Robert H. Deng

From MaRDI portal
Revision as of 11:29, 28 January 2024 by Import240128110107 (talk | contribs) (Created automatically from import240128110107)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:244652

Available identifiers

zbMath Open deng.robert-huijieMaRDI QIDQ244652

List of research outcomes





PublicationDate of PublicationType
Structured encryption for knowledge graphs2024-03-07Paper
M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption2023-08-04Paper
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment2022-12-22Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles2022-10-28Paper
Server-aided revocable attribute-based encryption2022-08-19Paper
Server-Aided Revocable Identity-Based Encryption2022-08-19Paper
Revocable policy-based chameleon hash2022-06-15Paper
Private Information Retrieval Using Trusted Hardware2022-03-09Paper
Secure server-aided data sharing clique with attestation2021-04-19Paper
Key regeneration-free ciphertext-policy attribute-based encryption and its application2021-03-31Paper
Expressive query over outsourced encrypted data2020-09-08Paper
CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications2020-07-02Paper
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman2020-02-07Paper
Encrypted data processing with homomorphic re-encryption2020-02-07Paper
Escrow free attribute-based signature with self-revealability2020-01-06Paper
Privacy-preserving remote user authentication with \(k\)-times untraceability2019-10-31Paper
Fuzzy public-key encryption based on biometric data2018-11-07Paper
Adaptable key-policy attribute-based encryption with time interval2018-04-11Paper
Attribute-based encryption with expressive and authorized keyword search2017-08-25Paper
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains2017-05-16Paper
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures2017-01-06Paper
On the security of two identity-based conditional proxy re-encryption schemes2016-11-04Paper
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security2016-09-02Paper
Towards semantically secure outsourcing of association rule mining on categorical data2016-07-08Paper
CCA-Secure Keyed-Fully Homomorphic Encryption2016-04-13Paper
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext2015-11-20Paper
A note on the security of KHL scheme2015-09-25Paper
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security2015-08-27Paper
Verifiable Computation on Outsourced Encrypted Data2015-07-24Paper
Authorized Keyword Search on Encrypted Data2015-07-24Paper
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack2014-05-27Paper
Adaptable Ciphertext-Policy Attribute-Based Encryption2014-02-18Paper
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks2014-01-20Paper
Accountable Authority Identity-Based Encryption with Public Traceability2013-03-18Paper
Dynamic Secure Cloud Storage with Provenance2012-06-08Paper
General Construction of Chameleon All-But-One Trapdoor Functions2011-09-16Paper
Fully Secure Cipertext-Policy Hiding CP-ABE2011-05-19Paper
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security2011-03-15Paper
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings2011-01-28Paper
Cryptanalysis of a certificateless signcryption scheme in the standard model2011-01-28Paper
Achieving high security and efficiency in RFID-tagged supply chains2010-09-22Paper
A New Framework for RFID Privacy2010-09-20Paper
Efficient Unidirectional Proxy Re-Encryption2010-05-04Paper
Efficient CCA-Secure PKE from Identity-Based Techniques2010-03-16Paper
Efficient discrete logarithm based multi-signature scheme in the plain public key model2010-02-25Paper
Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation2010-02-09Paper
Multiuser private queries over encrypted databases2009-10-12Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security2009-09-29Paper
Conditional Proxy Broadcast Re-Encryption2009-06-25Paper
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme2009-03-06Paper
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings2009-01-09Paper
An Efficient PIR Construction Using Trusted Hardware2008-11-20Paper
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords2008-03-25Paper
Applied Cryptography and Network Security2008-02-19Paper
Routing optimization security in mobile IPv62007-03-15Paper
Access control protocols with two-layer architecture for wireless networks2007-01-09Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-16Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Information and Communications Security2005-08-19Paper
Information and Communications Security2005-08-19Paper
Efficient and robust key management for large mobile ad hoc networks2005-08-03Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q31548802005-01-14Paper
Highly reliable trust establishment scheme in ad hoc networks2004-11-12Paper
https://portal.mardi4nfdi.de/entity/Q44735952004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44129572003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q31497312002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q45015082002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q27245932002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q27245912002-07-16Paper
https://portal.mardi4nfdi.de/entity/Q42492612002-06-23Paper
https://portal.mardi4nfdi.de/entity/Q42492622002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q27630292002-01-14Paper
https://portal.mardi4nfdi.de/entity/Q44093542002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q49500342001-08-21Paper
https://portal.mardi4nfdi.de/entity/Q27211242001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27211522001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q42634161999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42506441999-11-02Paper
https://portal.mardi4nfdi.de/entity/Q42510061999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q38400781998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q44005771997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48572361996-06-19Paper
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems1994-10-04Paper
Performance analysis of interconnected LANs with server/client configuration1994-02-09Paper
Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels1994-02-07Paper
Trellis-coded multidimensional phase modulation1990-01-01Paper
DC-free coset codes1988-01-01Paper
Decoding of DBEC-TBED Reed-Solomon Codes1987-01-01Paper

Research outcomes over time

This page was built for person: Robert H. Deng