2008 |
33 | | Chunming Rong,
Martin Gilje Jaatun,
Frode Eika Sandnes,
Laurence Tianruo Yang,
Jianhua Ma:
Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings
Springer 2008 |
32 | | Frode Eika Sandnes,
Yan Zhang,
Chunming Rong,
Laurence Tianruo Yang,
Jianhua Ma:
Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings
Springer 2008 |
31 | EE | Furong Wang,
Chen Huang,
Jing Zhao,
Chunming Rong:
IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks.
AINA 2008: 978-984 |
30 | EE | Kari Anne Haaland Thorsen,
Chunming Rong:
Data Integration in Oil and Gas at Norwegian Continental Shelf.
AINA Workshops 2008: 1597-1602 |
29 | EE | Yi Wang,
Furong Wang,
Chunming Rong,
Sufang Wang:
SPM: A Security Policy Based on Micropayment in Ad Hoc Networks.
AINA Workshops 2008: 639-643 |
28 | EE | Zhengxin Lu,
Chen Huang,
Furong Wang,
Chunming Rong:
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks.
ATC 2008: 134-148 |
27 | EE | Tao Yang,
Ye Huang,
Jianxin Chen,
Geng Yang,
Chunming Rong:
Di-GAFR: Directed Greedy Adaptive Face-Based Routing.
ATC 2008: 555-566 |
26 | EE | Yan Liang,
Chunming Rong:
RFID System Security Using Identity-Based Cryptography.
UIC 2008: 482-489 |
25 | EE | Kari Anne Haaland Thorsen,
Chunming Rong:
Towards Dataintegration from WITSML to ISO 15926.
UIC 2008: 626-635 |
24 | EE | Kari Anne Haaland Thorsen,
Chunming Rong:
On Ubiquitous Integrated Computing.
IJCSA 5(3): 46-55 (2008) |
23 | EE | George O. M. Yee,
Chunming Rong,
Laurence Tianruo Yang:
Guest Editors' Introduction.
Journal of Computer Security 16(3): 261-264 (2008) |
22 | EE | Janne Merete Hagen,
Tormod Kalberg Sivertsen,
Chunming Rong:
Protection against unauthorized access and computer crime in Norwegian enterprises.
Journal of Computer Security 16(3): 341-366 (2008) |
2007 |
21 | EE | Chunming Rong,
Won-Chol Kim:
Effective Storage Security in Incompletely Trusted Environment.
AINA Workshops (1) 2007: 432-437 |
20 | EE | Janne Merete Hagen,
Tormod Kalberg Sivertsen,
Chunming Rong:
Information Security Threats and Access Control Practices in Norwegian Businesses.
AINA Workshops (1) 2007: 470-476 |
19 | EE | Chunming Rong,
Hein Meling,
Dagfinn Waage:
Towards Integrated Services for Health Monitoring.
AINA Workshops (2) 2007: 776-781 |
18 | EE | Son Thanh Nguyen,
Chunming Rong:
ZigBee Security Using Identity-Based Cryptography.
ATC 2007: 3-12 |
17 | EE | Son Thanh Nguyen,
Chunming Rong:
Electronic Payment Scheme Using Identity-Based Cryptography.
EuroPKI 2007: 330-337 |
2006 |
16 | EE | Anne Marie Hegland,
Eli Winjum,
Pål Spilling,
Chunming Rong,
Øivind Kure:
Analysis of IBS for MANET Security in Emergency and Rescue Operations.
AINA (2) 2006: 155-159 |
15 | EE | Christian Veigner,
Chunming Rong:
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption.
ATC 2006: 521-530 |
14 | EE | Peng Jiang,
Geng Yang,
Chunming Rong:
Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method.
International Conference on Computational Science (1) 2006: 794-797 |
13 | EE | Peng Jiang,
Geng Yang,
Chunming Rong:
Combined Method for Nonlinear Systems of Equations.
International Conference on Computational Science (4) 2006: 693-699 |
12 | | Christian Veigner,
Chunming Rong:
On Use of Identity-Based Encryption for Secure Emailing.
SECRYPT 2006: 289-296 |
11 | | Kari Anne Haaland,
Chunming Rong:
Securing Web Services Using Identity-Based Encryption (IBE).
SECRYPT 2006: 413-418 |
2005 |
10 | | Christian Veigner,
Chunming Rong:
Flooding attack on the binding cache in mobile IPv6.
ICETE 2005: 36-43 |
9 | EE | Quan Zhou,
Geng Yang,
Jiangang Shen,
Chunming Rong:
A Scalable Security Architecture for Grid.
PDCAT 2005: 89-93 |
2003 |
8 | EE | Geng Yang,
Chunming Rong,
Yunping Dai:
A Distributed Honeypot System for Grid Security.
GCC (1) 2003: 1083-1086 |
7 | | Stig Fr. Mjølsnes,
Chunming Rong:
On-Line E-Wallet System with Decentralized Credential Keepers.
MONET 8(1): 87-99 (2003) |
2001 |
6 | EE | Tor Helleseth,
Chunming Rong,
Kyeongcheol Yang:
New 3-designs from Goethals codes over Z4.
Discrete Mathematics 226(1-3): 403-409 (2001) |
5 | EE | Tor Helleseth,
Chunming Rong,
Kyeongcheol Yang:
On t-designs from codes over Z4.
Discrete Mathematics 238(1-3): 67-80 (2001) |
1999 |
4 | | Iwan M. Duursma,
Tor Helleseth,
Chunming Rong,
Kyeongcheol Yang:
Split Weight Enumerators for the Preparata Codes with Applications to Designs.
Des. Codes Cryptography 18(1/3): 103-124 (1999) |
3 | EE | Tor Helleseth,
Chunming Rong,
Kyeongcheol Yang:
New infinite families of 3-designs from preparata codes over Z4.
Discrete Mathematics 195(1-3): 139-156 (1999) |
2 | | Tor Helleseth,
Chunming Rong,
Daniel Sandberg:
New Families of Almost Perfect Nonlinear Power Mappings.
IEEE Transactions on Information Theory 45(2): 475-485 (1999) |
1 | | Chunming Rong,
Tor Helleseth,
Jyrki T. Lahtonen:
On algebraic decoding of the Z4-linear Calderbank-McGuire code.
IEEE Transactions on Information Theory 45(5): 1423-1434 (1999) |