The following pages link to Robert H. Deng (Q244652):
Displaying 48 items.
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks (Q389368) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Cryptanalysis of a certificateless signcryption scheme in the standard model (Q621650) (← links)
- CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications (Q778412) (← links)
- Multiuser private queries over encrypted databases (Q843366) (← links)
- Efficient discrete logarithm based multi-signature scheme in the plain public key model (Q849361) (← links)
- Access control protocols with two-layer architecture for wireless networks (Q858210) (← links)
- Routing optimization security in mobile IPv6 (Q871131) (← links)
- Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext (Q893723) (← links)
- Fuzzy public-key encryption based on biometric data (Q1616901) (← links)
- Adaptable key-policy attribute-based encryption with time interval (Q1741937) (← links)
- Highly reliable trust establishment scheme in ad hoc networks (Q1886006) (← links)
- Revocable policy-based chameleon hash (Q2146158) (← links)
- Server-aided revocable attribute-based encryption (Q2165492) (← links)
- Expressive query over outsourced encrypted data (Q2198021) (← links)
- Escrow free attribute-based signature with self-revealability (Q2282038) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- Encrypted data processing with homomorphic re-encryption (Q2293264) (← links)
- Privacy-preserving remote user authentication with \(k\)-times untraceability (Q2331995) (← links)
- Attribute-based encryption with expressive and authorized keyword search (Q2399949) (← links)
- Efficient and robust key management for large mobile ad hoc networks (Q2484985) (← links)
- Towards semantically secure outsourcing of association rule mining on categorical data (Q2629963) (← links)
- Key regeneration-free ciphertext-policy attribute-based encryption and its application (Q2660936) (← links)
- Secure server-aided data sharing clique with attestation (Q2663469) (← links)
- (Q2721124) (← links)
- (Q2721152) (← links)
- (Q2724591) (← links)
- (Q2724593) (← links)
- (Q2763029) (← links)
- CCA-Secure Keyed-Fully Homomorphic Encryption (Q2798772) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- Dynamic Secure Cloud Storage with Provenance (Q2889794) (← links)
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security (Q2941210) (← links)
- An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures (Q2953846) (← links)
- A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains (Q2985147) (← links)
- Fully Secure Cipertext-Policy Hiding CP-ABE (Q3001861) (← links)
- Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security (Q3084350) (← links)
- General Construction of Chameleon All-But-One Trapdoor Functions (Q3092363) (← links)
- (Q3149731) (← links)
- (Q3154880) (← links)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security (Q3399207) (← links)
- Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation (Q3404396) (← links)
- Applied Cryptography and Network Security (Q4680956) (← links)
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles (Q5046387) (← links)
- Applied Cryptography and Network Security (Q5443120) (← links)
- Structured encryption for knowledge graphs (Q6191637) (← links)