dblp.uni-trier.dewww.uni-trier.de

Robert H. Deng Vis

Robert Huijie Deng

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
144EECheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng: Conditional Proxy Broadcast Re-Encryption. ACISP 2009: 327-342
143EEJian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai: Conditional proxy re-encryption secure against chosen-ciphertext attack. ASIACCS 2009: 322-332
142EEJin Han, Debin Gao, Robert H. Deng: On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. DIMVA 2009: 127-146
141EEJian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao: Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166
140EEJunzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou: RSA-Based Certificateless Public Key Encryption. ISPEC 2009: 24-34
139EEShaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng: Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383
138EEYanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu: Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395
137EEShaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58
136EEYanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng: Multiuser private queries over encrypted databases. IJACT 1(4): 309-319 (2009)
135EEZhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel, Ming Gu: n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. J. Comput. Sci. Technol. 24(1): 138-151 (2009)
2008
134EERobert H. Deng, Jian Weng, Shengli Liu, Kefei Chen: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17
133EEYanjiang Yang, Feng Bao, Robert H. Deng: Efficient Client-to-Client Password Authenticated Key Exchange. EUC (2) 2008: 202-207
132EEHuafei Zhu, Feng Bao, Robert H. Deng: Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641
131EELiang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei: Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. ICYCS 2008: 2347-2353
130EEHyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng: Distinguishing between FE and DDoS Using Randomness Check. ISC 2008: 131-145
129EEYanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao: An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79
128EEFeng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang: Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85
127EELiang Gu, Xuhua Ding, Robert Huijie Deng, Bing Xie, Hong Mei: Remote attestation on program execution. STC 2008: 11-20
126EETieyan Li, Guilin Wang, Robert H. Deng: Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. JSW 3(3): 1-10 (2008)
125EETieyan Li, Robert H. Deng, Guilin Wang: The security and improvement of an ultra-lightweight RFID authentication protocol. Security and Communication Networks 1(2): 135-146 (2008)
2007
124EEYongdong Wu, Feng Bao, Robert H. Deng: Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183
123EETieyan Li, Robert H. Deng: Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. ARES 2007: 238-245
122EEYanjiang Yang, Yingjiu Li, Robert H. Deng: New Paradigm of Inference Control with Trusted Computing. DBSec 2007: 243-258
121EEFeng Bao, Robert H. Deng: Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. GLOBECOM 2007: 188-192
120EEZhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel: n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. ICICS 2007: 31-43
119EEYanjiang Yang, Robert H. Deng, Feng Bao: Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192
118EERobert H. Deng, Yanjiang Yang: Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. ISPEC 2007: 284-300
117EEYongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau: Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481
116EEZhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda: Access control protocols with two-layer architecture for wireless networks. Computer Networks 51(3): 655-670 (2007)
115EEYongdong Wu, Di Ma, Robert H. Deng: Flexible Access Control to JPEG 2000 Image Code-Streams. IEEE Transactions on Multimedia 9(6): 1314-1324 (2007)
2006
114 Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings Springer 2006
113EEYanjiang Yang, Robert H. Deng, Feng Bao: Fortifying password authentication in integrated healthcare delivery systems. ASIACCS 2006: 255-265
112EEYingjiu Li, Robert Huijie Deng: Publicly verifiable ownership protection for relational databases. ASIACCS 2006: 78-89
111EEYanjiang Yang, Robert H. Deng, Feng Bao: Practical private data matching deterrent to spoofing attacks. CIKM 2006: 852-853
110EEDaniel J. T. Chong, Robert H. Deng: Privacy-enhanced superdistribution of layered content with trusted access control. Digital Rights Management Workshop 2006: 37-44
109EEShuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao: Private Information Retrieval Using Trusted Hardware. ESORICS 2006: 49-64
108EEYingjiu Li, Haibing Lu, Robert H. Deng: Practical Inference Control for Data Cubes (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 115-120
107EEJie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen: Rights Protection for Data Cubes. ISC 2006: 359-372
106EEYing Qiu, Jianying Zhou, Feng Bao, Robert H. Deng: Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830
105EEKui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006)
104EEDong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng: A secure extension of the Kwak-Moon group signcryption scheme. Computers & Security 25(6): 435-444 (2006)
103EEShen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao: Three architectures for trusted data dissemination in edge computing. Data Knowl. Eng. 58(3): 381-409 (2006)
102EEYanjiang Yang, Robert H. Deng, Feng Bao: A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Sec. Comput. 3(2): 105-114 (2006)
101EEYongdong Wu, Robert H. Deng: Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia 8(1): 152-161 (2006)
100EEZhiguo Wan, Feng Bao, Robert H. Deng, Akkihebbal L. Ananda: Security analysis on a conference scheme for mobile communications. IEEE Transactions on Wireless Communications 5(6): 1238-1240 (2006)
99EEJianying Zhou, Feng Bao, Robert H. Deng: Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006)
2005
98 Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Springer 2005
97 Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005
96EEYanjiang Yang, Feng Bao, Robert H. Deng: Security Analysis and Fix of an Anonymous Credential System. ACISP 2005: 537-547
95EEElisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng: Privacy and Ownership Preserving of Outsourced Medical Data. ICDE 2005: 521-532
94EEHuafei Zhu, Feng Bao, Robert H. Deng: Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219
93EEDi Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou: Authenticating Query Results in Data Publishing. ICICS 2005: 376-388
92EEShuhong Wang, Feng Bao, Robert H. Deng: Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. ICICS 2005: 53-60
91EEBo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292
90EEZhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao: Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. LCN 2005: 328-335
89EEYing Qiu, Jianying Zhou, Robert H. Deng: Security Analysis and Improvement of Return Routability Protocol. MADNES 2005: 174-181
88 Yongdong Wu, Feng Bao, Robert H. Deng: Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222
87 Yongdong Wu, Tieyan Li, Robert H. Deng: Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476
86 Yanjiang Yang, Feng Bao, Robert H. Deng: A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112
85EEYunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao: Practical Zero-Knowledge Arguments from Sigma-Protocols. WINE 2005: 288-298
84EEFeng Bao, Robert H. Deng: Protocols that hide user's preferences in electronic transactions. Computer Networks 48(4): 503-515 (2005)
83EEBo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang: Efficient and robust key management for large mobile ad hoc networks. Computer Networks 48(4): 657-682 (2005)
82EEYunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng: Generic yet Practical ZK Arguments from any Public-Coin HVZK Electronic Colloquium on Computational Complexity (ECCC)(162): (2005)
81EEYongdong Wu, Robert H. Deng: Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Techn. 15(1): 161-163 (2005)
80EEGui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen: New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. IEEE Trans. Computers 54(12): 1473-1483 (2005)
79EEGui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen: New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. IEEE Trans. Computers 54(9): 1071-1080 (2005)
78EEFeng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang: Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Transactions on Information Technology in Biomedicine 9(4): 554-563 (2005)
77EERobert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu: Scalable trusted online dissemination of JPEG2000 images. Multimedia Syst. 11(1): 60-67 (2005)
2004
76 Feng Bao, Robert H. Deng, Jianying Zhou: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Springer 2004
75EEBok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi: Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382
74EEBo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324
73EEDi Ma, Robert H. Deng, Yongdong Wu, Tieyan Li: Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519
72EETieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91
71 Yongdong Wu, Robert H. Deng: Compliant encryption of jpeg2000 codestreanis. ICIP 2004: 3439-3442
70 Yongdong Wu, Di Ma, Robert H. Deng: Progressive protection of jpeg2000 codestreams. ICIP 2004: 3447-3450
69EEKisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim: On Security Notions for Steganalysis. ICISC 2004: 440-454
68EESiyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao: A Block Oriented Fingerprinting Scheme in Relational Database. ICISC 2004: 455-466
67EEGuilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon: Security Analysis of Two Signcryption Schemes. ISC 2004: 123-133
66EEKisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim: On Security Notions of Steganographic Systems. IWDW 2004: 137-151
65EEBo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Anonymous Secure Routing in Mobile Ad-Hoc Networks. LCN 2004: 102-108
64EEGuilin Wang, Jianying Zhou, Robert H. Deng: On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. TrustBus 2004: 289-298
63EEKui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim: Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45(6): 687-699 (2004)
62EEYanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng: New efficient user identification and key distribution scheme providing enhanced security. Computers & Security 23(8): 697-704 (2004)
61EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004)
60 Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng: A smart-card-enabled privacy preserving E-prescription system. IEEE Transactions on Information Technology in Biomedicine 8(1): 47-58 (2004)
2003
59EECheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao: A flexible and scalable authentication scheme for JPEG2000 image codestreams. ACM Multimedia 2003: 433-441
58EEGang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356
57EEYongdong Wu, Robert H. Deng: Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. ICICS 2003: 238-248
56EEFeng Bao, Robert H. Deng, Huafei Zhu: Variations of Diffie-Hellman Problem. ICICS 2003: 301-312
55EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83
54EEHongjun Wu, Feng Bao, Robert H. Deng: An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87
53EEJianying Zhou, Feng Bao, Robert H. Deng: An Efficient Public-Key Framework. ICICS 2003: 88-99
52EEGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319
51EEJianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110
50EEYanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng: Secure the image-based simulated telesurgery system. ISCAS (2) 2003: 596-599
49 Yanjiang Yang, Feng Bao, Robert H. Deng: Flexible authentication of images. VCIP 2003: 1905-1911
2002
48 Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Springer 2002
47EEYanjiang Yang, Feng Bao, Robert H. Deng: Security Analysis and Improvement of the Global Key Recovery System. ACISP 2002: 17-24
46EERobert H. Deng, Jianying Zhou, Feng Bao: Defending against redirect attacks in mobile IP. ACM Conference on Computer and Communications Security 2002: 59-67
45 Hongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Informatica (Slovenia) 26(3): (2002)
2001
44EEFeng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu: Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ACISP 2001: 190-205
43EEFeng Bao, Robert H. Deng: Privacy Protection for Transactions of Digital Goods. ICICS 2001: 202-213
42EEQibin Sun, Peirong Feng, Robert H. Deng: An Optical Watermarking Solution for Authenticating Printed Documents. ITCC 2001: 65-70
41EEFeng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu: Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164
40EEHongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: 173-179
2000
39 Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288
38 Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111
37EEFeng Bao, Robert H. Deng, Peirong Feng: An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. ICISC 2000: 162-170
36 Jianying Zhou, Robert H. Deng, Feng Bao: Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57
35 Feng Bao, Robert H. Deng, Jianying Zhou: Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460
34EEXinkai Wang, Robert H. Deng, Feng Bao: Multicast Internet protocol. Computer Communications 23(11): 1047-1054 (2000)
1999
33EEJianying Zhou, Robert H. Deng, Feng Bao: Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269
32EEFeng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan: Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863
31EEFeng Bao, Robert H. Deng: A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Public Key Cryptography 1999: 1-11
30EERobert H. Deng: Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. Computer Communications 22(6): 591- (1999)
1998
29EEHongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. ASIACRYPT 1998: 126-132
28EEHongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Improved Truncated Differential Attacks on SAFER. ASIACRYPT 1998: 133-147
27EEFeng Bao, Robert H. Deng, Wenbo Mao: Efficient and Practical Fair Exchange Protocols with Off-Line TTP. IEEE Symposium on Security and Privacy 1998: 77-85
26EEFeng Bao, Robert H. Deng: A Signcryption Scheme with Signature Directly Verifiable by Public Key. Public Key Cryptography 1998: 55-59
25EERobert H. Deng, Jian Hu, Feng Bao, A. Desai Narasimhalu: A Ubiquitous Secure and Reliable Digital Data Depository System. WETICE 1998: 354-358
1997
24 Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng: Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. ACISP 1997: 261-270
23EERobert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair: A New On-Line Cash Check Scheme. ACM Conference on Computer and Communications Security 1997: 111-116
22 Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng: RSA-type Signatures in the Presence of Transient Faults. IMA Int. Conf. 1997: 155-160
21 Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi: Modified Finite Automata Public Key Cryptosystem. ISW 1997: 82-95
20 Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair: Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Security Protocols Workshop 1997: 115-124
19 Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar: Integrating Security in the CORBA Architecture. TAPOS 3(1): 3-13 (1997)
1996
18EERobert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang: Practical Protocols for Certified Electronic Mail. J. Network Syst. Manage. 4(3): (1996)
1994
17 Kisenchand Ranai, Koon Seng Lim, Robert H. Deng: Simulating a Multimedia FDDI Backbone Network. Comput. J. 37(3): 188-198 (1994)
16EEKoon Seng Lim, Robert H. Deng, Kisenchand Ranai: Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. Computer Communications 17(4): 251-256 (1994)
15 Yuan Xing Li, Robert H. Deng, Xin-mei Wang: On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. IEEE Transactions on Information Theory 40(1): 271- (1994)
1993
14 Robert H. Deng, Aurel A. Lazar, Weiguo Wang: A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks. Integrated Network Management 1993: 697-708
13EERobert H. Deng, Wendy C. L. Chiew: Effects of station buffer capacity on token ring network performance. Computer Communications 16(6): 366-375 (1993)
12EERobert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang: Performance of a token-passing system with batch arrivals and its application to file transfers. Computer Communications 16(7): 422-431 (1993)
11EEChi Chung Ko, W. C. Wong, J. L. Du, Robert H. Deng, Kin Mun Lye: Performance analysis of two bridged CSMA/CD networks. Computer Communications 16(8): 501-510 (1993)
10EERobert H. Deng, Renben Shu: LAN-based medical visualization communication system. Computer Communications 16(8): 518-525 (1993)
9 Jiangling Du, Robert H. Deng, Chi Chung Ko: Performance Analysis of Interconnected LANs with Server/Client Configuration. Computer Networks and ISDN Systems 25(12): 1321-1333 (1993)
8 Robert H. Deng, Aurel A. Lazar, Weiguo Wang: A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks. IEEE Journal on Selected Areas in Communications 11(9): 1438-1448 (1993)
1991
7 Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang: Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs. INFOCOM 1991: 1041-1049
6 Robert H. Deng, Wendy C. L. Chiew, Kuan-Tsae Huang: Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations. INFOCOM 1991: 202-210
5EEBrigitte Berg, Robert H. Deng: End-to-end performance of interconnected LANs. Computer Communications 14(2): 105-112 (1991)
1990
4 Xian-Yu Zhang, Robert H. Deng: Gateway Design for LAN Interconnection via ISDN. Computer Networks and ISDN Systems 19(1): 43-51 (1990)
3 Steven S. Pietrobon, Robert H. Deng, Alain Lafanechére, Gottfried Ungerboeck, Daniel J. Costello Jr.: Trellis-coded multidimensional phase modulation. IEEE Transactions on Information Theory 36(1): 63-89 (1990)
1988
2 Robert H. Deng, Mark A. Herro: DC-free coset codes. IEEE Transactions on Information Theory 34(4): 786-792 (1988)
1987
1 Robert H. Deng, Daniel J. Costello Jr.: Decoding of DBEC-TBED Reed-Solomon Codes. IEEE Trans. Computers 36(11): 1359-1363 (1987)

Coauthor Index

1Akkihebbal L. Ananda [90] [100] [116]
2Feng Bao [20] [21] [22] [24] [25] [26] [27] [28] [29] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [58] [60] [61] [62] [63] [65] [66] [69] [74] [75] [76] [78] [79] [80] [83] [84] [86] [88] [90] [91] [92] [94] [96] [97] [98] [99] [100] [102] [103] [105] [106] [109] [111] [113] [116] [117] [119] [120] [121] [124] [128] [129] [132] [133] [135] [136] [141]
3Brigitte Berg [5]
4Elisa Bertino [95]
5Shailendra K. Bhonsle [19]
6Shaoying Cai [137] [139]
7Kisik Chang [66] [69]
8Kefei Chen [107] [114] [134]
9Wendy C. L. Chiew [6] [13]
10Daniel J. T. Chong [110]
11Sherman S. M. Chow [144]
12Cheng-Kang Chu [143] [144]
13Daniel J. Costello Jr. [1] [3]
14Xuhua Ding [109] [127] [128] [129] [131] [136] [143]
15J. L. Du [11]
16Jiangling Du [9]
17Dengguo Feng [58] [82]
18Gui Liang Feng [79] [80]
19Peirong Feng [37] [42] [44]
20Debin Gao [130] [142]
21Xiang Gao [21]
22Willi Geiselmann [41]
23Shen-Tat Goh [103]
24Bok-Min Goi [75]
25Li Gong [18]
26Liang Gu [127] [131]
27Ming Gu [135]
28Jie Guo [107]
29Yan Guo [44]
30Jin Han [142]
31Xiaoxi Han [60]
32Yongfei Han [20] [23] [24]
33Mark A. Herro [2]
34Jian Hu [25]
35Kuan-Tsae Huang [6] [7] [12]
36Yoshihide Igarashi [21]
37Albert B. Jeng [20] [23] [24]
38Marc Joye [22]
39Mohan S. Kankanhalli [65] [74] [83] [91]
40HyungJun Kim [66] [69]
41Kwangjo Kim [63]
42Chi Chung Ko [9] [11]
43Weidong Kou [140]
44Dong Jin Kwak [67] [104]
45Alain Lafanechére [3]
46Junzuo Lai [140] [143]
47Xuejia Lai [114]
48Aurel A. Lazar [8] [14] [18] [19]
49Heejo Lee [130]
50Sangjin Lee [66] [69]
51Peng Li [130]
52Tieyan Li [63] [72] [73] [74] [87] [123] [125] [126] [137] [139]
53Yingjiu Li [107] [108] [112] [122] [137] [139]
54Yuan Xing Li [15]
55Jongin Lim (Jong In Lim) [69]
56Koon Seng Lim [16] [17]
57Shengli Liu [134] [140]
58Siyuan Liu [68]
59Javier Lopez [97]
60Wenjing Lou [105]
61Haibing Lu [108]
62Kin Mun Lye [11]
63Di Ma [70] [72] [73] [77] [93] [115]
64Wenbo Mao [27]
65Hong Mei [127] [131]
66Sang-Jae Moon [67] [104]
67Marc Mouffron [117]
68A. Desai Narasimhalu [20] [25]
69Teow-Hin Ngair [20] [23]
70Khanh Quoc Nguyen [32]
71Jesper Buus Nielsen [82]
72Beng Chin Ooi [78] [95]
73HweeHwa Pang [93] [98] [103]
74Hyundo Park [130]
75Cheng Peng [59]
76Raphael Chung-Wei Phan (Raphael C.-W. Phan) [75]
77Steven S. Pietrobon [3]
78Bart Preneel [120] [135]
79Sihan Qing [48]
80Ying Qiu [89] [106] [138]
81Jean-Jacques Quisquater [22]
82Kisenchand Ranai [16] [17]
83Kui Ren [58] [63] [105]
84Frederic Rousseau [117]
85Claus-Peter Schnorr [41]
86Weizhong Shao [59] [68] [77] [131]
87Jia-Chen Shen [79] [80]
88Renben Shu [10]
89Mohammad Umar Siddiqi (M. U. Siddiqi) [75]
90Rainer Steinwandt [41]
91Qibin Sun [42]
92Qiang Tang [141]
93Gottfried Ungerboeck [3]
94Vijay Varadharajan [32]
95Zhiguo Wan [63] [65] [90] [91] [100] [116] [120] [135]
96Guilin Wang [52] [55] [61] [64] [67] [83] [91] [104] [125] [126]
97Jie Wang [62]
98Shuhong Wang [62] [68] [92] [109]
99Weiguo Wang [8] [14] [18] [19]
100Xin-mei Wang [15]
101Xinkai Wang [34]
102Zhenlan Wang [50]
103Jian Weng [134] [141] [143] [144]
104W. C. Wong [11]
105Hongjun Wu [28] [29] [38] [39] [40] [41] [44] [45] [54]
106Yongdong Wu [57] [59] [70] [71] [72] [73] [77] [81] [87] [88] [101] [115] [117] [124]
107Bing Xie [127] [131]
108Yanjiang Yang [47] [49] [50] [60] [62] [75] [78] [86] [95] [96] [102] [111] [113] [118] [119] [122] [128] [129] [133] [136] [138] [141]
109Gang Yao [58]
110Dingfeng Ye [38] [39]
111Qin-Zhong Ye [28] [29]
112Binyu Zang [85]
113Kai Zeng [105]
114Xian-Yu Zhang [4] [7] [12]
115Yiming Zhao [85]
116Yunlei Zhao [82] [85]
117Jianying Zhou [33] [35] [36] [46] [48] [51] [52] [53] [55] [61] [64] [76] [89] [93] [97] [98] [99] [105] [106] [114] [138] [144]
118Bo Zhu [65] [74] [83] [91]
119Huafei Zhu [56] [72] [74] [94] [132]
120Yanzhen Zou [131]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)