Rong-Jaye Chen

According to our database1, Rong-Jaye Chen authored at least 47 papers between 1988 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Reversible Data Hiding in Encrypted Image Based on Flipping MSB Encryption Process.
Proceedings of the ICFET 2020, 2020

2017
An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem.
Int. J. Comput. Math., 2017

2016
Towards Position-Aware Symbol-Based Searches on Encrypted Data from Symmetric Predicate Encryption Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
Cryptanalysis and Improvement of an Encoding Method for Private-Key Hidden Vector Encryptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy.
IACR Cryptol. ePrint Arch., 2014

A Privacy-Preserving Encoding for Efficient Comparison Queries and Access Control from Predicate Encryption.
Proceedings of the Intelligent Systems and Applications, 2014

2013
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Statistics on Encrypted Cloud Data.
Proceedings of the Advances in Information and Computer Security, 2013

2012
Toward Authenticated and Complete Query Results from Cloud Storages.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper Detection.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Ensuring correctness of range searches on encrypted cloud data.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Design for a secure interoperable cloud-based Personal Health Record service.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
A Secure Reed-Solomon Code Incentive Scheme for Commercial Ad Dissemination Over VANETs.
IEEE Trans. Veh. Technol., 2011

2009
An Analysis of Hierarchical Identity-Based Cryptosystems.
Proceedings of the 2009 International Conference on Foundations of Computer Science, 2009

2008
Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations.
IEEE Trans. Inf. Theory, 2008

2007
Distance preserving mappings from ternary vectors to permutations
CoRR, 2007

2006
An efficient identity-based cryptosystem for end-to-end mobile security.
IEEE Trans. Wirel. Commun., 2006

New simple constructions of distance-increasing mappings from binary vectors to permutations.
Inf. Process. Lett., 2006

End-to-end security mechanisms for SMS.
Int. J. Secur. Networks, 2006

2005
Authenticated public-key distribution over WLAN/cellular dual networks.
Proceedings of the ITRE 2005, 2005

2003
Distance-preserving mappings from binary vectors to permutations.
IEEE Trans. Inf. Theory, 2003

An Efficient Algorithm for the Reliability of Consecutive-k-n Networks.
J. Inf. Sci. Eng., 2003

2002
The Structural Birnbaum Importance of Consecutive-k Systems.
J. Comb. Optim., 2002

2001
Adaptive Schemes for Reducing Power Consumption of Mobile Data Handsets.
J. Interconnect. Networks, 2001

Graph Embedding Aspect of IEH Graphs.
J. Inf. Sci. Eng., 2001

2000
Performance Analysis for Dual Band PCS Networks.
IEEE Trans. Computers, 2000

A new random walk model for PCS networks.
IEEE J. Sel. Areas Commun., 2000

Incrementally Extensible Folded Hypercube Graphs.
J. Inf. Sci. Eng., 2000

1998
On the Arrangement Graph.
Inf. Process. Lett., 1998

Topological Properties of the (n, k)-Star Graph.
Int. J. Found. Comput. Sci., 1998

1997
Embedding Cycles in IEH Graphs.
Inf. Process. Lett., 1997

1996
Topological properties of hierarchical cubic networks.
J. Syst. Archit., 1996

Multilevel Hypercubes: An Efficient Class of Hypercube Interconnection Networks for Massively Parallel Systems.
J. Inf. Sci. Eng., 1996

Optimal Embedding of Large Complete Binary Trees into Hypercubes.
J. Inf. Sci. Eng., 1996

1995
Poisson Generators on Mesh-Connected Computers with Multiple Broadcasting.
J. Inf. Sci. Eng., 1995

The (n, k)-Star Graph: A Generalized Star Graph.
Inf. Process. Lett., 1995

Compact Embedding of Binary Trees Into Hyperacubes.
Inf. Process. Lett., 1995

1994
Distributed Fault-Tolerant Routing in Kautz Networks.
J. Parallel Distributed Comput., 1994

Pyramided Hypercube: An Extendable Cubic Network with Fixed Degree.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994

1993
Manipulating multiple stacks with ordered-heap.
Inf. Sci., 1993

The Towers of Hanoi Problem with Cyclic Parallel Moves.
Inf. Process. Lett., 1993

A Genetic Algorithm for Diversity Minimization and Its Parallel Implementation.
Proceedings of the 5th International Conference on Genetic Algorithms, 1993

1992
The Towers of Hanoi Problem with Parallel Moves.
Inf. Process. Lett., 1992

Non-Associative Parallel Prefix Computation.
Inf. Process. Lett., 1992

Competitive Analysis of the On-line Algorithms for Multiple Stacks Sysytems.
Proceedings of the Algorithms and Computation, Third International Symposium, 1992

1991
A Branch-and-Bound Algorithm for Single-Row Routing.
J. Inf. Sci. Eng., 1991

1988
Parallel optimization for traffic assignment.
Math. Program., 1988


  Loading...