Robert H. Deng

From MaRDI portal
Person:244652

Available identifiers

zbMath Open deng.robert-huijieMaRDI QIDQ244652

List of research outcomes

PublicationDate of PublicationType
Structured encryption for knowledge graphs2024-03-07Paper
M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption2023-08-04Paper
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment2022-12-22Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles2022-10-28Paper
Server-aided revocable attribute-based encryption2022-08-19Paper
Server-Aided Revocable Identity-Based Encryption2022-08-19Paper
Revocable policy-based chameleon hash2022-06-15Paper
Private Information Retrieval Using Trusted Hardware2022-03-09Paper
Secure server-aided data sharing clique with attestation2021-04-19Paper
Key regeneration-free ciphertext-policy attribute-based encryption and its application2021-03-31Paper
Expressive query over outsourced encrypted data2020-09-08Paper
CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications2020-07-02Paper
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman2020-02-07Paper
Encrypted data processing with homomorphic re-encryption2020-02-07Paper
Escrow free attribute-based signature with self-revealability2020-01-06Paper
Privacy-preserving remote user authentication with \(k\)-times untraceability2019-10-31Paper
Fuzzy public-key encryption based on biometric data2018-11-07Paper
Adaptable key-policy attribute-based encryption with time interval2018-04-11Paper
Attribute-based encryption with expressive and authorized keyword search2017-08-25Paper
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains2017-05-16Paper
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures2017-01-06Paper
On the security of two identity-based conditional proxy re-encryption schemes2016-11-04Paper
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security2016-09-02Paper
Towards semantically secure outsourcing of association rule mining on categorical data2016-07-08Paper
CCA-Secure Keyed-Fully Homomorphic Encryption2016-04-13Paper
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext2015-11-20Paper
A note on the security of KHL scheme2015-09-25Paper
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security2015-08-27Paper
Verifiable Computation on Outsourced Encrypted Data2015-07-24Paper
Authorized Keyword Search on Encrypted Data2015-07-24Paper
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack2014-05-27Paper
Adaptable Ciphertext-Policy Attribute-Based Encryption2014-02-18Paper
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks2014-01-20Paper
Accountable Authority Identity-Based Encryption with Public Traceability2013-03-18Paper
Dynamic Secure Cloud Storage with Provenance2012-06-08Paper
General Construction of Chameleon All-But-One Trapdoor Functions2011-09-16Paper
Fully Secure Cipertext-Policy Hiding CP-ABE2011-05-19Paper
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security2011-03-15Paper
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings2011-01-28Paper
Cryptanalysis of a certificateless signcryption scheme in the standard model2011-01-28Paper
Achieving high security and efficiency in RFID-tagged supply chains2010-09-22Paper
A New Framework for RFID Privacy2010-09-20Paper
Efficient Unidirectional Proxy Re-Encryption2010-05-04Paper
Efficient CCA-Secure PKE from Identity-Based Techniques2010-03-16Paper
Efficient discrete logarithm based multi-signature scheme in the plain public key model2010-02-25Paper
Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation2010-02-09Paper
Multiuser private queries over encrypted databases2009-10-12Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security2009-09-29Paper
Conditional Proxy Broadcast Re-Encryption2009-06-25Paper
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme2009-03-06Paper
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings2009-01-09Paper
An Efficient PIR Construction Using Trusted Hardware2008-11-20Paper
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords2008-03-25Paper
Applied Cryptography and Network Security2008-02-19Paper
Routing optimization security in mobile IPv62007-03-15Paper
Access control protocols with two-layer architecture for wireless networks2007-01-09Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-16Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Information and Communications Security2005-08-19Paper
Information and Communications Security2005-08-19Paper
Efficient and robust key management for large mobile ad hoc networks2005-08-03Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q31548802005-01-14Paper
Highly reliable trust establishment scheme in ad hoc networks2004-11-12Paper
https://portal.mardi4nfdi.de/entity/Q44735952004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44129572003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q31497312002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q45015082002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q27245932002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q27245912002-07-16Paper
https://portal.mardi4nfdi.de/entity/Q42492612002-06-23Paper
https://portal.mardi4nfdi.de/entity/Q42492622002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q27630292002-01-14Paper
https://portal.mardi4nfdi.de/entity/Q44093542002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q49500342001-08-21Paper
https://portal.mardi4nfdi.de/entity/Q27211242001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27211522001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q42634161999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42506441999-11-02Paper
https://portal.mardi4nfdi.de/entity/Q42510061999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q38400781998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q44005771997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48572361996-06-19Paper
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems1994-10-04Paper
Performance analysis of interconnected LANs with server/client configuration1994-02-09Paper
Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels1994-02-07Paper
Trellis-coded multidimensional phase modulation1990-01-01Paper
DC-free coset codes1988-01-01Paper
Decoding of DBEC-TBED Reed-Solomon Codes1987-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Robert H. Deng