Robert Huijie Deng
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
138 | EE | Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai: Conditional proxy re-encryption secure against chosen-ciphertext attack. ASIACCS 2009: 322-332 |
137 | EE | Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou: RSA-Based Certificateless Public Key Encryption. ISPEC 2009: 24-34 |
136 | EE | Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng: Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383 |
135 | EE | Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu: Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395 |
134 | EE | Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58 |
2008 | ||
133 | EE | Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17 |
132 | EE | Huafei Zhu, Feng Bao, Robert H. Deng: Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641 |
131 | EE | Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei: Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. ICYCS 2008: 2347-2353 |
130 | EE | Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng: Distinguishing between FE and DDoS Using Randomness Check. ISC 2008: 131-145 |
129 | EE | Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao: An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 |
128 | EE | Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang: Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 |
127 | EE | Liang Gu, Xuhua Ding, Robert Huijie Deng, Bing Xie, Hong Mei: Remote attestation on program execution. STC 2008: 11-20 |
126 | EE | Tieyan Li, Guilin Wang, Robert H. Deng: Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. JSW 3(3): 1-10 (2008) |
125 | EE | Tieyan Li, Robert H. Deng, Guilin Wang: The security and improvement of an ultra-lightweight RFID authentication protocol. Security and Communication Networks 1(2): 135-146 (2008) |
2007 | ||
124 | EE | Yongdong Wu, Feng Bao, Robert H. Deng: Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183 |
123 | EE | Tieyan Li, Robert H. Deng: Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. ARES 2007: 238-245 |
122 | EE | Yanjiang Yang, Yingjiu Li, Robert H. Deng: New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258 |
121 | EE | Feng Bao, Robert H. Deng: Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. GLOBECOM 2007: 188-192 |
120 | EE | Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel: n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. ICICS 2007: 31-43 |
119 | EE | Yanjiang Yang, Robert H. Deng, Feng Bao: Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192 |
118 | EE | Robert H. Deng, Yanjiang Yang: Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. ISPEC 2007: 284-300 |
117 | EE | Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau: Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481 |
116 | EE | Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda: Access control protocols with two-layer architecture for wireless networks. Computer Networks 51(3): 655-670 (2007) |
115 | EE | Yongdong Wu, Di Ma, Robert H. Deng: Flexible Access Control to JPEG 2000 Image Code-Streams. IEEE Transactions on Multimedia 9(6): 1314-1324 (2007) |
2006 | ||
114 | Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006 | |
113 | EE | Yanjiang Yang, Robert H. Deng, Feng Bao: Fortifying password authentication in integrated healthcare delivery systems. ASIACCS 2006: 255-265 |
112 | EE | Yingjiu Li, Robert Huijie Deng: Publicly verifiable ownership protection for relational databases. ASIACCS 2006: 78-89 |
111 | EE | Yanjiang Yang, Robert H. Deng, Feng Bao: Practical private data matching deterrent to spoofing attacks. CIKM 2006: 852-853 |
110 | EE | Daniel J. T. Chong, Robert H. Deng: Privacy-enhanced superdistribution of layered content with trusted access control. Digital Rights Management Workshop 2006: 37-44 |
109 | EE | Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao: Private Information Retrieval Using Trusted Hardware. ESORICS 2006: 49-64 |
108 | EE | Yingjiu Li, Haibing Lu, Robert H. Deng: Practical Inference Control for Data Cubes (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 115-120 |
107 | EE | Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen: Rights Protection for Data Cubes. ISC 2006: 359-372 |
106 | EE | Ying Qiu, Jianying Zhou, Feng Bao, Robert H. Deng: Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830 |
105 | EE | Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006) |
104 | EE | Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng: A secure extension of the Kwak-Moon group signcryption scheme. Computers & Security 25(6): 435-444 (2006) |
103 | EE | Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao: Three architectures for trusted data dissemination in edge computing. Data Knowl. Eng. 58(3): 381-409 (2006) |
102 | EE | Yanjiang Yang, Robert H. Deng, Feng Bao: A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Sec. Comput. 3(2): 105-114 (2006) |
101 | EE | Yongdong Wu, Robert H. Deng: Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia 8(1): 152-161 (2006) |
100 | EE | Zhiguo Wan, Feng Bao, Robert H. Deng, Akkihebbal L. Ananda: Security analysis on a conference scheme for mobile communications. IEEE Transactions on Wireless Communications 5(6): 1238-1240 (2006) |
99 | EE | Jianying Zhou, Feng Bao, Robert H. Deng: Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006) |
2005 | ||
98 | Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Springer 2005 | |
97 | Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005 | |
96 | EE | Yanjiang Yang, Feng Bao, Robert H. Deng: Security Analysis and Fix of an Anonymous Credential System. ACISP 2005: 537-547 |
95 | EE | Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng: Privacy and Ownership Preserving of Outsourced Medical Data. ICDE 2005: 521-532 |
94 | EE | Huafei Zhu, Feng Bao, Robert H. Deng: Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219 |
93 | EE | Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou: Authenticating Query Results in Data Publishing. ICICS 2005: 376-388 |
92 | EE | Shuhong Wang, Feng Bao, Robert H. Deng: Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. ICICS 2005: 53-60 |
91 | EE | Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 |
90 | EE | Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao: Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. LCN 2005: 328-335 |
89 | EE | Ying Qiu, Jianying Zhou, Robert H. Deng: Security Analysis and Improvement of Return Routability Protocol. MADNES 2005: 174-181 |
88 | Yongdong Wu, Feng Bao, Robert H. Deng: Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222 | |
87 | Yongdong Wu, Tieyan Li, Robert H. Deng: Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476 | |
86 | Yanjiang Yang, Feng Bao, Robert H. Deng: A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112 | |
85 | EE | Yunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao: Practical Zero-Knowledge Arguments from Sigma-Protocols. WINE 2005: 288-298 |
84 | EE | Feng Bao, Robert H. Deng: Protocols that hide user's preferences in electronic transactions. Computer Networks 48(4): 503-515 (2005) |
83 | EE | Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang: Efficient and robust key management for large mobile ad hoc networks. Computer Networks 48(4): 657-682 (2005) |
82 | EE | Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng: Generic yet Practical ZK Arguments from any Public-Coin HVZK Electronic Colloquium on Computational Complexity (ECCC)(162): (2005) |
81 | EE | Yongdong Wu, Robert H. Deng: Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Techn. 15(1): 161-163 (2005) |
80 | EE | Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen: New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. IEEE Trans. Computers 54(12): 1473-1483 (2005) |
79 | EE | Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen: New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. IEEE Trans. Computers 54(9): 1071-1080 (2005) |
78 | EE | Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang: Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Transactions on Information Technology in Biomedicine 9(4): 554-563 (2005) |
77 | EE | Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu: Scalable trusted online dissemination of JPEG2000 images. Multimedia Syst. 11(1): 60-67 (2005) |
2004 | ||
76 | Feng Bao, Robert H. Deng, Jianying Zhou: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Springer 2004 | |
75 | EE | Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi: Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 |
74 | EE | Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 |
73 | EE | Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li: Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519 |
72 | EE | Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91 |
71 | Yongdong Wu, Robert H. Deng: Compliant encryption of jpeg2000 codestreanis. ICIP 2004: 3439-3442 | |
70 | Yongdong Wu, Di Ma, Robert H. Deng: Progressive protection of jpeg2000 codestreams. ICIP 2004: 3447-3450 | |
69 | EE | Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim: On Security Notions for Steganalysis. ICISC 2004: 440-454 |
68 | EE | Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao: A Block Oriented Fingerprinting Scheme in Relational Database. ICISC 2004: 455-466 |
67 | EE | Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon: Security Analysis of Two Signcryption Schemes. ISC 2004: 123-133 |
66 | EE | Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim: On Security Notions of Steganographic Systems. IWDW 2004: 137-151 |
65 | EE | Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Anonymous Secure Routing in Mobile Ad-Hoc Networks. LCN 2004: 102-108 |
64 | EE | Guilin Wang, Jianying Zhou, Robert H. Deng: On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298 |
63 | EE | Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim: Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45(6): 687-699 (2004) |
62 | EE | Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng: New efficient user identification and key distribution scheme providing enhanced security. Computers & Security 23(8): 697-704 (2004) |
61 | EE | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) |
60 | Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng: A smart-card-enabled privacy preserving E-prescription system. IEEE Transactions on Information Technology in Biomedicine 8(1): 47-58 (2004) | |
2003 | ||
59 | EE | Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao: A flexible and scalable authentication scheme for JPEG2000 image codestreams. ACM Multimedia 2003: 433-441 |
58 | EE | Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 |
57 | EE | Yongdong Wu, Robert H. Deng: Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. ICICS 2003: 238-248 |
56 | EE | Feng Bao, Robert H. Deng, Huafei Zhu: Variations of Diffie-Hellman Problem. ICICS 2003: 301-312 |
55 | EE | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 |
54 | EE | Hongjun Wu, Feng Bao, Robert H. Deng: An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87 |
53 | EE | Jianying Zhou, Feng Bao, Robert H. Deng: An Efficient Public-Key Framework. ICICS 2003: 88-99 |
52 | EE | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319 |
51 | EE | Jianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110 |
50 | EE | Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng: Secure the image-based simulated telesurgery system. ISCAS (2) 2003: 596-599 |
49 | Yanjiang Yang, Feng Bao, Robert H. Deng: Flexible authentication of images. VCIP 2003: 1905-1911 | |
2002 | ||
48 | Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Springer 2002 | |
47 | EE | Yanjiang Yang, Feng Bao, Robert H. Deng: Security Analysis and Improvement of the Global Key Recovery System. ACISP 2002: 17-24 |
46 | EE | Robert H. Deng, Jianying Zhou, Feng Bao: Defending against redirect attacks in mobile IP. ACM Conference on Computer and Communications Security 2002: 59-67 |
45 | Hongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Informatica (Slovenia) 26(3): (2002) | |
2001 | ||
44 | EE | Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu: Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ACISP 2001: 190-205 |
43 | EE | Feng Bao, Robert H. Deng: Privacy Protection for Transactions of Digital Goods. ICICS 2001: 202-213 |
42 | EE | Qibin Sun, Peirong Feng, Robert H. Deng: An Optical Watermarking Solution for Authenticating Printed Documents. ITCC 2001: 65-70 |
41 | EE | Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu: Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164 |
40 | EE | Hongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: 173-179 |
2000 | ||
39 | Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288 | |
38 | Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111 | |
37 | EE | Feng Bao, Robert H. Deng, Peirong Feng: An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. ICISC 2000: 162-170 |
36 | Jianying Zhou, Robert H. Deng, Feng Bao: Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57 | |
35 | Feng Bao, Robert H. Deng, Jianying Zhou: Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460 | |
34 | EE | Xinkai Wang, Robert H. Deng, Feng Bao: Multicast Internet protocol. Computer Communications 23(11): 1047-1054 (2000) |
1999 | ||
33 | EE | Jianying Zhou, Robert H. Deng, Feng Bao: Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269 |
32 | EE | Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan: Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863 |
31 | EE | Feng Bao, Robert H. Deng: A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Public Key Cryptography 1999: 1-11 |
30 | EE | Robert H. Deng: Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. Computer Communications 22(6): 591- (1999) |
1998 | ||
29 | EE | Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. ASIACRYPT 1998: 126-132 |
28 | EE | Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Improved Truncated Differential Attacks on SAFER. ASIACRYPT 1998: 133-147 |
27 | EE | Feng Bao, Robert H. Deng, Wenbo Mao: Efficient and Practical Fair Exchange Protocols with Off-Line TTP. IEEE Symposium on Security and Privacy 1998: 77-85 |
26 | EE | Feng Bao, Robert H. Deng: A Signcryption Scheme with Signature Directly Verifiable by Public Key. Public Key Cryptography 1998: 55-59 |
25 | EE | Robert H. Deng, Jian Hu, Feng Bao, A. Desai Narasimhalu: A Ubiquitous Secure and Reliable Digital Data Depository System. WETICE 1998: 354-358 |
1997 | ||
24 | Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng: Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. ACISP 1997: 261-270 | |
23 | EE | Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair: A New On-Line Cash Check Scheme. ACM Conference on Computer and Communications Security 1997: 111-116 |
22 | Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng: RSA-type Signatures in the Presence of Transient Faults. IMA Int. Conf. 1997: 155-160 | |
21 | Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi: Modified Finite Automata Public Key Cryptosystem. ISW 1997: 82-95 | |
20 | Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair: Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Security Protocols Workshop 1997: 115-124 | |
19 | Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar: Integrating Security in the CORBA Architecture. TAPOS 3(1): 3-13 (1997) | |
1996 | ||
18 | EE | Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang: Practical Protocols for Certified Electronic Mail. J. Network Syst. Manage. 4(3): (1996) |
1994 | ||
17 | Kisenchand Ranai, Koon Seng Lim, Robert H. Deng: Simulating a Multimedia FDDI Backbone Network. Comput. J. 37(3): 188-198 (1994) | |
16 | EE | Koon Seng Lim, Robert H. Deng, Kisenchand Ranai: Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. Computer Communications 17(4): 251-256 (1994) |
15 | Yuan Xing Li, Robert H. Deng, Xin-mei Wang: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Transactions on Information Theory 40(1): 271- (1994) | |
1993 | ||
14 | Robert H. Deng, Aurel A. Lazar, Weiguo Wang: A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks. Integrated Network Management 1993: 697-708 | |
13 | EE | Robert H. Deng, Wendy C. L. Chiew: Effects of station buffer capacity on token ring network performance. Computer Communications 16(6): 366-375 (1993) |
12 | EE | Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang: Performance of a token-passing system with batch arrivals and its application to file transfers. Computer Communications 16(7): 422-431 (1993) |
11 | EE | Chi Chung Ko, W. C. Wong, J. L. Du, Robert H. Deng, Kin Mun Lye: Performance analysis of two bridged CSMA/CD networks. Computer Communications 16(8): 501-510 (1993) |
10 | EE | Robert H. Deng, Renben Shu: LAN-based medical visualization communication system. Computer Communications 16(8): 518-525 (1993) |
9 | Jiangling Du, Robert H. Deng, Chi Chung Ko: Performance Analysis of Interconnected LANs with Server/Client Configuration. Computer Networks and ISDN Systems 25(12): 1321-1333 (1993) | |
8 | Robert H. Deng, Aurel A. Lazar, Weiguo Wang: A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks. IEEE Journal on Selected Areas in Communications 11(9): 1438-1448 (1993) | |
1991 | ||
7 | Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang: Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs. INFOCOM 1991: 1041-1049 | |
6 | Robert H. Deng, Wendy C. L. Chiew, Kuan-Tsae Huang: Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations. INFOCOM 1991: 202-210 | |
5 | EE | Brigitte Berg, Robert H. Deng: End-to-end performance of interconnected LANs. Computer Communications 14(2): 105-112 (1991) |
1990 | ||
4 | Xian-Yu Zhang, Robert H. Deng: Gateway Design for LAN Interconnection via ISDN. Computer Networks and ISDN Systems 19(1): 43-51 (1990) | |
3 | Steven S. Pietrobon, Robert H. Deng, Alain Lafanechére, Gottfried Ungerboeck, Daniel J. Costello Jr.: Trellis-coded multidimensional phase modulation. IEEE Transactions on Information Theory 36(1): 63-89 (1990) | |
1988 | ||
2 | Robert H. Deng, Mark A. Herro: DC-free coset codes. IEEE Transactions on Information Theory 34(4): 786-792 (1988) | |
1987 | ||
1 | Robert H. Deng, Daniel J. Costello Jr.: Decoding of DBEC-TBED Reed-Solomon Codes. IEEE Trans. Computers 36(11): 1359-1363 (1987) |