What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Robert H. Deng
Google Scholar
ORCID:
0000-0003-3491-8146
196
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
AuditPCH: Auditable Payment Channel Hub With Privacy Protection.
Yuxian Li
Jian Weng
Junzuo Lai
Yingjiu Li
Jiahe Wu
Ming Li
Jianfei Sun
Pengfei Wu
Robert H. Deng
2025
journals/tifs
Robust Federated Learning Client Selection With Combinatorial Class Representations and Data Augmentation.
Haiyan Zhang
Xinghua Li
Mengfan Xu
Shunjie Yuan
Mengyao Zhu
Robert H. Deng
2025
journals/tifs
DkvSSO: Delegatable Keyed-Verification Credentials for Efficient Anonymous Single Sign-On.
Wenyi Xue
Yang Yang
Minming Huang
Yingjiu Li
HweeHwa Pang
Robert H. Deng
2025
journals/tifs
Oblivious Encrypted Keyword Search With Fine-Grained Access Control for Cloud Storage.
Qiuyun Tong
Junyi Deng
Xinghua Li
Yinbin Miao
Yunwei Wang
Robert H. Deng
2025
journals/tifs
Enforcing Differential Privacy in Federated Learning via Long-Term Contribution Incentives.
Xiangyun Tang
Luyao Peng
Yu Weng
Meng Shen
Liehuang Zhu
Robert H. Deng
2025
journals/tifs
Distributional Black-Box Model Inversion Attack With Multi-Agent Reinforcement Learning.
Huan Bao
Kaimin Wei
Yongdong Wu
Jin Qian
Robert H. Deng
2025
journals/tifs
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework.
Xiangyun Tang
Minyang Li
Meng Shen
Jiawen Kang
Liehuang Zhu
Zhiquan Liu
Guomin Yang
Dusit Niyato
Robert H. Deng
2025
journals/tifs
Forward-Secure Hierarchical Delegable Signature for Smart Homes.
Jianfei Sun
Guowen Xu
Yang Yang
Xuehuan Yang
Xiaoguo Li
Cong Wu
Zhen Liu
Guomin Yang
Robert H. Deng
2025
journals/tifs
Enhanced Model Poisoning Attack and Multi-Strategy Defense in Federated Learning.
Li Yang
Yinbin Miao
Ziteng Liu
Zhiquan Liu
Xinghua Li
Da Kuang
Hongwei Li
Robert H. Deng
2025
conf/acisp
DeGain: Detecting GAN-Based Data Inversion in Collaborative Deep Learning.
Zhenzhu Chen
Yansong Gao
Anmin Fu
Fanjian Zeng
Boyu Kuang
Robert H. Deng
2025
conf/ndss
Siniel: Distributed Privacy-Preserving zkSNARK.
Yunbo Yang
Yuejia Cheng
Kailun Wang
Xiaoguo Li
Jianfei Sun
Jiachen Shen
Xiaolei Dong
Zhenfu Cao
Guomin Yang
Robert H. Deng
2025
conf/ndss
Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems.
Zhongming Wang
Tao Xiang
Xiaoguo Li
Biwen Chen
Guomin Yang
Chuan Ma
Robert H. Deng
2025
journals/tifs
Keyword-Pair Result Pattern Hiding Structured Encryption for Boolean Queries.
Lanxiang Chen
Yi Mu
Jiahui Yang
Robert H. Deng
2025
conf/esorics
An Efficient Security-Enhanced Accountable Access Control for Named Data Networking.
Jianfei Sun
Yuxian Li
Xuehuan Yang
Guomin Yang
Robert H. Deng
2025
conf/uss
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication.
Yang Yang
Guomin Yang
Yingjiu Li
Minming Huang
Zilin Shen
Imtiaz Karim
Ralf Sasse
David A. Basin
Elisa Bertino
Jian Weng
HweeHwa Pang
Robert H. Deng
2025
conf/uss
Practical Keyword Private Information Retrieval from Key-to-Index Mappings.
Meng Hao
Weiran Liu
Liqiang Peng
Cong Zhang
Pengfei Wu
Lei Zhang
Hongwei Li
Robert H. Deng
2025
journals/tifs
A Lightweight Consensus Mechanism for Large-Scale UAV Networking.
Jingjing Wang
Wei Long
Yizhong Liu
Xin Zhang
Zheng Zhang
Robert H. Deng
2024
journals/tifs
SOCI+: An Enhanced Toolkit for Secure Outsourced Computation on Integers.
Bowen Zhao
Weiquan Deng
Xiaoguo Li
Ximeng Liu
Qingqi Pei
Robert H. Deng
2024
journals/tifs
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
Yang Yang
Wenyi Xue
Jianfei Sun
Guomin Yang
Yingjiu Li
HweeHwa Pang
Robert H. Deng
2024
journals/tifs
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data.
Yanrong Liang
Jianfeng Ma
Yinbin Miao
Yuan Su
Robert H. Deng
2024
journals/tifs
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data.
Zekai Chen
Shengxing Yu
Mingyuan Fan
Ximeng Liu
Robert H. Deng
2024
journals/tifs
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
Ju Jia
Siqi Ma
Yang Liu
Lina Wang
Robert H. Deng
2024
journals/tifs
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
Yinbin Miao
Xinru Yan
Xinghua Li
Shujiang Xu
Ximeng Liu
Hongwei Li
Robert H. Deng
2024
journals/tifs
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving.
Yunbo Yang
Xiang Chen
Yuhao Pan
Jiachen Shen
Zhenfu Cao
Xiaolei Dong
Xiaoguo Li
Jianfei Sun
Guomin Yang
Robert H. Deng
2024
journals/tifs
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
Xiaoguo Li
Zixi Huang
Bowen Zhao
Guomin Yang
Tao Xiang
Robert H. Deng
2024
journals/tifs
FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning.
Zhe Chen
Haiyan Zhang
Xinghua Li
Yinbin Miao
Xiaohan Zhang
Man Zhang
Siqi Ma
Robert H. Deng
2024
journals/tifs
Lightweight Privacy-Preserving Cross-Cluster Federated Learning With Heterogeneous Data.
Zekai Chen
Shengxing Yu
Farong Chen
Fuyi Wang
Ximeng Liu
Robert H. Deng
2024
journals/tifs
Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings.
Yinbin Miao
Da Kuang
Xinghua Li
Shujiang Xu
Hongwei Li
Kim-Kwang Raymond Choo
Robert H. Deng
2024
journals/tifs
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage.
Qiuyun Tong
Xinghua Li
Yinbin Miao
Yunwei Wang
Ximeng Liu
Robert H. Deng
2024
journals/tifs
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph.
Mengdi Hu
Lanxiang Chen
Gaolin Chen
Yi Mu
Robert H. Deng
2024
journals/tifs
Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading.
Man Zhang
Xinghua Li
Yinbin Miao
Bin Luo
Wanyun Xu
Yanbing Ren
Robert H. Deng
2024
journals/tifs
SDSS: Sequential Data Sharing System in IoT.
Jianchang Lai
Willy Susilo
Robert H. Deng
Fuchun Guo
2024
conf/ccs
Direct Range Proofs for Paillier Cryptosystem and Their Applications.
Zhikang Xie
Mengling Liu
Haiyang Xue
Man Ho Au
Robert H. Deng
Siu-Ming Yiu
2024
conf/ccs
PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT Networks.
Zhe Ren
Xinghua Li
Yinbin Miao
Mengyao Zhu
Shunjie Yuan
Robert H. Deng
2024
conf/sp
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption.
Xiaoguo Li
Guomin Yang
Tao Xiang
Shengmin Xu
Bowen Zhao
HweeHwa Pang
Robert H. Deng
2024
conf/asiaccs
Toward Practical Client-Side Encryption in Cloud Computing.
Robert H. Deng
2024
conf/ndss
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
Yang Yang
Robert H. Deng
Guomin Yang
Yingjiu Li
HweeHwa Pang
Minming Huang
Rui Shi
Jian Weng
2023
journals/tifs
CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics.
Bowen Zhao
Xiaoguo Li
Ximeng Liu
Qingqi Pei
Yingjiu Li
Robert H. Deng
2023
journals/tifs
Accountable and Fine-Grained Controllable Rewriting in Blockchains.
Shengmin Xu
Xinyi Huang
Jiaming Yuan
Yingjiu Li
Robert H. Deng
2023
journals/tifs
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption.
Jianfei Sun
Guowen Xu
Tianwei Zhang
Xuehuan Yang
Mamoun Alazab
Robert H. Deng
2023
journals/tifs
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
Jianfei Sun
Guowen Xu
Tianwei Zhang
Xuehuan Yang
Mamoun Alazab
Robert H. Deng
2023
journals/tifs
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots.
Wenyi Xue
Yang Yang
Yingjiu Li
HweeHwa Pang
Robert H. Deng
2023
journals/tifs
Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data.
Yinbin Miao
Yutao Yang
Xinghua Li
Zhiquan Liu
Hongwei Li
Kim-Kwang Raymond Choo
Robert H. Deng
2023
journals/tifs
Secure Model-Contrastive Federated Learning With Improved Compressive Sensing.
Yinbin Miao
Wei Zheng
Xinghua Li
Hongwei Li
Kim-Kwang Raymond Choo
Robert H. Deng
2023
journals/tifs
Authenticable Data Analytics Over Encrypted Data in the Cloud.
Lanxiang Chen
Yi Mu
Lingfang Zeng
Fatemeh Rezaeibagha
Robert H. Deng
2023
journals/tifs
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits.
Xueqiao Liu
Guomin Yang
Willy Susilo
Kai He
Robert H. Deng
Jian Weng
2022
journals/tifs
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
Yanbing Ren
Xinghua Li
Yinbin Miao
Bin Luo
Jian Weng
Kim-Kwang Raymond Choo
Robert H. Deng
2022
journals/tifs
Redactable Blockchain in Decentralized Setting.
Jinhua Ma
Shengmin Xu
Jianting Ning
Xinyi Huang
Robert H. Deng
2022
journals/tifs
Lightweight Privacy-Preserving GAN Framework for Model Training and Image Synthesis.
Yang Yang
Ke Mu
Robert H. Deng
2022
journals/tifs
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
Zhenzhu Chen
Shang Wang
Anmin Fu
Yansong Gao
Shui Yu
Robert H. Deng
2022
journals/tifs
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System.
Jianfei Sun
Guowen Xu
Tianwei Zhang
Mamoun Alazab
Robert H. Deng
2022
journals/tifs
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
Zhuoran Ma
Jianfeng Ma
Yinbin Miao
Yingjiu Li
Robert H. Deng
2022
journals/tifs
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems.
Yinbin Miao
Ziteng Liu
Hongwei Li
Kim-Kwang Raymond Choo
Robert H. Deng
2022
journals/tifs
SOCI: A Toolkit for Secure Outsourced Computation on Integers.
Bowen Zhao
Jiaming Yuan
Ximeng Liu
Yongdong Wu
HweeHwa Pang
Robert H. Deng
2022
conf/acsac
Compressed Federated Learning Based on Adaptive Local Differential Privacy.
Yinbin Miao
Rongpeng Xie
Xinghua Li
Ximeng Liu
Zhuo Ma
Robert H. Deng
2021
journals/tifs
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
Yan Li
Yao Cheng
Weizhi Meng
Yingjiu Li
Robert H. Deng
2021
journals/tifs
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees.
Xiangyu Wang
Jianfeng Ma
Feng Li
Ximeng Liu
Yinbin Miao
Robert H. Deng
2021
journals/tifs
K-Time Modifiable and Epoch-Based Redactable Blockchain.
Shengmin Xu
Jianting Ning
Jinhua Ma
Xinyi Huang
Robert H. Deng
2021
journals/tifs
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
Shengmin Xu
Jianting Ning
Xinyi Huang
Jianying Zhou
Robert H. Deng
2021
journals/tifs
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting.
Yang Yang
Zhangshuang Guan
Zhiguo Wan
Jian Weng
HweeHwa Pang
Robert H. Deng
2021
conf/ccs
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Jiaming Yuan
Yingjiu Li
Jian Weng
Robert H. Deng
2021
conf/esorics
Revocable Policy-Based Chameleon Hash.
Shengmin Xu
Jianting Ning
Jinhua Ma
Guowen Xu
Jiaming Yuan
Robert H. Deng
2021
conf/asiaccs
UltraPIN: Inferring PIN Entries via Ultrasound.
Ximing Liu
Yingjiu Li
Robert H. Deng
2021
conf/ndss
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection.
Jiayun Xu
Yingjiu Li
Robert H. Deng
2021
conf/dsn
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Daoyuan Wu
Debin Gao
Robert H. Deng
Rocky K. C. Chang
2020
journals/compsec
Game theoretical study on client-controlled cloud data deduplication.
Xueqin Liang
Zheng Yan
Robert H. Deng
2020
journals/tifs
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
Hua Deng
Zheng Qin
Qianhong Wu
Zhenyu Guan
Robert H. Deng
Yujue Wang
Yunya Zhou
2020
conf/ccs
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Guowen Xu
Hongwei Li
Shengmin Xu
Hao Ren
Yinghui Zhang
Jianfei Sun
Robert H. Deng
2020
conf/esorics
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Jianting Ning
Xinyi Huang
Geong Sen Poh
Shengmin Xu
Jia-Ch'ng Loh
Jian Weng
Robert H. Deng
2020
conf/acsac
Secure and Verifiable Inference in Deep Neural Networks.
Guowen Xu
Hongwei Li
Hao Ren
Jianfei Sun
Shengmin Xu
Jianting Ning
Haomiao Yang
Kan Yang
Robert H. Deng
2019
journals/compsec
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Ximing Liu
Yingjiu Li
Robert H. Deng
Bing Chang
Shujun Li
2019
conf/ccs
ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Pengfei Wu
Qingni Shen
Robert H. Deng
Ximeng Liu
Yinghui Zhang
Zhonghai Wu
2019
conf/ccs
Towards Understanding Android System Vulnerabilities: Techniques and Insights.
Daoyuan Wu
Debin Gao
Eric K. T. Cheng
Yichen Cao
Jintao Jiang
Robert H. Deng
2019
conf/ccs
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Yan Li
Zilong Wang
Yingjiu Li
Robert H. Deng
Binbin Chen
Weizhi Meng
Hui Li
2019
conf/eurosp
DroidEvolver: Self-Evolving Android Malware Detection System.
Ke Xu
Yingjiu Li
Robert H. Deng
Kai Chen
Jiayun Xu
2019
conf/esorics
Finding Flaws from Password Authentication Code in Android Apps.
Siqi Ma
Elisa Bertino
Surya Nepal
Juanru Li
Diethelm Ostry
Robert H. Deng
Sanjay Jha
2019
conf/ndss
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Daoyuan Wu
Debin Gao
Rocky K. C. Chang
En He
Eric K. T. Cheng
Robert H. Deng
2019
conf/acsac
An empirical study of SMS one-time password authentication in Android apps.
Siqi Ma
Runhan Feng
Juanru Li
Yang Liu
Surya Nepal
Diethelm Ostry
Elisa Bertino
Robert H. Deng
Zhuo Ma
Sanjay Jha
2018
journals/tifs
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
Shengmin Xu
Guomin Yang
Yi Mu
Robert H. Deng
2018
conf/eurosp
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Ke Xu
Yingjiu Li
Robert H. Deng
Kai Chen
2018
conf/acsac
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings.
Ximing Liu
Yingjiu Li
Robert H. Deng
2017
journals/tifs
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
Yujue Wang
Qianhong Wu
Bo Qin
Wenchang Shi
Robert H. Deng
Jiankun Hu
2017
conf/ccs
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Yan Li
Yao Cheng
Yingjiu Li
Robert H. Deng
2017
conf/acisp
Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Hui Cui
Robert H. Deng
Joseph K. Liu
Yingjiu Li
2017
conf/provsec
Fuzzy Public-Key Encryption Based on Biometric Data.
Hui Cui
Man Ho Au
Baodong Qin
Robert H. Deng
Xun Yi
2017
conf/esorics
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
Siqi Ma
Ferdian Thung
David Lo
Cong Sun
Robert H. Deng
2016
journals/tifs
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
Ximeng Liu
Robert H. Deng
Kim-Kwang Raymond Choo
Jian Weng
2016
journals/tifs
Privacy-Preserving Outsourced Calculation on Floating Point Numbers.
Ximeng Liu
Robert H. Deng
Wenxiu Ding
Rongxing Lu
Baodong Qin
2016
journals/tifs
ICCDetector: ICC-Based Malware Detection on Android.
Ke Xu
Yingjiu Li
Robert H. Deng
2016
conf/ccs
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Kai He
Jian Weng
Jia-Nan Liu
Joseph K. Liu
Wei Liu
Robert H. Deng
2016
conf/ccs
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data.
Ngoc Hieu Tran
HweeHwa Pang
Robert H. Deng
2016
conf/ccs
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications.
Siqi Ma
David Lo
Teng Li
Robert H. Deng
2016
conf/acisp
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Kai He
Jian Weng
Man Ho Au
Yijun Mao
Robert H. Deng
2016
conf/acisp
A Feasible No-Root Approach on Android.
Yao Cheng
Yingjiu Li
Robert H. Deng
2016
conf/provsec
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Hui Cui
Robert H. Deng
Guowei Wu
Junzuo Lai
2016
conf/esorics
Server-Aided Revocable Attribute-Based Encryption.
Hui Cui
Robert H. Deng
Yingjiu Li
Baodong Qin
2016
conf/pkc
CCA-Secure Keyed-Fully Homomorphic Encryption.
Junzuo Lai
Robert H. Deng
Changshe Ma
Kouichi Sakurai
Jian Weng
2015
journals/compsec
Leakage-resilient password entry: Challenges, design, and evaluation.
Qiang Yan
Jin Han
Yingjiu Li
Jianying Zhou
Robert H. Deng
2015
journals/compsec
Privacy leakage analysis in online social networks.
Yan Li
Yingjiu Li
Qiang Yan
Robert H. Deng
2015
journals/tifs
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks.
Yongdong Wu
Zhigang Zhao
Feng Bao
Robert H. Deng
2015
journals/tifs
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption.
Baodong Qin
Robert H. Deng
Shengli Liu
Siqi Ma
2015
conf/ccs
Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Yueqiang Cheng
Xuhua Ding
Robert H. Deng
2015
conf/ccs
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Yan Li
Yingjiu Li
Qiang Yan
Hancong Kong
Robert H. Deng
2015
conf/esorics
On Security of Content-Based Video Stream Authentication.
Swee-Won Lo
Zhuo Wei
Robert H. Deng
Xuhua Ding
2015
conf/esorics
Server-Aided Revocable Identity-Based Encryption.
Baodong Qin
Robert H. Deng
Yingjiu Li
Shengli Liu
2015
conf/pkc
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.
Baodong Qin
Shengli Liu
Tsz Hon Yuen
Robert H. Deng
Kefei Chen
2015
conf/wisec
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Daibin Wang
Haixia Yao
Yingjiu Li
Hai Jin
Deqing Zou
Robert H. Deng
2014
journals/compsec
Editorial: Special issue on trust in cyber, physical and social computing.
Zheng Yan
Guojun Wang
Valtteri Niemi
Robert H. Deng
2014
journals/tifs
A Hybrid Scheme for Authenticating Scalable Video Codestreams.
Zhuo Wei
Yongdong Wu
Robert H. Deng
Xuhua Ding
2014
conf/ccs
Understanding OSN-based facial disclosure against face authentication systems.
Yan Li
Ke Xu
Qiang Yan
Yingjiu Li
Robert H. Deng
2014
conf/ccs
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Junzuo Lai
Robert H. Deng
Yingjiu Li
Jian Weng
2014
conf/icisc
Detecting Camouflaged Applications on Mobile Application Markets.
Su Mon Kywe
Yingjiu Li
Robert H. Deng
Jason I. Hong
2014
conf/esorics
Authorized Keyword Search on Encrypted Data.
Jie Shi
Junzuo Lai
Yingjiu Li
Robert H. Deng
Jian Weng
2014
conf/esorics
Verifiable Computation on Outsourced Encrypted Data.
Junzuo Lai
Robert H. Deng
HweeHwa Pang
Jian Weng
2014
conf/ndss
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
Yueqiang Cheng
Zongwei Zhou
Miao Yu
Xuhua Ding
Robert H. Deng
2014
conf/eurocrypt
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
Junzuo Lai
Robert H. Deng
Shengli Liu
Jian Weng
Yunlei Zhao
2013
journals/tifs
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Junzuo Lai
Robert H. Deng
Chaowen Guan
Jian Weng
2013
conf/ccs
Secure access to outsourced data.
Robert H. Deng
2013
conf/ccs
Designing leakage-resilient password entry on touchscreen mobile devices.
Qiang Yan
Jin Han
Yingjiu Li
Jianying Zhou
Robert H. Deng
2013
conf/acns
Launching Generic Attacks on iOS with Approved Third-Party Applications.
Jin Han
Su Mon Kywe
Qiang Yan
Feng Bao
Robert H. Deng
Debin Gao
Yingjiu Li
Jianying Zhou
2013
conf/ndss
Comparing Mobile Privacy Protection through Cross-Platform Applications.
Jin Han
Qiang Yan
Debin Gao
Jianying Zhou
Robert H. Deng
2013
conf/ctrsa
Accountable Authority Identity-Based Encryption with Public Traceability.
Junzuo Lai
Robert H. Deng
Yunlei Zhao
Jian Weng
2012
journals/compsec
A secure and efficient discovery service system in EPCglobal network.
Jie Shi
Yingjiu Li
Robert H. Deng
2012
journals/tifs
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
Zhiguo Wan
Jun-e Liu
Robert H. Deng
2012
conf/ccs
Expressive CP-ABE with partially hidden access structures.
Junzuo Lai
Robert H. Deng
Yingjiu Li
2012
conf/acns
A New Framework for Privacy of RFID Path Authentication.
Shaoying Cai
Robert H. Deng
Yingjiu Li
Yunlei Zhao
2012
conf/ndss
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Qiang Yan
Jin Han
Yingjiu Li
Robert H. Deng
2011
journals/tifs
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
Xinyi Huang
Yi Mu
Willy Susilo
Wei Wu
Jianying Zhou
Robert H. Deng
2011
journals/tifs
Database Access Pattern Protection Without Full-Shuffles.
Xuhua Ding
Yanjiang Yang
Robert H. Deng
2011
conf/ccs
A software-based root-of-trust primitive on multicore platforms.
Qiang Yan
Jin Han
Yingjiu Li
Robert H. Deng
Tieyan Li
2011
conf/ccs
Secure mobile subscription of sensor-encrypted data.
Cheng-Kang Chu
Wen Tao Zhu
Sherman S. M. Chow
Jianying Zhou
Robert H. Deng
2011
conf/acns
Hierarchical Identity-Based Chameleon Hash and Its Applications.
Feng Bao
Robert H. Deng
Xuhua Ding
Junzuo Lai
Yunlei Zhao
2011
conf/provsec
General Construction of Chameleon All-But-One Trapdoor Functions.
Shengli Liu
Junzuo Lai
Robert H. Deng
2011
conf/esorics
DriverGuard: A Fine-Grained Protection on I/O Flows.
Yueqiang Cheng
Xuhua Ding
Robert H. Deng
2011
conf/pkc
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security.
Junzuo Lai
Robert H. Deng
Shengli Liu
2011
conf/icics
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
Wen Tao Zhu
Robert H. Deng
Jianying Zhou
Feng Bao
2010
conf/ccs
Practical ID-based encryption for wireless sensor network.
Cheng-Kang Chu
Joseph K. Liu
Jianying Zhou
Feng Bao
Robert H. Deng
2010
conf/acns
Revisiting Unpredictability-Based RFID Privacy Models.
Junzuo Lai
Robert H. Deng
Yingjiu Li
2010
conf/iciss
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Shaoying Cai
Chunhua Su
Yingjiu Li
Robert H. Deng
Tieyan Li
2010
conf/esorics
A New Framework for RFID Privacy.
Robert H. Deng
Yingjiu Li
Moti Yung
Yunlei Zhao
2010
conf/ctrsa
Efficient CCA-Secure PKE from Identity-Based Techniques.
Junzuo Lai
Robert H. Deng
Shengli Liu
Weidong Kou
2010
conf/africacrypt
Efficient Unidirectional Proxy Re-Encryption.
Sherman S. M. Chow
Jian Weng
Yanjiang Yang
Robert H. Deng
2009
conf/ccs
RFID privacy: relation between two notions, minimal condition, and efficient construction.
Changshe Ma
Yingjiu Li
Robert H. Deng
Tieyan Li
2009
conf/ccs
Conditional proxy re-encryption secure against chosen-ciphertext attack.
Jian Weng
Robert H. Deng
Xuhua Ding
Cheng-Kang Chu
Junzuo Lai
2009
conf/acisp
Conditional Proxy Broadcast Re-Encryption.
Cheng-Kang Chu
Jian Weng
Sherman S. M. Chow
Jianying Zhou
Robert H. Deng
2009
conf/iciss
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Bing Liang
Yingjiu Li
Changshe Ma
Tieyan Li
Robert H. Deng
2009
conf/icics
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Shaoying Cai
Tieyan Li
Changshe Ma
Yingjiu Li
Robert H. Deng
2009
conf/icics
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Yanjiang Yang
Jianying Zhou
Robert H. Deng
Feng Bao
2009
conf/wisec
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Shaoying Cai
Yingjiu Li
Tieyan Li
Robert H. Deng
2008
conf/cans
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Robert H. Deng
Jian Weng
Shengli Liu
Kefei Chen
2007
conf/acisp
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
Yongdong Wu
Feng Bao
Robert H. Deng
2007
conf/icics
PAKE<sup> + </sup>: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Zhiguo Wan
Robert H. Deng
Feng Bao
Bart Preneel
2006
journals/compsec
A secure extension of the Kwak-Moon group signcryption scheme.
Dong Jin Kwak
Sang-Jae Moon
Guilin Wang
Robert H. Deng
2006
conf/ccs
Fortifying password authentication in integrated healthcare delivery systems.
Yanjiang Yang
Robert H. Deng
Feng Bao
2006
conf/sp
Practical Inference Control for Data Cubes (Extended Abstract).
Yingjiu Li
Haibing Lu
Robert H. Deng
2006
conf/esorics
Private Information Retrieval Using Trusted Hardware.
Shuhong Wang
Xuhua Ding
Robert H. Deng
Feng Bao
2005
conf/sec
Secure Person-To-Person Communications Based on Biometrics Signals.
Yongdong Wu
Feng Bao
Robert H. Deng
2005
conf/sec
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.
Yanjiang Yang
Feng Bao
Robert H. Deng
2005
conf/sec
Protecting Group Dynamic Information in Large Scale Multicast Groups.
Yongdong Wu
Tieyan Li
Robert H. Deng
2005
conf/acisp
Security Analysis and Fix of an Anonymous Credential System.
Yanjiang Yang
Feng Bao
Robert H. Deng
2005
conf/icics
Authenticating Query Results in Data Publishing.
Di Ma
Robert H. Deng
HweeHwa Pang
Jianying Zhou
2005
conf/icics
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security.
Shuhong Wang
Feng Bao
Robert H. Deng
2005
conf/icics
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Huafei Zhu
Feng Bao
Robert H. Deng
2004
journals/compsec
New efficient user identification and key distribution scheme providing enhanced security.
Yanjiang Yang
Shuhong Wang
Feng Bao
Jie Wang
Robert H. Deng
2004
conf/acns
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Bok-Min Goi
Raphael Chung-Wei Phan
Yanjiang Yang
Feng Bao
Robert H. Deng
M. U. Siddiqi
2004
conf/icisc
On Security Notions for Steganalysis.
Kisik Chang
Robert H. Deng
Feng Bao
Sangjin Lee
HyungJun Kim
Jongin Lim
2004
conf/icisc
A Block Oriented Fingerprinting Scheme in Relational Database.
Siyuan Liu
Shuhong Wang
Robert H. Deng
Weizhong Shao
2004
conf/icics
Dynamic Access Control for Multi-privileged Group Communications.
Di Ma
Robert H. Deng
Yongdong Wu
Tieyan Li
2004
conf/icics
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Tieyan Li
Yongdong Wu
Di Ma
Huafei Zhu
Robert H. Deng
2003
conf/acns
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Gang Yao
Kui Ren
Feng Bao
Robert H. Deng
Dengguo Feng
2003
conf/icisc
Security Analysis of Some Proxy Signatures.
Guilin Wang
Feng Bao
Jianying Zhou
Robert H. Deng
2003
conf/icics
An Efficient Public-Key Framework.
Jianying Zhou
Feng Bao
Robert H. Deng
2003
conf/icics
Variations of Diffie-Hellman Problem.
Feng Bao
Robert H. Deng
Huafei Zhu
2003
conf/icics
An Efficient Known Plaintext Attack on FEA-M.
Hongjun Wu
Feng Bao
Robert H. Deng
2003
conf/icics
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.
Yongdong Wu
Robert H. Deng
2003
conf/icics
Security Remarks on a Group Signature Scheme with Member Deletion.
Guilin Wang
Feng Bao
Jianying Zhou
Robert H. Deng
2002
conf/ccs
Defending against redirect attacks in mobile IP.
Robert H. Deng
Jianying Zhou
Feng Bao
2002
conf/acisp
Security Analysis and Improvement of the Global Key Recovery System.
Yanjiang Yang
Feng Bao
Robert H. Deng
2001
conf/acisp
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.
Feng Bao
Robert H. Deng
Peirong Feng
Yan Guo
Hongjun Wu
2001
conf/pkc
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems.
Feng Bao
Robert H. Deng
Willi Geiselmann
Claus-Peter Schnorr
Rainer Steinwandt
Hongjun Wu
2001
conf/pkc
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Hongjun Wu
Feng Bao
Robert H. Deng
2001
conf/icics
Privacy Protection for Transactions of Digital Goods.
Feng Bao
Robert H. Deng
2000
conf/sec
Electronic Payment Systems with Fair On-line Verification.
Feng Bao
Robert H. Deng
Jianying Zhou
2000
conf/acisp
-Permutation Protection Schemes.
Hongjun Wu
Feng Bao
Dingfeng Ye
Robert H. Deng
2000
conf/acisp
Cryptanalysis of Polynominal Authentication and Signature Scheme.
Hongjun Wu
Feng Bao
Dingfeng Ye
Robert H. Deng
2000
conf/icisc
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods.
Feng Bao
Robert H. Deng
Peirong Feng
2000
conf/pkc
Some Remarks on a Fair Exchange Protocol.
Jianying Zhou
Robert H. Deng
Feng Bao
1999
conf/acisp
Evolution of Fair Non-repudiation with TTP.
Jianying Zhou
Robert H. Deng
Feng Bao
1999
conf/pkc
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation.
Feng Bao
Robert H. Deng
1998
conf/sp
Efficient and Practical Fair Exchange Protocols with Off-Line TTP.
Feng Bao
Robert H. Deng
Wenbo Mao
1998
conf/pkc
A Signcryption Scheme with Signature Directly Verifiable by Public Key.
Feng Bao
Robert H. Deng
1998
conf/asiacrypt
Improved Truncated Differential Attacks on SAFER.
Hongjun Wu
Feng Bao
Robert H. Deng
Qin-Zhong Ye
1998
conf/asiacrypt
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers.
Hongjun Wu
Feng Bao
Robert H. Deng
Qin-Zhong Ye
1997
conf/ccs
A New On-Line Cash Check Scheme.
Robert H. Deng
Yongfei Han
Albert B. Jeng
Teow-Hin Ngair
1997
conf/acisp
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow.
Feng Bao
Robert H. Deng
Yongfei Han
Albert B. Jeng
1995
conf/sp
Integrating security in CORBA based object architectures.
Robert H. Deng
Shailendra K. Bhonsle
Weiguo Wang
Aurel A. Lazar
Coauthors
Albert B. Jeng
(2)
Anmin Fu
(2)
Aurel A. Lazar
(1)
Baodong Qin
(6)
Bart Preneel
(1)
Bin Luo
(2)
Binbin Chen
(1)
Bing Chang
(1)
Bing Liang
(1)
Biwen Chen
(1)
Bo Qin
(1)
Bok-Min Goi
(1)
Bowen Zhao
(5)
Boyu Kuang
(1)
Changshe Ma
(4)
Chaowen Guan
(1)
Cheng-Kang Chu
(4)
Chuan Ma
(1)
Chunhua Su
(1)
Claus-Peter Schnorr
(1)
Cong Sun
(1)
Cong Wu
(1)
Cong Zhang
(1)
Da Kuang
(2)
Daibin Wang
(1)
Daoyuan Wu
(3)
David A. Basin
(1)
David Lo
(2)
Debin Gao
(5)
Dengguo Feng
(1)
Deqing Zou
(1)
Di Ma
(3)
Diethelm Ostry
(2)
Dingfeng Ye
(2)
Dong Jin Kwak
(1)
Dusit Niyato
(1)
Elisa Bertino
(3)
En He
(1)
Eric K. T. Cheng
(2)
Fanjian Zeng
(1)
Farong Chen
(1)
Fatemeh Rezaeibagha
(1)
Feng Bao
(42)
Feng Li
(1)
Ferdian Thung
(1)
Fuchun Guo
(1)
Fuyi Wang
(1)
Gang Yao
(1)
Gaolin Chen
(1)
Geong Sen Poh
(2)
Guilin Wang
(3)
Guojun Wang
(1)
Guomin Yang
(13)
Guowei Wu
(1)
Guowen Xu
(7)
Hai Jin
(1)
Haibing Lu
(1)
Haixia Yao
(1)
Haiyan Zhang
(2)
Haiyang Xue
(1)
Hancong Kong
(1)
Hao Ren
(2)
Haomiao Yang
(1)
Hongjun Wu
(8)
Hongwei Li
(9)
Hua Deng
(1)
Huafei Zhu
(3)
Huan Bao
(1)
Hui Cui
(4)
Hui Li
(1)
HweeHwa Pang
(11)
HyungJun Kim
(1)
Imtiaz Karim
(1)
Jason I. Hong
(1)
Jia-Ch'ng Loh
(1)
Jia-Nan Liu
(1)
Jiachen Shen
(2)
Jiahe Wu
(1)
Jiahui Yang
(1)
Jiaming Yuan
(4)
Jian Weng
(22)
Jianchang Lai
(1)
Jianfei Sun
(11)
Jianfeng Ma
(3)
Jiankun Hu
(1)
Jianting Ning
(7)
Jianying Zhou
(19)
Jiawen Kang
(1)
Jiayun Xu
(2)
Jie Shi
(2)
Jie Wang
(1)
Jin Han
(6)
Jin Qian
(1)
Jingjing Wang
(1)
Jinhua Ma
(3)
Jintao Jiang
(1)
Jongin Lim
(1)
Joseph K. Liu
(3)
Ju Jia
(1)
Juanru Li
(2)
Jun-e Liu
(1)
Junyi Deng
(1)
Junzuo Lai
(16)
Kai Chen
(2)
Kai He
(3)
Kailun Wang
(1)
Kaimin Wei
(1)
Kan Yang
(1)
Ke Mu
(1)
Ke Xu
(4)
Kefei Chen
(2)
Kim-Kwang Raymond Choo
(6)
Kisik Chang
(1)
Kouichi Sakurai
(1)
Kui Ren
(1)
Lanxiang Chen
(3)
Lei Zhang
(1)
Li Yang
(1)
Liehuang Zhu
(2)
Lina Wang
(1)
Lingfang Zeng
(1)
Liqiang Peng
(1)
Luyao Peng
(1)
M. U. Siddiqi
(1)
Mamoun Alazab
(3)
Man Ho Au
(3)
Man Zhang
(2)
Meng Hao
(1)
Meng Shen
(2)
Mengdi Hu
(1)
Mengfan Xu
(1)
Mengling Liu
(1)
Mengyao Zhu
(2)
Miao Yu
(1)
Ming Li
(1)
Mingyuan Fan
(1)
Minming Huang
(3)
Minyang Li
(1)
Moti Yung
(1)
Ngoc Hieu Tran
(1)
Peirong Feng
(2)
Pengfei Wu
(3)
Qiang Yan
(9)
Qianhong Wu
(2)
Qin-Zhong Ye
(2)
Qingni Shen
(1)
Qingqi Pei
(2)
Qiuyun Tong
(2)
Rainer Steinwandt
(1)
Ralf Sasse
(1)
Raphael Chung-Wei Phan
(1)
Robert H. Deng
(196)
Rocky K. C. Chang
(2)
Rongpeng Xie
(1)
Rongxing Lu
(1)
Rui Shi
(1)
Runhan Feng
(1)
Sang-Jae Moon
(1)
Sangjin Lee
(1)
Sanjay Jha
(2)
Shailendra K. Bhonsle
(1)
Shang Wang
(1)
Shaoying Cai
(4)
Shengli Liu
(8)
Shengmin Xu
(10)
Shengxing Yu
(2)
Sherman S. M. Chow
(3)
Shuhong Wang
(4)
Shui Yu
(1)
Shujiang Xu
(2)
Shujun Li
(1)
Shunjie Yuan
(2)
Siqi Ma
(7)
Siu-Ming Yiu
(1)
Siyuan Liu
(1)
Su Mon Kywe
(2)
Surya Nepal
(2)
Swee-Won Lo
(1)
Tao Xiang
(3)
Teng Li
(1)
Teow-Hin Ngair
(1)
Tianwei Zhang
(3)
Tieyan Li
(9)
Tsz Hon Yuen
(1)
Valtteri Niemi
(1)
Wanyun Xu
(1)
Wei Liu
(1)
Wei Long
(1)
Wei Wu
(1)
Wei Zheng
(1)
Weidong Kou
(1)
Weiguo Wang
(1)
Weiquan Deng
(1)
Weiran Liu
(1)
Weizhi Meng
(2)
Weizhong Shao
(1)
Wen Tao Zhu
(2)
Wenbo Mao
(1)
Wenchang Shi
(1)
Wenxiu Ding
(1)
Wenyi Xue
(3)
Willi Geiselmann
(1)
Willy Susilo
(3)
Xiang Chen
(1)
Xiangyu Wang
(1)
Xiangyun Tang
(2)
Xiaoguo Li
(8)
Xiaohan Zhang
(1)
Xiaolei Dong
(2)
Ximeng Liu
(12)
Ximing Liu
(3)
Xin Zhang
(1)
Xinghua Li
(13)
Xinru Yan
(1)
Xinyi Huang
(7)
Xuehuan Yang
(4)
Xueqiao Liu
(1)
Xueqin Liang
(1)
Xuhua Ding
(9)
Xun Yi
(1)
Yan Guo
(1)
Yan Li
(6)
Yanbing Ren
(2)
Yang Liu
(1)
Yang Liu
(1)
Yang Yang
(8)
Yanjiang Yang
(9)
Yanrong Liang
(1)
Yansong Gao
(2)
Yao Cheng
(3)
Yi Mu
(5)
Yichen Cao
(1)
Yijun Mao
(1)
Yinbin Miao
(16)
Yinghui Zhang
(2)
Yingjiu Li
(47)
Yizhong Liu
(1)
Yongdong Wu
(10)
Yongfei Han
(2)
Yu Weng
(1)
Yuan Su
(1)
Yuejia Cheng
(1)
Yueqiang Cheng
(3)
Yuhao Pan
(1)
Yujue Wang
(2)
Yunbo Yang
(2)
Yunlei Zhao
(5)
Yunwei Wang
(2)
Yunya Zhou
(1)
Yutao Yang
(1)
Yuxian Li
(2)
Zekai Chen
(2)
Zhangshuang Guan
(1)
Zhe Chen
(1)
Zhe Ren
(1)
Zhen Liu
(1)
Zhenfu Cao
(2)
Zheng Qin
(1)
Zheng Yan
(2)
Zheng Zhang
(1)
Zhenyu Guan
(1)
Zhenzhu Chen
(2)
Zhigang Zhao
(1)
Zhiguo Wan
(3)
Zhikang Xie
(1)
Zhiquan Liu
(3)
Zhonghai Wu
(1)
Zhongming Wang
(1)
Zhuo Ma
(2)
Zhuo Wei
(2)
Zhuoran Ma
(1)
Zilin Shen
(1)
Zilong Wang
(1)
Ziteng Liu
(2)
Zixi Huang
(1)
Zongwei Zhou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to