cryptanalysis of the <i>m</i>-Permutation Protection Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum.
Comput. Commun., 1999

Recovering modified watermarked images with reference to the original image.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation.
Proceedings of the Public Key Cryptography, 1999

Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Evolution of Fair Non-repudiation with TTP.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
A Ubiquitous Secure and Reliable Digital Data Depository System.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

Efficient and Practical Fair Exchange Protocols with Off-Line TTP.
Proceedings of the Security and Privacy, 1998

A Signcryption Scheme with Signature Directly Verifiable by Public Key.
Proceedings of the Public Key Cryptography, 1998

Improved Truncated Differential Attacks on SAFER.
Proceedings of the Advances in Cryptology, 1998

Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers.
Proceedings of the Advances in Cryptology, 1998

1997
Integrating Security in the CORBA Architecture.
Theory Pract. Object Syst., 1997

Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults.
Proceedings of the Security Protocols, 1997

Modified Finite Automata Public Key Cryptosystem.
Proceedings of the Information Security, First International Workshop, 1997

RSA-type Signatures in the Presence of Transient Faults.
Proceedings of the Cryptography and Coding, 1997

A New On-Line Cash Check Scheme.
Proceedings of the CCS '97, 1997

Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Practical Protocols for Certified Electronic Mail.
J. Netw. Syst. Manag., 1996

1995
A type I hybrid ARQ system with adaptive code rates.
IEEE Trans. Commun., 1995

Integrating security in CORBA based object architectures.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

1994
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems.
IEEE Trans. Inf. Theory, 1994

Hybrid ARQ schemes employing coded modulation and sequence combining.
IEEE Trans. Commun., 1994

Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems.
Comput. Commun., 1994

Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems.
Comput. Commun., 1994

Simulating a Multimedia FDDI Backbone Network.
Comput. J., 1994

1993
Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels.
IEEE Trans. Commun., 1993

A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks.
IEEE J. Sel. Areas Commun., 1993

Performance analysis of two bridged CSMA/CD networks.
Comput. Commun., 1993

Performance of a token-passing system with batch arrivals and its application to file transfers.
Comput. Commun., 1993

LAN-based medical visualization communication system.
Comput. Commun., 1993

Effects of station buffer capacity on token ring network performance.
Comput. Commun., 1993

Performance Analysis of Interconnected LANs with Server/Client Configuration.
Comput. Networks ISDN Syst., 1993

A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks.
Proceedings of the Integrated Network Management III, 1993

1991
End-to-end performance of interconnected LANs.
Comput. Commun., 1991

Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

1990
Trellis-coded multidimensional phase modulation.
IEEE Trans. Inf. Theory, 1990

Gateway Design for LAN Interconnection via ISDN.
Comput. Networks ISDN Syst., 1990

1989
Parity retransmission hybrid ARQ using rate 1/2 convolutional codes on a nonstationary channel.
IEEE Trans. Commun., 1989

High rate concatenated coding systems using multidimensional bandwidth-efficient trellis inner codes.
IEEE Trans. Commun., 1989

High rate concatenated coding systems using bandwidth efficient trellis inner codes.
IEEE Trans. Commun., 1989

1988
DC-free coset codes.
IEEE Trans. Inf. Theory, 1988

1987
Reliability and Throughput Analysis of a Concatenated Coding Scheme.
IEEE Trans. Commun., 1987

Decoding of DBEC-TBED Reed-Solomon Codes.
IEEE Trans. Computers, 1987


  Loading...