dblp.uni-trier.dewww.uni-trier.de

Chunming Rong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
33 Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang, Jianhua Ma: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings Springer 2008
32 Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence Tianruo Yang, Jianhua Ma: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings Springer 2008
31EEFurong Wang, Chen Huang, Jing Zhao, Chunming Rong: IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. AINA 2008: 978-984
30EEKari Anne Haaland Thorsen, Chunming Rong: Data Integration in Oil and Gas at Norwegian Continental Shelf. AINA Workshops 2008: 1597-1602
29EEYi Wang, Furong Wang, Chunming Rong, Sufang Wang: SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. AINA Workshops 2008: 639-643
28EEZhengxin Lu, Chen Huang, Furong Wang, Chunming Rong: SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. ATC 2008: 134-148
27EETao Yang, Ye Huang, Jianxin Chen, Geng Yang, Chunming Rong: Di-GAFR: Directed Greedy Adaptive Face-Based Routing. ATC 2008: 555-566
26EEYan Liang, Chunming Rong: RFID System Security Using Identity-Based Cryptography. UIC 2008: 482-489
25EEKari Anne Haaland Thorsen, Chunming Rong: Towards Dataintegration from WITSML to ISO 15926. UIC 2008: 626-635
24EEKari Anne Haaland Thorsen, Chunming Rong: On Ubiquitous Integrated Computing. IJCSA 5(3): 46-55 (2008)
23EEGeorge O. M. Yee, Chunming Rong, Laurence Tianruo Yang: Guest Editors' Introduction. Journal of Computer Security 16(3): 261-264 (2008)
22EEJanne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong: Protection against unauthorized access and computer crime in Norwegian enterprises. Journal of Computer Security 16(3): 341-366 (2008)
2007
21EEChunming Rong, Won-Chol Kim: Effective Storage Security in Incompletely Trusted Environment. AINA Workshops (1) 2007: 432-437
20EEJanne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong: Information Security Threats and Access Control Practices in Norwegian Businesses. AINA Workshops (1) 2007: 470-476
19EEChunming Rong, Hein Meling, Dagfinn Waage: Towards Integrated Services for Health Monitoring. AINA Workshops (2) 2007: 776-781
18EESon Thanh Nguyen, Chunming Rong: ZigBee Security Using Identity-Based Cryptography. ATC 2007: 3-12
17EESon Thanh Nguyen, Chunming Rong: Electronic Payment Scheme Using Identity-Based Cryptography. EuroPKI 2007: 330-337
2006
16EEAnne Marie Hegland, Eli Winjum, Pål Spilling, Chunming Rong, Øivind Kure: Analysis of IBS for MANET Security in Emergency and Rescue Operations. AINA (2) 2006: 155-159
15EEChristian Veigner, Chunming Rong: On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. ATC 2006: 521-530
14EEPeng Jiang, Geng Yang, Chunming Rong: Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method. International Conference on Computational Science (1) 2006: 794-797
13EEPeng Jiang, Geng Yang, Chunming Rong: Combined Method for Nonlinear Systems of Equations. International Conference on Computational Science (4) 2006: 693-699
12 Christian Veigner, Chunming Rong: On Use of Identity-Based Encryption for Secure Emailing. SECRYPT 2006: 289-296
11 Kari Anne Haaland, Chunming Rong: Securing Web Services Using Identity-Based Encryption (IBE). SECRYPT 2006: 413-418
2005
10 Christian Veigner, Chunming Rong: Flooding attack on the binding cache in mobile IPv6. ICETE 2005: 36-43
9EEQuan Zhou, Geng Yang, Jiangang Shen, Chunming Rong: A Scalable Security Architecture for Grid. PDCAT 2005: 89-93
2003
8EEGeng Yang, Chunming Rong, Yunping Dai: A Distributed Honeypot System for Grid Security. GCC (1) 2003: 1083-1086
7 Stig Fr. Mjølsnes, Chunming Rong: On-Line E-Wallet System with Decentralized Credential Keepers. MONET 8(1): 87-99 (2003)
2001
6EETor Helleseth, Chunming Rong, Kyeongcheol Yang: New 3-designs from Goethals codes over Z4. Discrete Mathematics 226(1-3): 403-409 (2001)
5EETor Helleseth, Chunming Rong, Kyeongcheol Yang: On t-designs from codes over Z4. Discrete Mathematics 238(1-3): 67-80 (2001)
1999
4 Iwan M. Duursma, Tor Helleseth, Chunming Rong, Kyeongcheol Yang: Split Weight Enumerators for the Preparata Codes with Applications to Designs. Des. Codes Cryptography 18(1/3): 103-124 (1999)
3EETor Helleseth, Chunming Rong, Kyeongcheol Yang: New infinite families of 3-designs from preparata codes over Z4. Discrete Mathematics 195(1-3): 139-156 (1999)
2 Tor Helleseth, Chunming Rong, Daniel Sandberg: New Families of Almost Perfect Nonlinear Power Mappings. IEEE Transactions on Information Theory 45(2): 475-485 (1999)
1 Chunming Rong, Tor Helleseth, Jyrki T. Lahtonen: On algebraic decoding of the Z4-linear Calderbank-McGuire code. IEEE Transactions on Information Theory 45(5): 1423-1434 (1999)

Coauthor Index

1Jianxin Chen [27]
2Yunping Dai [8]
3Iwan M. Duursma [4]
4Janne Merete Hagen [20] [22]
5Anne Marie Hegland [16]
6Tor Helleseth [1] [2] [3] [4] [5] [6]
7Chen Huang [28] [31]
8Ye Huang [27]
9Martin Gilje Jaatun [33]
10Peng Jiang [13] [14]
11Won-Chol Kim [21]
12Øivind Kure [16]
13Jyrki T. Lahtonen [1]
14Yan Liang [26]
15Zhengxin Lu [28]
16Jianhua Ma [32] [33]
17Hein Meling [19]
18Stig Fr. Mjølsnes [7]
19Son Thanh Nguyen [17] [18]
20Daniel Sandberg [2]
21Frode Eika Sandnes [32] [33]
22Jiangang Shen [9]
23Tormod Kalberg Sivertsen [20] [22]
24Pål Spilling [16]
25Kari Anne Haaland Thorsen (Kari Anne Haaland) [11] [24] [25] [30]
26Christian Veigner [10] [12] [15]
27Dagfinn Waage [19]
28Furong Wang [28] [29] [31]
29Sufang Wang [29]
30Yi Wang [29]
31Eli Winjum [16]
32Geng Yang [8] [9] [13] [14] [27]
33Kyeongcheol Yang [3] [4] [5] [6]
34Laurence Tianruo Yang [23] [32] [33]
35Tao Yang [27]
36George O. M. Yee [23]
37Yan Zhang [32]
38Jing Zhao [31]
39Quan Zhou [9]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)