Follow
Robert H. Deng
Title
Cited by
Cited by
Year
HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing
Z Wan, JL Liu, RH Deng
Information Forensics and Security, IEEE Transactions on 7 (2), 743-754, 2012
6912012
Attribute-based encryption with verifiable outsourced decryption
J Lai, RH Deng, C Guan, J Weng
IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013
5132013
Efficient and practical fair exchange protocols with off-line TTP
F Bao, RH Deng, W Mao
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
4931998
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CK CHU, S Chow, WG Tzeng, J Zhou, RH DENG
IEEE Transactions on Parallel and Distributed Systems 25 (2), 468, 2014
4332014
Key-aggregate cryptosystem for scalable data sharing in cloud storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE transactions on parallel and distributed systems 25 (2), 468-477, 2013
4332013
Efficient unidirectional proxy re-encryption
SSM Chow, J Weng, Y Yang, RH Deng
Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on …, 2010
4202010
CrowdBC: A blockchain-based decentralized framework for crowdsourcing
M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng
IEEE Transactions on Parallel and Distributed Systems 30 (6), 1251-1266, 2018
3922018
Variations of diffie-hellman problem
F Bao, RH Deng, H Zhu
Information and Communications Security: 5th International Conference, ICICS …, 2003
3812003
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH DENG
3712014
Chosen-ciphertext secure proxy re-encryption without pairings
RH Deng, J Weng, S Liu, K Chen
Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008
3532008
Security and privacy in smart health: Efficient policy-hiding attribute-based access control
Y Zhang, D Zheng, RH Deng
IEEE Internet of Things Journal 5 (3), 2130-2145, 2018
3502018
A signcryption scheme with signature directly verifiable by public key
F Bao, RH Deng
Public Key Cryptography: First International Workshop on Practice and Theory …, 1998
3351998
Trellis coded multidimensional phase modulation
SS Pietrobon, RH Deng, A Lafanechere, G Ungerboeck, DJ Costello
IEEE Trans. on Information Theory 36, 63, 1990
3341990
Anonymous secure routing in mobile ad-hoc networks
B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng
29th annual IEEE international conference on local computer networks, 102-108, 2004
3212004
Practical protocols for certified electronic mail
RH Deng, L Gong, AA Lazar, W Wang
Journal of network and systems management 4, 279-297, 1996
3131996
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
Lecture Notes in Computer Science 4991, 71-85, 2008
3052008
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010
2722010
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems
YX Li, RH Deng, XM Wang
IEEE Transactions on Information Theory 40 (1), 271-273, 1994
2501994
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th international symposium on information, computer, and …, 2009
2422009
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
F Bao, RH Deng, Y Han, A Jeng, AD Narasimhalu, T Ngair
Security Protocols: 5th International Workshop Paris, France, April 7–9 …, 1998
2211998
The system can't perform the operation now. Try again later.
Articles 1–20