2013
224Accountable Authority Identity-Based Encryption with Public Traceability. Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng. CT-RSA 2013, 326-342. Web SearchBibTeXDownload
223A revocable certificateless signature scheme. Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng. IACR Cryptology ePrint Archive (2013): 53 (2013). Web SearchBibTeXDownload
222Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks. Yongdong Wu, Zhuo Wei, Robert H. Deng. IEEE Transactions on Multimedia (15): 778-788 (2013). Web SearchBibTeXDownload
221Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg. ISPEC 2013, 174-188. Web SearchBibTeXDownload
2012
220A New Framework for Privacy of RFID Path Authentication. Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao. ACNS 2012, 473-488. Web SearchBibTeXDownload
219Expressive CP-ABE with partially hidden access structures. Junzuo Lai, Robert H. Deng, Yingjiu Li. ASIACCS 2012, 18-19. Web SearchBibTeXDownload
218A secure and efficient discovery service system in EPCglobal network. Jie Shi, Yingjiu Li, Robert H. Deng. Computers & Security (31): 870-885 (2012). Web SearchBibTeXDownload
217Dynamic Secure Cloud Storage with Provenance. Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng. Cryptography and Security 2012, 442-464. Web SearchBibTeXDownload
216A Pollution Attack to Public-key Watermarking Schemes. Yongdong Wu, Robert H. Deng. ICME 2012, 230-235. Web SearchBibTeXDownload
215HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. Zhiguo Wan, Jun-e Liu, Robert H. Deng. IEEE Transactions on Information Forensics and Security (7): 743-754 (2012). Web SearchBibTeXDownload
214A Survey on Privacy Frameworks for RFID Authentication. Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou. IEICE Transactions (95-D): 2-11 (2012). Web SearchBibTeXDownload
213Detecting node replication attacks in wireless sensor networks: A survey. Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao. J. Network and Computer Applications (35): 1022-1034 (2012). Web SearchBibTeXDownload
212An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding. NSS 2012, 192-205. Web SearchBibTeXDownload
211TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications. Zheng Yan, Peng Zhang, Robert H. Deng. Personal and Ubiquitous Computing (16): 485-506 (2012). Web SearchBibTeXDownload
210Detecting node replication attacks in mobile sensor networks: theory and approaches. Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao. Security and Communication Networks (5): 496-507 (2012). Web SearchBibTeXDownload
209Enhanced authentication for commercial video services. Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng. Security and Communication Networks (5): 1248-1259 (2012). Web SearchBibTeXDownload
208A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Zhuo Wei, Yongdong Wu, Xuhua Ding, Robert H. Deng. Sig. Proc.: Image Comm. (27): 1011-1024 (2012). Web SearchBibTeXDownload
2011
207On two RFID privacy notions and their relations. Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma. ACM Trans. Inf. Syst. Secur. (14): 30 (2011). Web SearchBibTeXDownload
206Hierarchical Identity-Based Chameleon Hash and Its Applications. Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao. ACNS 2011, 201-219. Web SearchBibTeXDownload
205Secure mobile subscription of sensor-encrypted data. Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng. ASIACCS 2011, 228-237. Web SearchBibTeXDownload
204A software-based root-of-trust primitive on multicore platforms. Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li. ASIACCS 2011, 334-343. Web SearchBibTeXDownload
203Secure mobile agents with controlled resources. Qi Zhang, Yi Mu, Minjie Zhang, Robert H. Deng. Concurrency and Computation: Practice and Experience (23): 1348-1366 (2011). Web SearchBibTeXDownload
202Editorial: special issue on ubiquitous electronic commerce systems. Robert H. Deng, Jari Veijalainen, Shiguo Lian, Dimitris Kanellopoulos. Electronic Commerce Research (11): 1-4 (2011). Web SearchBibTeXDownload
201DriverGuard: A Fine-Grained Protection on I/O Flows. Yueqiang Cheng, Xuhua Ding, Robert H. Deng. ESORICS 2011, 227-244. Web SearchBibTeXDownload
200Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao. ICICS 2011, 306-318. Web SearchBibTeXDownload
199Database Access Pattern Protection Without Full-Shuffles. Xuhua Ding, Yanjiang Yang, Robert H. Deng. IEEE Transactions on Information Forensics and Security (6): 189-201 (2011). Web SearchBibTeXDownload
198Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures. X. Huang, Y. Mu, W. Susilo, W. Wu, J. Zhou, Robert H. Deng. IEEE Transactions on Information Forensics and Security (6): 498-512 (2011). Web SearchBibTeXDownload
197A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng. IEEE Trans. Parallel Distrib. Syst. (22): 1390-1397 (2011). Web SearchBibTeXDownload
196Cryptanalysis of a certificateless signcryption scheme in the standard model. Jian Weng, Guoxiang Yao, Robert H. Deng, Min-Rong Chen, Xiangxue Li. Inf. Sci. (181): 661-667 (2011). Web SearchBibTeXDownload
195Secure localization with attack detection in wireless sensor networks. Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao. Int. J. Inf. Sec. (10): 155-171 (2011). Web SearchBibTeXDownload
194Fully Secure Cipertext-Policy Hiding CP-ABE. Junzuo Lai, Robert H. Deng, Yingjiu Li. ISPEC 2011, 24-39. Web SearchBibTeXDownload
193A zero-knowledge based framework for RFID privacy. Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao. Journal of Computer Security (19): 1109-1146 (2011). Web SearchBibTeXDownload
192General Construction of Chameleon All-But-One Trapdoor Functions. Shengli Liu, Junzuo Lai, Robert H. Deng. ProvSec 2011, 257-265. Web SearchBibTeXDownload
191Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. Junzuo Lai, Robert H. Deng, Shengli Liu. Public Key Cryptography 2011, 228-245. Web SearchBibTeXDownload
190On Detection of Erratic Arguments. Jin Han, Qiang Yan, Robert H. Deng, Debin Gao. SecureComm 2011, 172-189. Web SearchBibTeXDownload
189Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao. Security and Communication Networks (4): 11-22 (2011). Web SearchBibTeXDownload
188Zero-error watermarking on jpeg images by shuffling huffman tree nodes. Yongdong Wu, Robert H. Deng. VCIP 2011, 1-4. Web SearchBibTeXDownload
2010
187Revisiting Unpredictability-Based RFID Privacy Models. Junzuo Lai, Robert H. Deng, Yingjiu Li. ACNS 2010, 475-492. Web SearchBibTeXDownload
186Efficient Unidirectional Proxy Re-Encryption. Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng. AFRICACRYPT 2010, 316-332. Web SearchBibTeXDownload
185Practical ID-based encryption for wireless sensor network. Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng. ASIACCS 2010, 337-340. Web SearchBibTeXDownload
184Efficient CCA-Secure PKE from Identity-Based Techniques. Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou. CT-RSA 2010, 132-147. Web SearchBibTeXDownload
183Efficient discrete logarithm based multi-signature scheme in the plain public key model. Changshe Ma, Jian Weng, Yingjiu Li, Robert H. Deng. Des. Codes Cryptography (54): 121-133 (2010). Web SearchBibTeXDownload
182A New Framework for RFID Privacy. Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao. ESORICS 2010, 1-18. Web SearchBibTeXDownload
181Practical ID-based Encryption for Wireless Sensor Network. Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng. IACR Cryptology ePrint Archive (2010): 2 (2010). Web SearchBibTeXDownload
180CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao. IACR Cryptology ePrint Archive (2010): 265 (2010). Web SearchBibTeXDownload
179Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng, Tieyan Li. ICISS 2010, 246-260. Web SearchBibTeXDownload
178TeleOph: a secure real-time teleophthalmology system. Yongdong Wu, Zhou Wei, Haixia Yao, Zhigang Zhao, Lek Heng Ngoh, Robert H. Deng, Shengsheng Yu. IEEE Transactions on Information Technology in Biomedicine (14): 1259-1266 (2010). Web SearchBibTeXDownload
177Shifting Inference Control to User Side: Architecture and Protocol. Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao. IEEE Trans. Dependable Sec. Comput. (7): 189-202 (2010). Web SearchBibTeXDownload
176Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme. Jian Weng, Min-Rong Chen, Kefei Chen, Robert H. Deng. IEICE Transactions (93-A): 854-856 (2010). Web SearchBibTeXDownload
175Time-Bound Hierarchical Key Assignment: An Overview. Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao. IEICE Transactions (93-D): 1044-1052 (2010). Web SearchBibTeXDownload
174Achieving high security and efficiency in RFID-tagged supply chains. Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng, Haixia Yao. IJACT (2): 3-12 (2010). Web SearchBibTeXDownload
173Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen. Inf. Sci. (180): 5077-5089 (2010). Web SearchBibTeXDownload
172A new hardware-assisted PIR with O(n) shuffle cost. Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong Wang. Int. J. Inf. Sec. (9): 237-252 (2010). Web SearchBibTeXDownload
171Time cost evaluation for executing RFID authentication protocols. Kevin Chiew, Yingjiu Li, Tieyan Li, Robert H. Deng, Manfred Aigner. IOT 2010. Web SearchBibTeXDownload
170A Multi-Key Pirate Decoder Against Traitor Tracing Schemes. Yongdong Wu, Robert H. Deng. J. Comput. Sci. Technol. (25): 362-374 (2010). Web SearchBibTeXDownload
169New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. Junzuo Lai, Wen Tao Zhu, Robert H. Deng, Shengli Liu, Weidong Kou. J. Comput. Sci. Technol. (25): 793-806 (2010). Web SearchBibTeXDownload
168CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao. SCIENCE CHINA Information Sciences (53): 593-606 (2010). Web SearchBibTeXDownload
2009
167Conditional Proxy Broadcast Re-Encryption. Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng. ACISP 2009, 327-342. Web SearchBibTeXDownload
166RFID privacy: relation between two notions, minimal condition, and efficient construction. Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li. ACM Conference on Computer and Communications Security 2009, 54-65. Web SearchBibTeXDownload
165Conditional proxy re-encryption secure against chosen-ciphertext attack. Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai. ASIACCS 2009, 322-332. Web SearchBibTeXDownload
164On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities. Jin Han, Debin Gao, Robert H. Deng. DIMVA 2009, 127-146. Web SearchBibTeXDownload
163Insights into Malware Detection and Prevention on Mobile Phones. Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng. FGIT-SecTech 2009, 242-249. Web SearchBibTeXDownload
162Efficient Unidirectional Proxy Re-Encryption. Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng. IACR Cryptology ePrint Archive (2009): 189 (2009). Web SearchBibTeXDownload
161Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao. ICICS 2009, 135-149. Web SearchBibTeXDownload
160Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng. ICICS 2009, 150-164. Web SearchBibTeXDownload
159On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng. ICISS 2009, 71-85. Web SearchBibTeXDownload
158Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. Kar Way Tan, Robert H. Deng. ICWS 2009, 67-74. Web SearchBibTeXDownload
157Multiuser private queries over encrypted databases. Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng. IJACT (1): 309-319 (2009). Web SearchBibTeXDownload
156Remote Attestation on Function Execution (Work-in-Progress). Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert H. Deng, Yao Guo, Weizhong Shao. INTRUST 2009, 60-72. Web SearchBibTeXDownload
155Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao. ISC 2009, 151-166. Web SearchBibTeXDownload
154Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng. ISPEC 2009, 372-383. Web SearchBibTeXDownload
153Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu. ISPEC 2009, 384-395. Web SearchBibTeXDownload
152RSA-Based Certificateless Public Key Encryption. Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou. ISPEC 2009, 24-34. Web SearchBibTeXDownload
151n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel, Ming Gu. J. Comput. Sci. Technol. (24): 138-151 (2009). Web SearchBibTeXDownload
150Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao. SecureComm 2009, 285-295. Web SearchBibTeXDownload
149Privacy-preserving rental services using one-show anonymous credentials. Yanjiang Yang, Robert H. Deng, Feng Bao. Security and Communication Networks (2): 531-545 (2009). Web SearchBibTeXDownload
148A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications. Robert H. Deng, Yanjiang Yang. TOMCCAP (5) (2009). Web SearchBibTeXDownload
147Attacks and improvements to an RIFD mutual authentication protocol and its extensions. Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng. WISEC 2009, 51-58. Web SearchBibTeXDownload
2008
146Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen. CANS 2008, 1-17. Web SearchBibTeXDownload
145Efficient Client-to-Client Password Authenticated Key Exchange. Yanjiang Yang, Feng Bao, Robert H. Deng. EUC (2) 2008, 202-207. Web SearchBibTeXDownload
144Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xuan Wang. IACR Cryptology ePrint Archive (2008): 509 (2008). Web SearchBibTeXDownload
143On the Security of Fully Collusion Resistant Traitor Tracing Schemes. Yongdong Wu, Robert H. Deng. IACR Cryptology ePrint Archive (2008): 450 (2008). Web SearchBibTeXDownload
142Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. Huafei Zhu, Feng Bao, Robert H. Deng. ICC 2008, 1635-1641. Web SearchBibTeXDownload
141Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou, Bing Xie, Weizhong Shao, Hong Mei. ICYCS 2008, 2347-2353. Web SearchBibTeXDownload
140Distinguishing between FE and DDoS Using Randomness Check. Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng. ISC 2008, 131-145. Web SearchBibTeXDownload
139An Efficient PIR Construction Using Trusted Hardware. Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao. ISC 2008, 64-79. Web SearchBibTeXDownload
138Private Query on Encrypted Data in Multi-user Settings. Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang. ISPEC 2008, 71-85. Web SearchBibTeXDownload
137Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. Tieyan Li, Guilin Wang, Robert H. Deng. JSW (3): 1-10 (2008). Web SearchBibTeXDownload
136The security and improvement of an ultra-lightweight RFID authentication protocol. Tieyan Li, Robert H. Deng, Guilin Wang. Security and Communication Networks (1): 135-146 (2008). Web SearchBibTeXDownload
2007
135Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. Yongdong Wu, Feng Bao, Robert H. Deng. ACISP 2007, 171-183. Web SearchBibTeXDownload
134Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. Tieyan Li, Robert H. Deng. ARES 2007, 238-245. Web SearchBibTeXDownload
133Access control protocols with two-layer architecture for wireless networks. Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda. Computer Networks (51): 655-670 (2007). Web SearchBibTeXDownload
132New Paradigm of Inference Control with Trusted Computing. Yanjiang Yang, Yingjiu Li, Robert H. Deng. DBSec 2007, 243-258. Web SearchBibTeXDownload
131Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. Feng Bao, Robert H. Deng. GLOBECOM 2007, 188-192. Web SearchBibTeXDownload
130n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel. ICICS 2007, 31-43. Web SearchBibTeXDownload
129Flexible Access Control to JPEG 2000 Image Code-Streams. Yongdong Wu, Di Ma, Robert H. Deng. IEEE Transactions on Multimedia (9): 1314-1324 (2007). Web SearchBibTeXDownload
128Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau. Inscrypt 2007, 472-481. Web SearchBibTeXDownload
127Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. Robert H. Deng, Yanjiang Yang. ISPEC 2007, 284-300. Web SearchBibTeXDownload
126Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. Yanjiang Yang, Robert H. Deng, Feng Bao. ISPEC 2007, 177-192. Web SearchBibTeXDownload
2006
125Fortifying password authentication in integrated healthcare delivery systems. Yanjiang Yang, Robert H. Deng, Feng Bao. ASIACCS 2006, 255-265. Web SearchBibTeXDownload
124Practical private data matching deterrent to spoofing attacks. Yanjiang Yang, Robert H. Deng, Feng Bao. CIKM 2006, 852-853. Web SearchBibTeXDownload
123Routing optimization security in mobile IPv6. Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng. Computer Networks (50): 2401-2419 (2006). Web SearchBibTeXDownload
122A secure extension of the Kwak-Moon group signcryption scheme. Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng. Computers & Security (25): 435-444 (2006). Web SearchBibTeXDownload
121Three architectures for trusted data dissemination in edge computing. Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao. Data Knowl. Eng. (58): 381-409 (2006). Web SearchBibTeXDownload
120Privacy-enhanced superdistribution of layered content with trusted access control. Daniel J. T. Chong, Robert H. Deng. Digital Rights Management Workshop 2006, 37-44. Web SearchBibTeXDownload
119Private Information Retrieval Using Trusted Hardware. Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao. ESORICS 2006, 49-64. Web SearchBibTeXDownload
118Practical Inference Control for Data Cubes (Extended Abstract). Yingjiu Li, Haibing Lu, Robert H. Deng. IEEE Symposium on Security and Privacy 2006, 115-120. Web SearchBibTeXDownload
117Scalable authentication of MPEG-4 streams. Yongdong Wu, Robert H. Deng. IEEE Transactions on Multimedia (8): 152-161 (2006). Web SearchBibTeXDownload
116Security analysis on a conference scheme for mobile communications. Zhiguo Wan, Feng Bao, Robert H. Deng, Akkihebbal L. Ananda. IEEE Transactions on Wireless Communications (5): 1238-1240 (2006). Web SearchBibTeXDownload
115A Practical Password-Based Two-Server Authentication and Key Exchange System. Yanjiang Yang, Robert H. Deng, Feng Bao. IEEE Trans. Dependable Sec. Comput. (3): 105-114 (2006). Web SearchBibTeXDownload
114Minimizing TTP's involvement in signature validation. Jianying Zhou, Feng Bao, Robert H. Deng. Int. J. Inf. Sec. (5): 37-47 (2006). Web SearchBibTeXDownload
113Rights Protection for Data Cubes. Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen. ISC 2006, 359-372. Web SearchBibTeXDownload
112An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks. Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng. SECON 2006, 70-79. Web SearchBibTeXDownload
111Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. Ying Qiu, Jianying Zhou, Feng Bao, Robert H. Deng. VTC Spring 2006, 828-830. Web SearchBibTeXDownload
110Efficient key tree construction for group key agreement in ad hoc networks. Zhiguo Wan, Bo Zhu, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda. WCNC 2006, 652-658. Web SearchBibTeXDownload
2005
109Security Analysis and Fix of an Anonymous Credential System. Yanjiang Yang, Feng Bao, Robert H. Deng. ACISP 2005, 537-547. Web SearchBibTeXDownload
108Efficient and robust key management for large mobile ad hoc networks. Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang. Computer Networks (48): 657-682 (2005). Web SearchBibTeXDownload
107Protocols that hide user's preferences in electronic transactions. Feng Bao, Robert H. Deng. Computer Networks (48): 503-515 (2005). Web SearchBibTeXDownload
106Generic yet Practical ZK Arguments from any Public-Coin HVZK. Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng. Electronic Colloquium on Computational Complexity (ECCC) 2005. Web SearchBibTeXDownload
105Privacy and Ownership Preserving of Outsourced Medical Data. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng. ICDE 2005, 521-532. Cited by 51Web SearchBibTeXDownload
104Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. Shuhong Wang, Feng Bao, Robert H. Deng. ICICS 2005, 53-60. Web SearchBibTeXDownload
103Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. Huafei Zhu, Feng Bao, Robert H. Deng. ICICS 2005, 207-219. Web SearchBibTeXDownload
102Authenticating Query Results in Data Publishing. Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou. ICICS 2005, 376-388. Web SearchBibTeXDownload
101Tailored reversible watermarking schemes for authentication of electronic clinical atlas. Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang. IEEE Transactions on Information Technology in Biomedicine (9): 554-563 (2005). Cited by 21Web SearchBibTeXDownload
100Security of an ill-posed operator for image authentication. Yongdong Wu, Robert H. Deng. IEEE Trans. Circuits Syst. Video Techn. (15): 161-163 (2005). Web SearchBibTeXDownload
99New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen. IEEE Trans. Computers (54): 1473-1483 (2005). Web SearchBibTeXDownload
98New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen. IEEE Trans. Computers (54): 1071-1080 (2005). Web SearchBibTeXDownload
97Providing efficient certification services against active attacks in ad hoc networks. Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng. IPCCC 2005, 285-292. Web SearchBibTeXDownload
96Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao. LCN 2005, 328-335. Web SearchBibTeXDownload
95Security Analysis and Improvement of Return Routability Protocol. Ying Qiu, Jianying Zhou, Robert H. Deng. MADNES 2005, 174-181. Web SearchBibTeXDownload
94Scalable trusted online dissemination of JPEG2000 images. Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu. Multimedia Syst. (11): 60-67 (2005). Web SearchBibTeXDownload
93Secure Person-To-Person Communications Based on Biometrics Signals. Yongdong Wu, Feng Bao, Robert H. Deng. SEC 2005, 205-222. Web SearchBibTeX
92A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. Yanjiang Yang, Feng Bao, Robert H. Deng. SEC 2005, 95-112. Web SearchBibTeX
91Protecting Group Dynamic Information in Large Scale Multicast Groups. Yongdong Wu, Tieyan Li, Robert H. Deng. SEC 2005, 459-476. Web SearchBibTeX
90DoS-resistant access control protocol with identity confidentiality for wireless networks. Zhiguo Wan, Bo Zhu, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda. WCNC 2005, 1521-1526. Web SearchBibTeXDownload
89Practical Zero-Knowledge Arguments from Sigma-Protocols. Yunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao. WINE 2005, 288-298. Web SearchBibTeXDownload
2004
88Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi. ACNS 2004, 369-382. Cited by 30Web SearchBibTeXDownload
87Highly reliable trust establishment scheme in ad hoc networks. Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim. Computer Networks (45): 687-699 (2004). Web SearchBibTeXDownload
86New efficient user identification and key distribution scheme providing enhanced security. Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng. Computers & Security (23): 697-704 (2004). Web SearchBibTeXDownload
85Trust Establishment in Large Scale Grid Settings. Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng. GCC 2004, 317-324. Web SearchBibTeXDownload
84Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng. IACR Cryptology ePrint Archive (2004): 54 (2004). Web SearchBibTeXDownload
83Dynamic Access Control for Multi-privileged Group Communications. Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li. ICICS 2004, 508-519. Web SearchBibTeXDownload
82Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng. ICICS 2004, 79-91. Web SearchBibTeXDownload
81Compliant encryption of jpeg2000 codestreanis. Yongdong Wu, Robert H. Deng. ICIP 2004, 3439-3442. Web SearchBibTeXDownload
80Progressive protection of jpeg2000 codestreams. Yongdong Wu, Di Ma, Robert H. Deng. ICIP 2004, 3447-3450. Web SearchBibTeXDownload
79On Security Notions for Steganalysis. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim. ICISC 2004, 440-454. Web SearchBibTeXDownload
78A Block Oriented Fingerprinting Scheme in Relational Database. Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao. ICISC 2004, 455-466. Web SearchBibTeXDownload
77A smart-card-enabled privacy preserving E-prescription system. Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng. IEEE Transactions on Information Technology in Biomedicine (8): 47-58 (2004). Cited by 19Web SearchBibTeXDownload
76Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng. IEEE Trans. Knowl. Data Eng. (16): 1309-1311 (2004). Web SearchBibTeXDownload
75Security Analysis of Two Signcryption Schemes. Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon. ISC 2004, 123-133. Web SearchBibTeXDownload
74On Security Notions of Steganographic Systems. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim. IWDW 2004, 137-151. Web SearchBibTeXDownload
73Anonymous Secure Routing in Mobile Ad-Hoc Networks. Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng. LCN 2004, 102-108. Web SearchBibTeXDownload
72On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. Guilin Wang, Jianying Zhou, Robert H. Deng. TrustBus 2004, 289-298. Web SearchBibTeXDownload
2003
71A flexible and scalable authentication scheme for JPEG2000 image codestreams. Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao. ACM Multimedia 2003, 433-441. Web SearchBibTeXDownload
70Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng. ACNS 2003, 343-356. Web SearchBibTeXDownload
69An improved personal CA for personal area networks. Robert H. Deng, Feng Bao. GLOBECOM 2003, 1486-1490. Web SearchBibTeXDownload
68Computing of Trust in Distributed Networks. Huafei Zhu, Feng Bao, Robert H. Deng. IACR Cryptology ePrint Archive (2003): 56 (2003). Web SearchBibTeXDownload
67A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack. Huafei Zhu, Feng Bao, Robert H. Deng. IACR Cryptology ePrint Archive (2003): 59 (2003). Web SearchBibTeXDownload
66An Efficient Known Plaintext Attack on FEA-M. Hongjun Wu, Feng Bao, Robert H. Deng. ICICS 2003, 84-87. Web SearchBibTeXDownload
65An Efficient Public-Key Framework. Jianying Zhou, Feng Bao, Robert H. Deng. ICICS 2003, 88-99. Web SearchBibTeXDownload
64Security Remarks on a Group Signature Scheme with Member Deletion. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng. ICICS 2003, 72-83. Web SearchBibTeXDownload
63Variations of Diffie-Hellman Problem. Feng Bao, Robert H. Deng, Huafei Zhu. ICICS 2003, 301-312. Web SearchBibTeXDownload
62Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. Yongdong Wu, Robert H. Deng. ICICS 2003, 238-248. Web SearchBibTeXDownload
61Security Analysis of Some Proxy Signatures. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng. ICISC 2003, 305-319. Web SearchBibTeXDownload
60Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. Jianying Zhou, Feng Bao, Robert H. Deng. ISC 2003, 96-110. Web SearchBibTeXDownload
59Secure the image-based simulated telesurgery system. Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng. ISCAS (2) 2003, 596-599. Web SearchBibTeXDownload
58Flexible authentication of images. Yanjiang Yang, Feng Bao, Robert H. Deng. VCIP 2003, 1905-1911. Web SearchBibTeX
2002
57Security Analysis and Improvement of the Global Key Recovery System. Yanjiang Yang, Feng Bao, Robert H. Deng. ACISP 2002, 17-24. Web SearchBibTeXDownload
56Defending against redirect attacks in mobile IP. Robert H. Deng, Jianying Zhou, Feng Bao. ACM Conference on Computer and Communications Security 2002, 59-67. Web SearchBibTeXDownload
55Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. Guilin Wang, Jianying Zhou, Robert H. Deng. IACR Cryptology ePrint Archive (2002): 150 (2002). Web SearchBibTeXDownload
54Validating Digital Signatures without Time-Stamping and Certificate Revocation. Jianying Zhou, Feng Bao, Robert H. Deng. IACR Cryptology ePrint Archive (2002): 156 (2002). Web SearchBibTeXDownload
53Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Hongjun Wu, Feng Bao, Robert H. Deng. Informatica (Slovenia) (26) (2002). Web SearchBibTeX
2001
52Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu. ACISP 2001, 190-205. Web SearchBibTeXDownload
51Privacy Protection for Transactions of Digital Goods. Feng Bao, Robert H. Deng. ICICS 2001, 202-213. Web SearchBibTeXDownload
50An Optical Watermarking Solution for Authenticating Printed Documents. Qibin Sun, Peirong Feng, Robert H. Deng. ITCC 2001, 65-70. Web SearchBibTeXDownload
49Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu. Public Key Cryptography 2001, 153-164. Web SearchBibTeXDownload
48Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Hongjun Wu, Feng Bao, Robert H. Deng. Public Key Cryptography 2001, 173-179. Web SearchBibTeXDownload
2000
47Cryptanalysis of Polynominal Authentication and Signature Scheme. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng. ACISP 2000, 278-288. Web SearchBibTeXDownload
46Cryptanalysis of the m-Permutation Protection Schemes. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng. ACISP 2000, 97-111. Web SearchBibTeXDownload
45On the validity of digital signatures. Jianying Zhou, Robert H. Deng. Computer Communication Review (30): 29-34 (2000). Web SearchBibTeXDownload
44Multicast Internet protocol. Xinkai Wang, Robert H. Deng, Feng Bao. Computer Communications (23): 1047-1054 (2000). Web SearchBibTeXDownload
43An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. Feng Bao, Robert H. Deng, Peirong Feng. ICISC 2000, 162-170. Web SearchBibTeXDownload
42Some Remarks on a Fair Exchange Protocol. Jianying Zhou, Robert H. Deng, Feng Bao. Public Key Cryptography 2000, 46-57. Web SearchBibTeXDownload
41Electronic Payment Systems with Fair On-line Verification. Feng Bao, Robert H. Deng, Jianying Zhou. SEC 2000, 451-460. Web SearchBibTeX
1999
40Evolution of Fair Non-repudiation with TTP. Jianying Zhou, Robert H. Deng, Feng Bao. ACISP 1999, 258-269. Web SearchBibTeXDownload
39Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum. Robert H. Deng. Computer Communications (22): 591 (1999). Web SearchBibTeXDownload
38Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan. DEXA Workshop 1999, 858-863. Web SearchBibTeXDownload
37A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Feng Bao, Robert H. Deng. Public Key Cryptography 1999, 1-11. Web SearchBibTeXDownload
1998
36Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye. ASIACRYPT 1998, 126-132. Web SearchBibTeXDownload
35Improved Truncated Differential Attacks on SAFER. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye. ASIACRYPT 1998, 133-147. Web SearchBibTeXDownload
34Efficient and Practical Fair Exchange Protocols with Off-Line TTP. Feng Bao, Robert H. Deng, Wenbo Mao. IEEE Symposium on Security and Privacy 1998, 77-85. Web SearchBibTeXDownload
33A Signcryption Scheme with Signature Directly Verifiable by Public Key. Feng Bao, Robert H. Deng. Public Key Cryptography 1998, 55-59. Web SearchBibTeXDownload
32A Ubiquitous Secure and Reliable Digital Data Depository System. Robert H. Deng, Jian Hu, Feng Bao, A. Desai Narasimhalu. WETICE 1998, 354-358. Web SearchBibTeXDownload
1997
31Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng. ACISP 1997, 261-270. Web SearchBibTeXDownload
30A New On-Line Cash Check Scheme. Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair. ACM Conference on Computer and Communications Security 1997, 111-116. Web SearchBibTeXDownload
29RSA-type Signatures in the Presence of Transient Faults. Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng. IMA Int. Conf. 1997, 155-160. Web SearchBibTeXDownload
28Modified Finite Automata Public Key Cryptosystem. Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi. ISW 1997, 82-95. Web SearchBibTeXDownload
27Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair. Security Protocols Workshop 1997, 115-124. Web SearchBibTeXDownload
26Integrating Security in the CORBA Architecture. Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar. TAPOS (3): 3-13 (1997). Web SearchBibTeX
1996
25Practical Protocols for Certified Electronic Mail. Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang. J. Network Syst. Manage. (4): 279-297 (1996). Web SearchBibTeXDownload
1995
24Integrating security in CORBA based object architectures. Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar. IEEE Symposium on Security and Privacy 1995, 50-61. Web SearchBibTeXDownload
23A type I hybrid ARQ system with adaptive code rates. Robert H. Deng, Michael L. Lin. IEEE Transactions on Communications (43): 733-737 (1995). Web SearchBibTeXDownload
1994
22Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems. Koon Seng Lim, Robert H. Deng, Kisenchand Ranai. Computer Communications (17): 251-256 (1994). Web SearchBibTeXDownload
21Simulating a Multimedia FDDI Backbone Network. Kisenchand Ranai, Koon Seng Lim, Robert H. Deng. Comput. J. (37): 188-198 (1994). Web SearchBibTeXDownload
20Hybrid ARQ schemes employing coded modulation and sequence combining. Robert H. Deng. IEEE Transactions on Communications (42): 2239-2245 (1994). Web SearchBibTeXDownload
19On the equivalence of McEliece's and Niederreiter's public-key cryptosystems. Yuanxing Li, Robert H. Deng, Xinmei Wang. IEEE Transactions on Information Theory (40): 271-273 (1994). Web SearchBibTeXDownload
1993
18Performance analysis of two bridged CSMA/CD networks. Chi Chung Ko, W. C. Wong, J. L. Du, Robert H. Deng, Kin Mun Lye. Computer Communications (16): 501-510 (1993). Web SearchBibTeXDownload
17Effects of station buffer capacity on token ring network performance. Robert H. Deng, Wendy C. L. Chiew. Computer Communications (16): 366-375 (1993). Web SearchBibTeXDownload
16LAN-based medical visualization communication system. Robert H. Deng, Renben Shu. Computer Communications (16): 518-525 (1993). Web SearchBibTeXDownload
15Performance of a token-passing system with batch arrivals and its application to file transfers. Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang. Computer Communications (16): 422-431 (1993). Web SearchBibTeXDownload
14Performance Analysis of Interconnected LANs with Server/Client Configuration. Jiangling Du, Robert H. Deng, Chi Chung Ko. Computer Networks and ISDN Systems (25): 1321-1333 (1993). Web SearchBibTeXDownload
13A Probabilistic Approach to Fault Diagnosis in Linear Lightware Networks. Robert H. Deng, Aurel A. Lazar, Weiguo Wang. IEEE Journal on Selected Areas in Communications (11): 1438-1448 (1993). Web SearchBibTeXDownload
12Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels. Robert H. Deng. IEEE Transactions on Communications (41): 1379-1387 (1993). Web SearchBibTeXDownload
11A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks. Robert H. Deng, Aurel A. Lazar, Weiguo Wang. Integrated Network Management 1993, 697-708. Web SearchBibTeX
1991
10End-to-end performance of interconnected LANs. Brigitte Berg, Robert H. Deng. Computer Communications (14): 105-112 (1991). Web SearchBibTeXDownload
9Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations. Robert H. Deng, Wendy C. L. Chiew, Kuan-Tsae Huang. INFOCOM 1991, 202-210. Web SearchBibTeX
8Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs. Robert H. Deng, Xian-Yu Zhang, Kuan-Tsae Huang. INFOCOM 1991, 1041-1049. Web SearchBibTeX
1990
7Gateway Design for LAN Interconnection via ISDN. Xian-Yu Zhang, Robert H. Deng. Computer Networks and ISDN Systems (19): 43-51 (1990). Web SearchBibTeXDownload
6Trellis-coded multidimensional phase modulation. Steven S. Pietrobon, Robert H. Deng, Alain Lafanechére, Gottfried Ungerboeck, Daniel J. Costello Jr.. IEEE Transactions on Information Theory (36): 63-89 (1990). Web SearchBibTeXDownload
1989
5High rate concatenated coding systems using multidimensional bandwidth-efficient trellis inner codes. Robert H. Deng, Daniel J. Costello Jr.. IEEE Transactions on Communications (37): 1091-1096 (1989). Web SearchBibTeXDownload
4Parity retransmission hybrid ARQ using rate 1/2 convolutional codes on a nonstationary channel. Laurent R. Lugand, Daniel J. Costello Jr., Robert H. Deng. IEEE Transactions on Communications (37): 755-765 (1989). Web SearchBibTeXDownload
3High rate concatenated coding systems using bandwidth efficient trellis inner codes. Robert H. Deng, Daniel J. Costello Jr.. IEEE Transactions on Communications (37): 420-427 (1989). Web SearchBibTeXDownload
1988
2DC-free coset codes. Robert H. Deng, Mark A. Herro. IEEE Transactions on Information Theory (34): 786-792 (1988). Web SearchBibTeXDownload
1987
1Decoding of DBEC-TBED Reed-Solomon Codes. Robert H. Deng, Daniel J. Costello Jr.. IEEE Trans. Computers (36): 1359-1363 (1987). Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research