15.08.2013 Views

Huijie, Robert DENG Education Position(s) Held - Singapore ...

Huijie, Robert DENG Education Position(s) Held - Singapore ...

Huijie, Robert DENG Education Position(s) Held - Singapore ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

.<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

School of Information Systems<br />

<strong>Singapore</strong> Management University<br />

robertdeng@smu.edu.sg<br />

Office Phone: 6828 0920<br />

Date of CV revision: 28 January 2013<br />

Citizenship: <strong>Singapore</strong><br />

.<br />

.<br />

<strong>Education</strong><br />

.<br />

Jan 1984 - Dec 1985 Ph.D. in Electrical Engineering<br />

Illinois Institute of Technology, Chicago<br />

Jan 1983 - Dec 1983 M.Sc. in Electrical Engineering<br />

Illinois Institute of Technology, Chicago<br />

Mar 1978 - Dec 1981 B.E in Electrical Engineering<br />

National University of Defense Technology, China<br />

.<br />

.<br />

<strong>Position</strong>(s) <strong>Held</strong><br />

.<br />

Jul 2004 - Now Professor<br />

School of Information Systems<br />

<strong>Singapore</strong> Management University<br />

Aug 2005 - Nov 2006 Principal Scientist<br />

Joint appointment with Institute for Infocomm Research<br />

Agency for Science, Technology and Research (A*STAR)<br />

Nov 2002 - Jul 2004 Principle Scientist and Manager<br />

Infocomm Security Department<br />

Institute for Infocomm Research<br />

Agency for Science, Technology and Research (A*STAR)<br />

Sep 2003 - Now Adjunct Professor<br />

Zhejiang University, Hangzhou, China<br />

Jan 2002 - Oct 2002 Principal Research Staff Member and Director<br />

Lab for Information Technology, A*STAR, <strong>Singapore</strong><br />

Ubiquitous and Distributed Computing Program<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

Apr 1998 - Dec 2001 Principal Research Staff Member, Deputy Director of Ubiquity Lab<br />

National Science and Technology Board, <strong>Singapore</strong>.<br />

Kent Ridge Digital Labs<br />

Jul 1994 - Mar 1998 Senior Research Staff Member and Manager of Information Security<br />

Group<br />

Institute of Systems Science<br />

National University of <strong>Singapore</strong><br />

Jul 1991 - Jun 1994 Senior Lecturer<br />

Department of Electrical and Computer Engineering<br />

National University of <strong>Singapore</strong><br />

Jul 1987 - Jun 1991 Research Staff Member and Project Leader of Communications Group<br />

Institute of Systems Science<br />

National University of <strong>Singapore</strong><br />

Jan 1986 - Jun 1987 Postdoctoral Research Associate<br />

University of Notre Dame, Notre Dame, Indiana, USA<br />

Page 1 of 32


.<br />

Jan 1984 - Dec 1985 Research Assistant<br />

Illinois Institute of Technology, Chicago, Illinois, USA<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

Mar 1982 - Dec 1982 Teaching Assistant<br />

Beijing University of Aeronautics & Astronautics, Beijing, China<br />

Nov 2009 - Nov 2012 Guest Professor, Wuhan University, Wuhan, China<br />

.<br />

.<br />

.<br />

Journal Articles (Refereed)<br />

.<br />

1. "Detecting node replication attacks in wireless sensor networks: theory and approaches", by Wen<br />

Tao ZHU, Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 2012, 5, 5, Journal of Security<br />

and Communication Networks, Wiley, InterScience, 496-507<br />

.<br />

2. "TruRepec: A trust-behavior-based reputation and recommender system for mobile applications",<br />

by Zheng YAN, Peng ZHANG, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 5, 16, Journal of Personal and<br />

Ubiquitous Computing, Springer, 485-506<br />

.<br />

3. "HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud<br />

computing", by Zhiguo WAN, June LIU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 7, 2, IEEE Transactions<br />

on Information Forensics and Security (TIFS), 732-754<br />

.<br />

4. "A Survey on Privacy Frameworks for RFID Authentication", by Chunhua SU, Yingjiu LI, Yunlei<br />

ZHAO, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Yiming ZHAO, and Jianying ZHOU, 2012, 95-D, 1, IEICE<br />

Transactions, 2-11<br />

.<br />

5. "Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems", by Qiang YAN,<br />

Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 1, 1, International Journal of RFID Security and<br />

Cryptography, 25-35<br />

.<br />

6. "Detecting node replication attacks in wireless sensor networks: a survey", by Wen Tao ZHU,<br />

Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 2012, 35, 3, Journal of Network and<br />

Computer Applications, 1022-1034<br />

.<br />

7. "Enhanced authentication for commercial video services", by Xinyi HUANG, Cheng-Kang CHU,<br />

Hung-Min SUN, Jianying ZHOU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 5, 11, Journal of Security and<br />

Communication Networks, Wiley InterScience, 1248-1259<br />

.<br />

8. "A scalable and format-compliant encryption scheme for H.264/SVC bitstreams", by Zhuo WEI,<br />

Yongdong WU, Xuhua DING, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 27, 9, Signal Processing: Image<br />

Communication, Elsevier, 1011-1024<br />

.<br />

9. "A secure and efficient discovery service system in EPCglobal network", by Jie SHI, Yingjiu LI,<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2012, 31, 8, Computers and Security, Elsevier, 870-885<br />

.<br />

10. "Database Access Pattern Protection Without Full-shuffles", by Xuhua DING, Yanjiang YANG,<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2011, 6, 1, IEEE Transactions on Information Forensics and Security<br />

(TIFS)<br />

.<br />

11. "On two RFID privacy notions and their relations", by Yingjiu LI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Junzuo<br />

LAI, and Changshe MA, 2011, 14, 4, ACM Transactions on Information and System Security<br />

(TISSEC), 30:1-23<br />

.<br />

12. "A zero-knowledge based framework for RFID privacy", by <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Yingjiu LI, Moti<br />

YUNG, and Yunlei ZHAO, 2011, 19, 6, Journal of Computer Security (JCS), IOS, 1109-1146<br />

.<br />

13. "Secure mobile agents with controlled resources", by Qi ZHANG, Yi MU, Minjie ZHANG, and<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 08/2011, Journal of Concurrency and Computation: Practice and<br />

Experience, 1348-1366<br />

Page 2 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

.<br />

14. "A generic framework for three-factor authentication: preserving security and privacy in<br />

distributed systems", by Xinyi HUANG, Yang XIANG, Ashley CHONKA, Jianying ZHOU, and<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 08/2011, 22, 8, IEEE Transactions on Parallel and Distributed Systems,<br />

1390-1397<br />

.<br />

15. "General construction of Chameleon all-but-one trapdoor functions", by Shengli LIU, Junzuo LAI,<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 08/2011, 1, 2/3, Journal of Internet Services and Information Security,<br />

1390-1397<br />

.<br />

16. "Preserving transparency and accountability in optimistic fair exchange of digital signatures", by<br />

Xinyi HUANG, Yi MU, Willy SUSILO, Jianying ZHOU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 06/2011, 6, 2,<br />

IEEE Transactions on Information Forensics and Security, 489-512<br />

.<br />

17. "Secure localization with attack detection in wireless sensor networks", by Wentao ZHU, Yang<br />

XIANG, Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Bao FENG, 06/2011, 10, 3, International<br />

Journal of Information Security (IJIS), 155-171<br />

.<br />

18. "Cryptanalysis of a certificateless signcryption scheme in the standard model", by Jian WENG,<br />

Guoxiang YAO, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Min-Rong CHEN, and Xianxue LI, 02/2011, 181, 3,<br />

Information Sciences, 661-667<br />

.<br />

19. "Better security enforcement in trusted computing enabled heterogeneous wireless sensor<br />

networks", by Yanjiang YANG, Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 01/2011, 4,<br />

1, Journal of Security and Communication Networks, Wiley InterScience, 11-22<br />

.<br />

20. "Shifting Inference Control to User Side: Architecture and Protocol", by Yanjiang YANG, Yingjiu LI,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 2010, 7, 2, IEEE Transactions on Dependable and Secure<br />

Computing (TDSC), IEEE, 189-202<br />

.<br />

21. "On the potential of limitation-oriented malware detection and prevention techniques on mobile<br />

phone", by Qiang YAN, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Yingjiu LI, and Tieyan LI, 2010, 4, 1, International<br />

Journal of Security and Its Applications, 21-30<br />

.<br />

22. "TeleOph: a secure real-time teleophthalmology system", by Yongdong WU, Zhou WEI, Haixia<br />

YAO, Zhigang ZHAO, Lek Heng NGOH, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Shengsheng YU, 2010, 14, 5,<br />

IEEE Transactions on Information Technology in Biomedicine, 1259-1266<br />

.<br />

23. "Achieving high security and efficiency in RFID-tagged supply chains", by Shaoying CAI, Yingjiu<br />

LI, Tieyan LI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Haixia YAO, 2010, 2, 2, International Journal of Applied<br />

Cryptography, Inderscience, 3-12<br />

.<br />

24. "Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings", by Jian<br />

WENG, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Shengli LIU, and Kefei CHEN, 12/2010, 180, 24, Information<br />

Sciences, 5077-5089<br />

.<br />

25. "A new hardware-assisted PIR with O(n) shuffle cost", by Xuhua DING, Yanjiang YANG, <strong>Huijie</strong>,<br />

<strong>Robert</strong> <strong>DENG</strong>, and Shuhong WANG, 08/2010, 9, 4, International Journal of Information Security<br />

(IJIS), 237-252<br />

.<br />

26. "Time-bound hierarchical key assignment: an overview", by Wen Tao ZHU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>,<br />

Jianying ZHOU, and Feng BAO, 05/2010, E93-D, 5, IEICE Transactions on Information and<br />

Systems, 1044-1052<br />

.<br />

27. "Cryptanalysis of a hierarchical identity-based encryption scheme", by Jian WENG, Min-Rong<br />

CHEN, Kefei CHEN, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 04/2010, 93-A, 4, IEICE Transactions, 854-856<br />

.<br />

28. "A multi-key pirate decoder against traitor tracing schemes", by Yongdong WU and <strong>Huijie</strong>, <strong>Robert</strong><br />

<strong>DENG</strong>, 03/2010, 25, 2, Journal of Computer Science and Technology, Springer, 362-374<br />

.<br />

Page 3 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

29. "Efficient discrete logarithm based multi-signature scheme in the plain public key model", by<br />

Changshe MA, Jian WENG, Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 02/2010, 54, 2, Designs, Codes<br />

and Cryptography, Springer, 121-133<br />

.<br />

30. "New constructions for identify-based unidirectional proxy re-encryption", by Junzuo LAI, Wen<br />

Tao ZHU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Shengli LIU, and Weidong KOU, 01/2010, 25, 4, Journal of<br />

Computer Science and Technology, 793-806<br />

.<br />

31. "Multiuser private queries over encrypted databases", by Yanjiang YANG, Feng BAO, Xuhua<br />

DING, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2009, 1, 4, Journal of Applied Cryptography, Inderscience,<br />

309-319<br />

.<br />

32. "Privacy-preserving rental services using one-show anonymous credentials", by Yanjiang YANG,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 11/2009, 2, 6, Journal of Security and Communication<br />

Networks, Wiley InterScience, 531-545<br />

.<br />

33. "A Study of Data Authentication in Proxy-Enabled Multimedia Delivery Systems: Model, Schemes<br />

and Application", by <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong> and Yanjing YANG, 10/2009, 5, 4, ACM Transactions<br />

on Multimeda Computing, Communications and Applications, 28.1-28.20<br />

.<br />

34. "n PAKE+: a tree-based group password-authenticated key exchange protocol using different<br />

passwords", by Zhiguo WAN, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Fen BAO, Bart PRENEEL, and Ming GU,<br />

01/2009, 24, 1, Journal of Computer Science and Technology (JCST), Springer, 138-151<br />

.<br />

35. "A Secure and Synthesis Tele-Ophthalmology System", by Zhuo WEI, Yongdong WU, <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, Shengsheng YU, Haixia YAO, Zhigang ZHAO, Lek Heng NGOH, Tock Han LIM,<br />

and Eugenie POH, 10/2008, 14, 8, Journal of Telemedicine and e-Health, American Telemedicine<br />

Association, 833-845<br />

.<br />

36. "The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol", by Tieyan<br />

LI, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Guilin WANG, 04/2008, 1, 2, Journal of Security and<br />

Communication Networks, Wiley InterScience, 135-146<br />

.<br />

37. "Security analysis on a family of ultra-lightweight RFID authentication protocols", by Tieyan LI,<br />

Guilin WANG, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 03/2008, Vol. 3, 3, Journal of Software, 1-10<br />

.<br />

38. "Technique for hiding mobile node's location movement information in mobile IP", by <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, Ying QIU, Jianying ZHOU, and Feng BAO, 2007, Vol. 4, 1, China Communications, 85-94<br />

.<br />

39. "Flexible access control to JPEG2000 image code-streams", by Yongdong WU, Di MA, and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/2007, Vol. 9, 6, IEEE Transactions on Multimedia, 1314-1324<br />

.<br />

40. "Access control protocols with two-layer architecture for wireless networks", by Zhiguo WAN,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Feng BAO, and A. L. ANANDA, 02/2007, Vol. 51, 3, Journal of Computer<br />

Networks, 655-670<br />

.<br />

41. "A Practical Password-Based Two-Server Authentication and Key Exchange System", by Yanjiang<br />

YANG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Feng BAO, 2006, Vol. 3, 2, IEEE Transactions on Dependable<br />

and Secure Computing, IEEE, 105-114, United States Of America<br />

.<br />

42. "Routing optimization security in mobile IPv6", by Kui REN, Wenjing LOU, Kai ZENG, Feng BAO,<br />

Jianying ZHOU, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 2006, Vol. 40, 13, Computer Networks, 2401-2419<br />

.<br />

43. "A Secure Extension of the Kwak-Moon Group Signcryption Scheme", by D. KWAK, S. MOON, G.<br />

WANG, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/2006, Vol. 25, 6, Journal of Computer & Security, 435-444<br />

.<br />

44. "Three Architectures for Trusted Data Dissemination in Edge Computing", by Shen-Tat GOH,<br />

Hwee Hwa PANG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Feng BAO, 09/2006, Vol. 58, 3, Data and<br />

Knowledge Engineering Journal, 381-409<br />

.<br />

Page 4 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

45. "A Novel Privacy Preserving Authentication and Access Control Scheme in Pervasive Computing<br />

Environments", by K. REN, W. LOU, K. KIM, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 07/2006, Vol. 55, 4, IEEE<br />

Transactions on Vehicular Technology, 1373-1384<br />

.<br />

46. "Security Analysis on A Conference Scheme for Mobile Communications", by Zhiguo WAN, Feng<br />

BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and A. L. ANANDA, 06/2006, Vol. 5, 6, IEEE Transactions on Wireless<br />

Communications, 1238-1240<br />

.<br />

47. "Scalable authentication of MPEG-4 streams", by Y. WU and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 02/2006, Vol.<br />

8, 1, IEEE Transactions on Multimedia, 152-161<br />

.<br />

48. "Minimizing TTP's involvement in signature validation", by Jianying ZHOU, Feng BAO, and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 01/2006, International Journal of Information Security<br />

.<br />

49. "New efficient MDS array codes for RAID - Part II: Rabin-like codes for tolerating multiple (>=4)<br />

disk failures", by Gui-Liang FENG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Feng BAO, 12/2005, Vol. 54, 12,<br />

IEEE Transactions on Computers, 1473-1483<br />

.<br />

50. "Tailored watermarking schemes for authentication of electronic clinical atlases", by F. BAO,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, B. C. OOI, and Y. YANG, 12/2005, Vol. 9, 4, Accepted by IEEE Transactions<br />

on Information Technology in Biomedicine, 553-563<br />

.<br />

51. "Scalable trusted online dissemination of JPEG2000 images", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Di MA,<br />

Weizhong SHAO, and Yongdong WU, 11/2005, Vol. 11, ACM Multimedia Systems Journal, 60-67<br />

.<br />

52. "New efficient MDS array codes for RAID Part I: Reed-Solomon-like codes for tolerating three<br />

disk failures", by Gui-Liang FENG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Feng BAO, and J-C SHEN, 09/2005, Vol.<br />

54, 09, IEEE Transactions on Computers, 1071-1080<br />

.<br />

53. "Protocols that hide user's preferences in electronic transactions", by Feng BAO and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 07/2005, Vol. 48, 04, Journal of Computer Networks, 503-515<br />

.<br />

54. "Highly reliable trust establishment scheme in ad-hoc networks", by K. REN, T.Y. LI, Z. WAN, F.<br />

BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and K. KIM, 2004, Vol. 45, 6, Computer Networks, Elsevier, 687-699<br />

.<br />

55. "Efficient and robust key management for large mobile ad-hoc networks", by B. ZHU, F. BAO,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, M. KANKANHALLI, and G. WANG, 2004, Accepted by Computer Networks<br />

Journal<br />

.<br />

56. "Security of an Ill-Posed Operator Based Scheme for Image Authentication", by Y. WU and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 2004, Vol. 5, 1, IEEE Transactions on Circuits and Systems for Video<br />

Technology, 161 - 163<br />

.<br />

57. "Comments on a threshold proxy signature scheme based on the RSA cryptosystem", by G.<br />

WANG, F. BAO, J. ZHOU, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/2004, Vol. 16, 11, IEEE Transactions on<br />

Knowledge and Data Engineering, 1309-1311<br />

.<br />

58. "New efficient user identification and key distribution scheme providing enhanced security", by Y.<br />

YANG, S. WANG, F. BAO, J. WANG, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 08/2004, Computer & Security,<br />

Elsevier<br />

.<br />

59. "Packet-loss resilient coding scheme with only XOR operations", by G. -L. FENG, <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, and F. BAO, 08/2004, Vol. 151, 04, IEE Proceedings - Communications, 322-328<br />

.<br />

60. "A smart-card enabled privacy preserving e-prescription system", by Y. YANG, X. HAN, F. BAO,<br />

and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 03/2004, Vol. 8, 1, IEEE Transactions on Information Technology in<br />

Biomedicine, 47 - 58<br />

.<br />

61. "Content-aware authentication of motion JPEG2000 stream in lossy networks", by Y. WU and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 11/2003, Vol. 49, 4, IEEE Transactions on Consumer Electronics, 792 - 801<br />

Page 5 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

.<br />

62.<br />

.<br />

"Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes", by Hongjun WU,<br />

Feng BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 2002, Vol. 26, Acta Infomatica, 255-258<br />

63.<br />

.<br />

"Multicast Internet Protocol", by X. WANG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and F. BAO, 2000, Vol. 23,<br />

Journal of Computer Communications, 1047 - 1054<br />

64.<br />

.<br />

"On the validity of digital signatures", by J. ZHOU and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 04/2000, Vol. 30, 2,<br />

ACM SIGCOMM Computer Communication Review, ACM Press, 29 - 34<br />

65.<br />

.<br />

"Capture model for mobile radio slotted ALOHA systems", by H. ZHOU and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

04/1998, Vol. 45, 2, IEE Proceedings-Communications, 91 - 97<br />

66.<br />

.<br />

"Integrating security in the CORBA architecture", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, S. K. BHONSLE, W.<br />

WANG, and A. A. LAZAR, 1997, Vol. 3, 1, Theory and Practice of Object Systems, Special Issue,<br />

Research Directions: The Future of CORBA, John Wiley & Sons, 3 - 13<br />

67.<br />

.<br />

"Practical protocols for certified electronic mail", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Gong L., Lazar A. A.,<br />

and Wang W., 1996, Vol. 4, 3, Journal of Network and Systems Management, 279 - 297<br />

68.<br />

.<br />

"An on-the-fly decoding technique for Reed-Solomon codes", by Y. X. LI, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

and E. H. KOH, 09/1996, Vol. 32, 5, IEEE Transactions on Magnetics, 3962 - 3964<br />

69.<br />

.<br />

"Type-I hybrid ARQ scheme with time diversity for binary digital FM cellular radio", by H. ZHOU<br />

and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 02/1996, Vol. 143, 1, IEE Proceedings-Communications, 29 - 36<br />

70.<br />

.<br />

"A type I hybrid ARQ system with adaptive code rates", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 04/1995, Vol. 43,<br />

2/3/4, IEEE Transactions on Communications<br />

71. "(D, K/I) constrained partial-response maximum-likelihood codes", by Y. X. LI, J.<br />

SUBRAHMANYAM, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 01/1995, Vol. 78, 1, International Journal of<br />

Electronics, 19 - 24<br />

.<br />

72.<br />

.<br />

"Hybrid ARQ schemes employing coded modulatioin and sequence combining", by <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 01/1995, Vol. 42, 6, IEEE Transactions on Communications, 2239 - 2245<br />

73.<br />

.<br />

"Performance of combined diversity reception and convolutional coding for QPSK land mobile<br />

radio", by H. ZHOU, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and T. T. TJHUNG, 08/1994, Vol. 43, 3, IEEE<br />

Transactions on Vehicular Technology, 499 - 508<br />

74.<br />

.<br />

"Exact and approximate models to obtain average throughput of the FDDI MAC protocol - part II:<br />

asymmetric systems", by Lim K. S., <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Ranai K., 04/1994, Vol. 17, 4,<br />

Journal of Computer Communications, 251 - 256<br />

75.<br />

.<br />

"Simulating a multimedia FDDI backbone network", by K. RANAI, K. S. LIM, and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 03/1994, Vol. 37, 3, The Computer Journal, 188 - 198<br />

76.<br />

.<br />

"Exact and approximate models to obtain average throughput of the FDDI MAC protocol - part I:<br />

symmetric systems", by K. S. LIM, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and K. RANAI, 02/1994, Vol. 17, 2,<br />

Journal of Computer Communications, 83 - 93<br />

77.<br />

.<br />

"On the equivalence of McEliece's and Niederreiter's public-key cryptosystems", by Y. X. LI,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and X. M. WANG, 01/1994, Vol. 40, 1, IEEE Transactions on Information<br />

Theory, 271 - 273<br />

78.<br />

.<br />

"Performance analysis of interconnected LANs with server/client configuration", by J. DU, <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, and C. C. KO, 1993, Vol. 25, Journal of Computer Networks and ISDN Systems,<br />

1321 - 1333<br />

Page 6 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

79. "A probabilistic approach to fault diagnosis in linear lightwave networks", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

A. A. LAZAR, and W. WANG, 12/1993, Vol. 11, 9, IEEE Journal of Selected Areas in<br />

Communications, 1438 - 1448<br />

.<br />

80. "An adaptive coding scheme with code combining for mobile radio systems", by <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong> and H. ZHOU, 11/1993, Vol. 42, 4, IEEE Transactions on Vehicular Technology, 469 - 476<br />

.<br />

81. "New parity retransmission system using product codes", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/1993, Vol.<br />

140, Part 1, 5, IEE Proceedings, 351 - 356<br />

.<br />

82. "DC-free error-correcting convolutional codes", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Y. X. LI, and M. A.<br />

HERRO, 10/1993, Vol. 29, 22, Electronic Letters, 1910 - 1911<br />

.<br />

83. "Hybrid ARQ schemes for point-to-multipoint communications over nonstationary broadcast<br />

channels", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/1993, Vol. 41, 9, IEEE Transactions on Communications,<br />

1379 - 1387<br />

.<br />

84. "A LAN based medical image visualization system and its performance study", by <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong> and R. SHU, 08/1993, Vol. 16, 8, Journal of Computer Communications, 518 - 525<br />

.<br />

85. "Performance analysis of two bridged CSMA/CD networks", by C. C. KO, W. C. WANG, J. L. DU,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Lye K. M., 08/1993, Vol. 16, 8, Journal of Computer Communications,<br />

501 - 510<br />

.<br />

86. "Performance of a token-passing system with batch arrivals and its applications to file transfers",<br />

by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, X. Y. ZHANG, and K. T. HUANG, 07/1993, Vol. 16, 7, Journal of<br />

Computer Communications, 422 - 431<br />

.<br />

87. "Effects of station buffer capacity on performance of token-ring networks", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong><br />

and W. C. L. CHIEW, 06/1993, Vol. 16, 6, Journal of Computer Communications, 366 - 375<br />

.<br />

88. "Performance of convolutional coding with symbol erasure for QPSK frequency-selective fading<br />

channels", by H. ZHOU and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 02/1993, Vol. E76-B, 2, Special Issue on Land<br />

Mobile/Portable Propagation, IEICE Transactions Communcations, 139 - 147<br />

.<br />

89. "Adaptive hybrid ARQ schemes using trellis codes and Viterbi decoding", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

12/1992, Vol. 2, 4, Asia Pacific Engineering J., Special Issue on Communications Engineering,<br />

483 - 496<br />

.<br />

90. "New selection diversity reception scheme effective for both frequency-flat and selective fading<br />

channels", by H. ZHOU, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and S. YOSHIDA, 12/1992, Vol. 28, 25, Electronic<br />

Letters, 2297 - 2298<br />

.<br />

91. "Hybrid ARQ scheme using TCM and code combining", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 05/1991, Vol. 27,<br />

10, Electronic Letters, 866 - 868<br />

.<br />

92. "End-to-end performance of interconnected LANs", by B. BERG and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

03/1991, Vol. 14, 2, Journal of Computer Communications, 105 - 112<br />

.<br />

93. "Gateway design for LAN interconnection via ISDN", by X. Y. ZHANG and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

09/1990, Vol. 19, Journal of Computer Networks and ISDN Systems, 43 - 51<br />

.<br />

94. "Trellis-coded multidimensional phase modulation", by S. S. PIETROBON and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 01/1990, Vol. 36, 1, IEEE Transactions on Information Theory, 63 - 89<br />

.<br />

95. "High rate concatenated coding systems using multidimensional bandwidth efficient inner codes",<br />

by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong> and D. J. COSTELLO, JR., 10/1989, Vol. 37, 10, IEEE Transactions on<br />

Communications, 1091 - 1096<br />

.<br />

Page 7 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

96.<br />

.<br />

"New point-to-multipoint communications protocols", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, X. Y. ZHANG, and<br />

Y. K. THAM, 08/1989, Vol. 136, Part 1, 1, IEE Proceedings, 312 - 316<br />

97.<br />

.<br />

"Parity retransmission hybrid ARQ using rate 1/2 convolutional codes on a nonstationary<br />

channel", by L. R. LUGAND, D. J. COSTELLO, JR., and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 07/1989, Vol. 37, 7,<br />

IEEE Transactions on Communications, 755 - 765<br />

98.<br />

.<br />

"High rate concatenated coding systems using bandwidth efficient trellis inner codes", by <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong> and D. J. COSTELLO, JR., 05/1989, Vol. 37, 5, IEEE Transactions on<br />

Communications, 420 - 427<br />

99.<br />

.<br />

"DC-free coset codes", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong> and M. A. HERRO, 07/1988, Vol. 34, 4, IEEE<br />

Transactions on Information Theory, 786 - 792<br />

100. "Decoding of DBEC-TBED Reed-Solomon codes", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong> and D. J. COSTELLO,<br />

JR., 11/1987, Vol. 36, 11, IEEE Transactions on Computers, 1359 - 1363<br />

.<br />

101. "Reliability and throughput analysis of a concatenated coding system", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong><br />

and D. J. COSTELLO, JR., 07/1987, Vol. 35, 7, IEEE Transactions on Communications, 698 - 705<br />

.<br />

.<br />

Conference Papers (Refereed)<br />

.<br />

1.<br />

.<br />

"Comparing Mobile Privacy Protection through Cross-Platform Applications", by Jin HAN, Qiang<br />

YAN, Debin GAO, Jianying ZHOU, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 02/2013, The 20th Annual Network<br />

& Distributed System Security Symposium (NDSS 2013), San Diego, CA, USA<br />

2.<br />

.<br />

"Design and implementation of a secure prototype for EPCglobal network services", by Jie SHI,<br />

Yingjiu LI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Kevin CHIEW, 11/2012, Proceedings of RFIDSec 2012<br />

Workshop, Taipei, Taiwan<br />

3.<br />

.<br />

"An improved authentication scheme for H.264/SVC and its performance evaluation over<br />

non-stationary wireless mobile networks", by Yifan ZHAO, Swee-Won LO, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>,<br />

and Xuhua DING, 11/2012, 192-206, Proceedings of the 6th International Conference on<br />

Network and System Security (NSS 2012), Springer, LNCS 7645, Wuyishan, China<br />

4. "No tradeoff between confidentiality and performance: an analysis on H.264/SVC partial<br />

encryption", by Zhuo WEI, Xuhua DING, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Yongdong WU, 09/2012,<br />

72-86, Proceedings of the 13th Joint IFIP TC6 and TC11 Conference on Communications and<br />

Multimedia Security (CMS 2012), LNCS 7394, Best Paper Award, Canterbury, UK<br />

.<br />

5.<br />

.<br />

"A pollution attack to public-key watermarking schemes", by Yongdong WU and <strong>Huijie</strong>, <strong>Robert</strong><br />

<strong>DENG</strong>, 07/2012, 230-235, Proceedings of the 2012 IEEE International Conference on Multimedia<br />

and Expo (ICME 2012), Melbourne, Australia<br />

6.<br />

.<br />

"A new framework for privacy of RFID path authentication", by Shaoying CAI, <strong>Huijie</strong>, <strong>Robert</strong><br />

<strong>DENG</strong>, Yingjiu LI, and Yunlei ZHAO, 06/2012, 473-488, Proceedings of the 10th International<br />

Conference on Applied Cryptography and Network Security (ACNS 2012), LNCS 7341,<br />

<strong>Singapore</strong><br />

7.<br />

.<br />

"Expressive CP-ABE with partially hidden access structures", by Junzuo LAI, <strong>Huijie</strong>, <strong>Robert</strong><br />

<strong>DENG</strong>, and Yingjiu LI, 05/2012, Proceedings of the 7th ACM Symposium on Information,<br />

Computer and Communications Security (AsiaCCS 2012), Seoul, Korea<br />

8.<br />

.<br />

"SecDS: A Secure EPC Discovery Services System in EPCglobal Network", by Jie SHI, Darren<br />

SIM, Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 02/2012, 267-274, 2nd ACM Conference on Data and<br />

Application Security and Privacy (CODASPY), San Antonio, TX, USA<br />

9. "On Limitations of Designing Usable Leakage-Resilient Password Systems: Attacks, Principles<br />

and Usability", by Qiang YAN, Jin HAN, Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 02/2012, 19th<br />

Page 8 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

Network & Distributed System Security Symposium (NDSS), Distinguisged Paper Award,, San<br />

Diego, California, USA<br />

.<br />

10. "Applying time-bound hierarchical key assignment in wireless sensor networks", by Wentao ZHU,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Jianying ZHOU, and Feng BAO, 11/2011, 306-318, The 13th International<br />

Conference on Information and Communications Security (ICICS), LNCS 7043, Springer, Beijing,<br />

China<br />

.<br />

11. "Zero-error watermarking on JPEG images by shuffling Huffman tree nodes", by Yongdong WU<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 11/2011, Proceedings of the Visual Communications and Image<br />

Processing (VCIP 2011), Tainan, Taiwan<br />

.<br />

12. "General construction of Chameleon all-but-one trapdoor functions", by Shengli LIU, Junzuo LAI,<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 10/2011, 257-265, the 5th International Conference on Provable<br />

Security (ProvSec2011), LNCS 6980, Springer, Xi'an, China<br />

.<br />

13. "DriverGuard: A Fine-grained Protection On I/O Flow", by Yueqiang CHENG, Xuhua DING, and<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 09/2011, 227-244, European Symposium on Research in Computer<br />

Security (ESORICS)<br />

.<br />

14. "On detection of erratic arguments", by Jin HAN, Qiang YAN, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Debin<br />

GAO, 09/2011, 7th International ICST Conference on Security and Privacy in Communication<br />

Networks (SecureComm),, London, UK<br />

.<br />

15. "Hierarchical Identity-based Chameleon Hash and Its Applications", by Feng BAO, <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, Xuhua DING, Junzuo LAI, and Yunlei ZHAO, 06/2011, 201-219, International Conference<br />

on Applied Cryptography and Network Security (ACNS)<br />

.<br />

16. "Fully secure ciphertext-policy hiding CP-ABE", by Junzuo LAI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Yingjiu<br />

LI, 06/2011, 24-39, Proceedings of the 7th Information Security Practice and Experience<br />

Conference (ISPEC 2011), LNCS 6672, Guangzhou, China<br />

.<br />

17. "RFID Mutual Authentication Protocols with Universally Composable Security", by Chunhua SU,<br />

Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 04/2011, RFIDsec 2011 Asia, China<br />

.<br />

18. "On False Authentications for C1G2 Passive RFID Tags", by Kevin CHIEW, Yingjiu LI, Tieyan LI,<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 04/2011, RFIDsec 2011 Asia, China<br />

.<br />

19. "A Software-Based Root-of-Trust Primitive on Multicore Platforms", by Qiang YAN, Jin HAN,<br />

Yingjiu LI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Tieyan LI, 03/2011, 6th ACM Symposium on Information,<br />

Computer and Communications Security (ASIACCS 2011), Hong Kong<br />

.<br />

20. "Secure mobile subscription of sensor-encrypted data", by Cheng-kang CHU, Wentao ZHU,<br />

Sherman CHOW, Jianying ZHOU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 03/2011, 228-237, The 6th ACM<br />

Symposium on Information, Computer and Communications Security, Hong Kong<br />

.<br />

21. "Chameleon all-but-one TDFs and their application to chosen-ciphertext security", by Junzuo LAI,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Shengli LIU, 03/2011, 228-245, The 14th International Conference on<br />

Practice and Theory in Public Key Cryptography (PKC 2011)<br />

.<br />

22. "Time cost evaluation for executing RFID authentication protocols", by Kevin CHIEW, Yingjiu LI,<br />

Tieyan LI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Manfred AIGNER, 12/2010, Proceedings of Internet of<br />

Things 2010 Conference (IOT 2010), Tokyo, Japan<br />

.<br />

23. "Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains", by Shaoying<br />

CAI, Chunhua SU, Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 12/2010, 246-260, International<br />

Conference on Information Systems Security (ICISS 2010), India<br />

.<br />

24. "Pseudonym-based RFID discovery service to mitigate unauthorized tracking in supply chain<br />

management", by Qiang YAN, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Zheng YAN, Yingjiu LI, and Tieyan LI,<br />

Page 9 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

09/2010, 21-26, Proceedings of the 2nd International Symposium on Data, Privacy and<br />

E-Commerce, New York, USA<br />

.<br />

25. "A new framework for RFID privacy", by <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Yingjiu LI, Moti YUNG, and Yunlei<br />

ZHAO, 09/2010, 1-18, Proceedings of the 15th European Symposium on Research in Computer<br />

Security (ESORICS 2010), LNCS, Springer, Athens, Greece<br />

.<br />

26. "Revisiting unpredictability-based RFID privacy models", by Junzuo LAI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>,<br />

and Yingjiu LI, 06/2010, 475-492, Proceedings of the 8th International Conference on Applied<br />

Cryptography and Network Security (ACNS 2010), LNCS 6123, Springer, Beijing, China<br />

.<br />

27. "Efficient unidirectional proxy re-encryption", by Sherman CHOW, Weng JIAN, Yanjiang YANG,<br />

and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 05/2010, 316-332, Proceedings of the Third International Conference<br />

on Cryptology in Africa, LNCS 6055, Springer, South Africa<br />

.<br />

28. "Practical ID-based encryption for wireless sensor network", by Cheng-Kang CHU, Joseph K.<br />

LIU, Jianying ZHOU, Feng BAO, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 04/2010, 13-16, Proceedings of the<br />

5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010),<br />

Beijing, China<br />

.<br />

29. "Efficient CCA-secure public key encryption from identity-based techniques", by Junzuo LAI,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Shengli LIU, and Weidong KOU, 03/2010, 132-147, Proceedings of the<br />

Cryptographers’ Track at the RSA Conference (CT-RSA 2010), LNCS 5985, Springer, San<br />

Francisco, USA<br />

.<br />

30. "Remote Attestation on Function Execution", by Gu LIANG, Yueqiang CHENG, Xuhua DING,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Guo YAO, 2009, International Conference on Trusted Computing<br />

(INTRUST)<br />

.<br />

31. "Insights into Malware Detection and Prevention on Mobile Phones", by Qiang YAN, Yingjiu LI,<br />

Tieyan LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 12/2009, 242-249, 2009 International Conference on<br />

Security Technology (SecTech 2009), Jeju Island, Korea<br />

.<br />

32. "On the untraceability of anonymous RFID authentication protocol with constant key-lookup", by<br />

Bing LIANG, Yingjiu LI, Tieyan LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 12/2009, 71-85, Proceedings of the<br />

Fifth International Conference on Information Systems Security (ICISS 2009), LNCS 5905,<br />

Springer, Kolkata, India<br />

.<br />

33. "Computationally secure hierarchical self-healing key distribution for heterogeneous wireless<br />

sensor networks", by Yanjiang YANG, Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO,<br />

12/2009, 135-149, Proceedings of the 11th International Conference on Information and<br />

Communications Security (ICICS 2009), LNCS 5927, Springer, Beijing, China<br />

.<br />

34. "Flexible and secure secret updating for unidirectional key distribution in RFID-enabled supply<br />

chains", by Shaoying CAI, Tieyan LI, Changshe MA, Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>,<br />

12/2009, 150-164, Proceedings of the 11th International Conference on Information and<br />

Communications Security (ICICS 2009), LNCS 5927, Springer, Beijing, China<br />

.<br />

35. "Fooling public-key watermarking detectors with optimal color noise", by Yongdong WU and<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 11/2009, 5-9, Proceedings of the 2009 International Conference on<br />

Multimedia Information NEtworking and Security (MINES 2009), IEEE Computer Society, Wuhan,<br />

China<br />

.<br />

36. "On group key management for secure multicast employing the inverse element", by Wen Tao<br />

ZHU and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 11/2009, 337-341, Proceedings of the 2009 International<br />

Conference on Multimedia Information NEtworking and Security (MINES 2009), Wuhan, China<br />

.<br />

37. "RFID privacy: relation between two notions, minimal condition, and efficient construction", by<br />

Changshe MA, Yingjiu LI, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Tieyan LI, 11/2009, 54-65, Proceedings of<br />

the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago,<br />

Page 10 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

USA<br />

.<br />

38. "Secure mobile agents with designated hosts", by Qi ZHANG, Yi MU, Minji ZHANG, and <strong>Huijie</strong>,<br />

<strong>Robert</strong> <strong>DENG</strong>, 10/2009, 286-293, Proceedings of the 3rd International Conference on Network &<br />

System Security (NSS’09), Gold Coast, Australia<br />

.<br />

39. "Hierarchical self-healing key distribution for heterogeneous wireless sensor networks", by<br />

Yanjiang YANG, Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 09/2009, 285-295,<br />

Proceedings of the 5th International ICST Conference on Security and Privacy in Communication<br />

Networks (SecureComm 2009), Athens, Greece<br />

.<br />

40. "Efficient conditional proxy re-encryption with chosen-ciphertext security", by Jian WENG,<br />

Yanjiang YANG, Qiang TANG, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 09/2009, 151-166, Proceedings of the<br />

2009 Information Security Conference (ISC 2009), LNCS 5735, Springer, Pisa, Italy<br />

.<br />

41. "Applying sanitizable signature to web-service-enabled business processes: going beyond<br />

integrity protection", by Kar Way TAN and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 67-74, Proceedings of<br />

the IEEE 7th International Conference on Web Services (ICWS 2009), Los Angeles, USA<br />

.<br />

42. "On the effectiveness of software diversity: a systematic study on real-world vulnerabilities", by<br />

Jin HAN, Debin GAO, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 127-146, Proceedings of the 6th SIG<br />

SIDAR Conference on Detection of Intrusions and Malware, and Vulnerability Assessment<br />

(DIMVA2009), LNCS 5587, Springer, Milan, Italy<br />

.<br />

43. "Conditional proxy broadcast re-encryption", by Cheng-Kang CHU, Jian WENG, Sherman<br />

CHOW, Jianying ZHOU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 327-242, Proceedings of the 14th<br />

Australasian Conference on Information Security and Privacy (ACISP 2009), LNCS 5594,<br />

Springer, Brisbane, Australia<br />

.<br />

44. "Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems", by Shaoying CAI,<br />

Tieyan LI, Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 04/2009, 372-383, the 5th Information Security<br />

Practice and Experience Conference (ISPEC 2009), LNCS 5451, Springer, Xi'an, China<br />

.<br />

45. "Achieving better privacy protection in wireless sensor networks using trusted computing", by<br />

Yanjiang YANG, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Jianying ZHOU, and Ying QIU, 04/2009, 384-395,<br />

Proceedings of the 5th Information Security Practice and Experience Conference (ISPEC 2009),<br />

LNCS 5451, Springer, Xi'an, China<br />

.<br />

46. "Attacks and improvements to an RFID mutual authentication protocol", by Shaoying CAI, Yingjiu<br />

LI, Tieyan LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 03/2009, 51-58, the Second ACM Conference on<br />

Wireless Network Security (WiSec' 09), Zurich, Switzerland<br />

.<br />

47. "Conditional Proxy Re-encryption Secure against Chosen-ciphertext Attacks", by Jian WENG,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Xuhua DING, Chengkang CHU, and Junzuo LAI, 03/2009, 54-65, ACM<br />

Symposium on Information, Computer & Communication Security (ASIACCS)<br />

.<br />

48. "A comprehensive study for RFID malwares on mobile devices", by Qiang YAN, Yingjiu LI, Tieyan<br />

LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 01/2009, the 5th Workshop on RFID Security (RFIDsec 2009 Asia),<br />

Taipei, Taiwan<br />

.<br />

49. "Private Query on Encrypted Data in Multi-User Setting", by Feng BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

Xuhua DING, and Yanjiang YANG, 2008, 71-85, Proceedings of Information Security Practice and<br />

Experience Conference (ISPEC), LNCS 4991, Springer, Sydney, Australia<br />

.<br />

50. "Efficient Client-to-Client Password Authenticated Key Exchange", by Yanjiang YANG, Feng BAO,<br />

and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 12/2008, 202-207, Proceedings of IEEE/IFIP International Symposium<br />

on Trust, Security and Privacy for Pervasive Applications, Shanghai, China<br />

.<br />

51. "Chosen-Ciphertext Secure Proxy Re-encryption Without Pairing", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Jian<br />

WENG, Shengli LIU, and Kefei CHEN, 12/2008, pp. 1-17, Proceedings of the 7th International<br />

Page 11 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

Conference on Cryptology and Network Security, LNCS 5339, Springer, Hong Kong, China<br />

.<br />

52.<br />

.<br />

"Model-Driven Remote Attestation: Attesting Remote System From Behavioral Aspect", by Liang<br />

GU, Xuhua DING, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Yanzhen ZOU, Bing XIE, Weizhong SHAO, and HONG<br />

MEI, 11/2008, Proceedings of the 2008 International Symposium on Trusted Computing, Hunan,<br />

China<br />

53.<br />

.<br />

"Remote Attestation on Program Execution", by Liang GU, Xuhua DING, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

Bing XIE, and Hong MEI, 10/2008, pp. 11-19, Proceedings of the 3rd ACM Workshop on<br />

Scalable Trusted Computing, Fairfax, VA., USA<br />

54.<br />

.<br />

"Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor<br />

Networks", by Yanjiang YANG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Feng BAO, and Jianying ZHOU, 10/2008,<br />

pp. 43-52, Proceedings of the 3rd Asia-Pacific Trusted Infrastructure Technologies Conference,<br />

IEEE Computer Society, Wuhan, China<br />

55.<br />

.<br />

"An Efficient PIR Construction Using Trusted Hardware", by Yanjiang YANG, Xuhua DING, <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, and Feng BAO, 09/2008, pp. 64-79, Proceedings of the 11st Information Security<br />

Conference (ISC), LNCS 5222, Springer, Taipei, Taiwan<br />

56.<br />

.<br />

"Distinguishing Between FE and DDoS Using Randomness Check", by Hyundo PARK, Peng LI,<br />

Debin GAO, Heejo LEE, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/2008, pp. 131-145, Proceedings of the 11st<br />

Information Security Conference, LNCS 5222, Springer, Taipei, Taiwan<br />

57.<br />

.<br />

"Scalable RFID Authentication and Discovery in EPCglobal Network", by Tieyan LI and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 08/2008, Proceedings of the 2008 International Conference on Communications<br />

and Networking in China, Hangzhuo, China<br />

58. "A Real-Time Tele-Ophalmology System Based on Secure Video-Conferencing and<br />

White-Board", by Shengsheng YU, Zhuo WEI, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Haixia YAO, Zhigang ZHAO,<br />

Lek Heng NGOH, and Yongdong WU, 07/2008, pp. 51-52, Proceedings of the IEEE 10th<br />

International Conference on e-Health Networking, Applications and Services, <strong>Singapore</strong><br />

.<br />

59.<br />

.<br />

"Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based<br />

Frameworks", by Huafei ZHU, Feng BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 05/2008, Proceedings of the<br />

2008 IEEE International Conference on Communications, Beijing, China<br />

60.<br />

.<br />

"nPAKE+: a hierarchical group password-authenticated key exchange protocol using different<br />

passwords", by Zhiguo WAN, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Feng BAO, and Bart PRENEEL, 12/2007, pp.<br />

31-43, International Conference on Information and Communication Security, LNCS 4861,<br />

Springer, Zhengzhou, China<br />

61.<br />

.<br />

"nPAKE+: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different<br />

Passwords", by Zhiguo WAN, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Feng BAO, and Bart PRENEEL, 12/2007, pp.<br />

31-43, Proceedings of the 9th International Conference on Information and Communications<br />

Security, LNCS 4861, Springer, Zhengzhou, China<br />

62.<br />

.<br />

"Light-weight encryption schemes for multimedia data", by Feng BAO and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

11/2007, Proceedings of IEEE Globecom 2007, Washington D. C., USA<br />

63. "Enhanced security by OS-oriented encapsulation in TMP-enabled DRM", by Yongdong WU,<br />

Feng BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Marc MOUFFRON, and Frederic ROUSSEAU, 09/2007,<br />

Proceedings of<br />

Xining, China<br />

International SKLOIS Conference on Information Security and Cryptology,<br />

.<br />

64.<br />

.<br />

"Forgery attack to an asymptotically optimal traitor tracing scheme", by Yongdong WU, Feng<br />

BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 07/2007, Proceedings of the 12th Australasian Conference on<br />

Information Security and Privacy, Queensland, Australia<br />

Page 12 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

65. "Achieving end-to-end authentication in intermediary-enabled multimedia delivery", by <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, Yanjiang YANG, and Feng BAO, 05/2007, Proceedings of the 3rd Information<br />

Security Practice and Experience Conference, Hong Kong, China<br />

.<br />

66. "Privacy-preserving credentials upon trusted computing augmented servers", by Yanjiang YANG,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Feng BAO, 05/2007, Proceedings of the 3rd Information Security<br />

Practice and Experience Conference, Hong Kong, China<br />

.<br />

67. "Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol", by Tieyan LI<br />

and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 04/2007, Proceedings of the 2nd the International Conference on<br />

Availability, Reliability and Security , Vienna, Austria<br />

.<br />

68. "New paradigm of inference control with trusted computing", by Yanjiang YANG, Yingjiu LI, and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 01/2007, Annual IFIP WG 11.3 Working Conference on Data and<br />

Application Security, Redondo Beach, USA<br />

.<br />

69. "Towards Practical Private Information Retrieval", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 12/2006, 253-258,<br />

Proceedings of the International Conference on Information Security and Computer Forensics,<br />

Chennai, India<br />

.<br />

70. "Practical Private Data Matching Deterrent to Spoofing Attacks", by Yanjiang YANG, <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, and Feng BAO, 11/2006, Proceedings of ACM 15th Conference on Information and<br />

Knowledge Management, Arlington, VA, USA<br />

.<br />

71. "Privacy Enhanced Superdistribution of Layered Content with Trusted Access Control", by Daniel<br />

CHONG and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/2006, DRM 2006, The Sixth ACM Workshop on Digital<br />

Rights, Alexandria VA, USA<br />

.<br />

72. "Rights Protection for Data Cubes", by Jie GUO, Yingjiu LI, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Kefei<br />

CHEN, 09/2006, 359-372, 9th Information Security Conference (ISC'06), Samos Island, Greece<br />

.<br />

73. "Private Information Retrieval Using Trusted Hardware", by Shuhong WANG, Xuhua DING,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Feng BAO, 09/2006, 49-64, European Symposium on Research in<br />

Computer Security, LNCS 4189, Springer, Hamburg, Germany<br />

.<br />

74. "An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc<br />

Networks", by B. ZHU, M. KANKANHALLI, F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and S. JAJODIA,<br />

09/2006, Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc<br />

Communications and Networks, Reston, VA, USA<br />

.<br />

75. "Practical Inference Control for Data Cubes (extended abstract)", by Yingjiu LI, Lu H., and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 05/2006, 115-120, IEEE Symposium on Security and Privacy, Oakland, USA<br />

.<br />

76. "Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks", by Z. WAN, B.<br />

ZHU, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, F. BAO, and A. L. ANANDA, 04/2006, IEEE Wireless Communications<br />

and Networking Conference, Las Vegas, USA<br />

.<br />

77. "Publicly Verifiable Ownership Protection for Relational Databases", by Yingjiu LI and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 03/2006, 78-89, ACM Symposium on Information, Computer and Communication<br />

Security, Taipei, Taiwan<br />

.<br />

78. "Fortifying Password Authentication in Integrated Healthcare Delivery Systems", by Yanjiang<br />

YANG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Feng BAO, 03/2006, ACM Symposium on Information,<br />

Computer and Communications Security, Taipei, Taiwan<br />

.<br />

79. "Protecting Location Information of Mobile Nodes In Mobile IPv6", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Ying<br />

QIU, Jianying ZHOU, and Feng BAO, 01/2006, Symposium on Networking Security and<br />

Information Assurance - ChinaCOM<br />

.<br />

Page 13 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

80. "A block oriented fingerprinting scheme in relational database", by S. LIU, S. WANG, <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, and W. SHAO, 12/2005, The 7th Annual International Conference on Information<br />

Security and Cryptology (ICISC 2004), Seoul, Korea<br />

.<br />

81. "Authenticating Query Results from Untrusted Servers", by D. MA, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Hwee<br />

Hwa PANG, and J. ZHOU, 12/2005, Seventh International Conference on Information and<br />

Communications Security, LNCS,, Springer, Beijing, China<br />

.<br />

82. "Cryptanalysis of A Forward Secure Blind Signature Scheme with Provable Security", by S.<br />

WANG, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 12/2005, Seventh International Conference on<br />

Information and Communications Security, LNCS, Springer, Beijing, China<br />

.<br />

83. "A Robust Double Auction Protocol based on a Hybrid Trust Model", by J.-H HA, S.-J MOON, J.<br />

ZHOU, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 12/2005, 2005 International Conference on Information<br />

Systems Security, LNCS, Springer, Kolkata, India<br />

.<br />

84. "Sequential Aggregate Signatures Working Over Independent Homomorphic Trapdoor One-Way<br />

Permutation Domains", by Huafei ZHU, Feng BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 12/2005,<br />

Proceedings of the Seventh International Conference on Information and Communications<br />

Security, LNCS 3783, Beijing, China<br />

.<br />

85. "Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks",<br />

by Z. WAN, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, F. BAO, and A. L. ANANDA, 11/2005, IEEE Conference on<br />

Local Computer Networks (LCN2005), Sydney, Australia<br />

.<br />

86. "Security Analysis and Improvement of Return Routability Protocol", by Y. QIU, J. ZHOU, and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/2005, 2005 Secure Mobile Ad-Hoc Networks and Sensors Workshop,<br />

LCNS, Springer, <strong>Singapore</strong><br />

.<br />

87. "Protocol for hiding movement of mobile nodes in mobile IPv6", by Y. QIU, J. ZHOU, F. BAO, and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/2005, IEEE Vehicular Technology Conference, IEEE Vehicular<br />

Technology Society Press, Dallas, USA<br />

.<br />

88. "An efficient certified e-mail scheme suitable for wireless mobile environments", by G. WANG, F.<br />

BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/2005, 16th Annual IEEE International Symposium on Personal<br />

Indoor and Mobile Radio Communcations, Berlin, Germany<br />

.<br />

89. "How Much You Watch, How Much You Pay", by Yongdong WU, Hwee Hwa PANG, and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 07/2005, 961-968, Visual Communications and Image Processing Conference,<br />

Beijing, China<br />

.<br />

90. "Secure human communications based on biometrics signals", by Y. WU, F. BAO, and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 05/2005, The 20th IFIP International Information Security Conference (SEC 2005),<br />

Makuhari-Messe, Chiba, Japan<br />

.<br />

91. "Protecting group dynamic information in large scale multicast groups", by Y. WU, R. LI, and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 05/2005, The 20th IFIP International Information Security Conference (SEC<br />

2005), Makuhari-Messe, Chiba, Japan<br />

.<br />

92. "A new architecture for user authentication and key exchange using password for federated<br />

enterprises", by Y. YANG, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 05/2005, Proceedings of the 20th<br />

IFIP International Information Security Conference (SEC2005), Makuhari-Messe, Chiba, Japan<br />

.<br />

93. "Providing robust certification services against active attacks in ad hoc networks", by B. ZHU, G.<br />

WANG, Z. WAN, M. KANKANHALLI, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 04/2005, Proceedings of<br />

the 24th IEEE International Performance Computing and Communications Conference<br />

(IPCCC2005), Phoenix, Arizona<br />

.<br />

94. "Privacy and ownership preserving of outsourced medical data", by Y. YANG, E. BERTINO, B. C.<br />

OOI, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 04/2005, Proceedings of the IEEE 21st International Conference<br />

Page 14 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

on Data Engineering, Tokyo, Japan<br />

.<br />

95. "DoS-resistant access control protocol with identity confidentiality for wireless networks", by Z.<br />

WAN, B. ZHU, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 03/2005, The Sixth IEEE Wireless and Communications<br />

and Networking Conference (WCNC2005), New Orleans, LA. USA<br />

.<br />

96. "On security notions of steganographic systems", by K. CHANG, S. LEE, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, B.<br />

FENG, and H. KIM, 12/2004, The 3rd International Workshop on Digital Watermarking (IWDW<br />

2004), Seoul, Korea, pages 137-151<br />

.<br />

97. "Anonymous secure routing in mobile ad-hoc networks", by B. ZHU, Z. WAN, M. KANKANHALLI,<br />

F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 11/2004, The 29th Annual IEEE Conference on Local<br />

Computer Networks (LCN 2004), Tampa, Florida, USA<br />

.<br />

98. "Compliant encryption of JPEG2000 codestreams", by Y. WU and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/2004,<br />

Proceedings of the 2004 International Conference on Image Processing, Pages 3447-3450,<br />

<strong>Singapore</strong><br />

.<br />

99. "Dynamic access control for multi-privileged group communications", by D. MA, <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, Y. WU, and T. LI, 10/2004, Proceedings of the 6th International Conference on<br />

Information and Communications Security, LNCS 3269, Pages 508-519, Malaga, Spain<br />

.<br />

100. "Flexible verification of MPEG-4 stream in peer-to-peer CDN", by T. LI, Y. WU, D. MA, and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 10/2004, Proceedings of the 6th International Conference on Information and<br />

Communications Security, LNCS 3269, Pages 79-91, Malaga, Spain<br />

.<br />

101. "Trust Establishment in Large Scale Grid Settings", by B. ZHU, T. LI, H. ZHU, M. KANKANHALLI,<br />

F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/2004, Proceedings of International Conference on Grid and<br />

Cooperative Computing (GCC2004), LNCS 3251, Pages 317-324, Wuhan, China<br />

.<br />

102. "On security notions for steganalysis", by K. CHANG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, B. FENG, S. LEE, H.<br />

KIM, and J. LIM, 10/2004, The 7th Annual International Conference on Information Security and<br />

Cryptology (ICISC 2004), Seoul, Korea<br />

.<br />

103. "Progressive protection of JPEG2000 code-streams", by Y. WU, D. MA, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

10/2004, Proceedings of the IEEE International Conference on Image Processing, <strong>Singapore</strong>,<br />

pages 3439 - 3442<br />

.<br />

104. "Classify encrypted data in wireless sensor networks", by Y. WU, D. MA, T. LI, and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 09/2004, Proceedings of the 60th IEEE Vehicular Technology Conference, LA, USA<br />

.<br />

105. "Securing Return Routability Protocol Against Active Attacks", by H. ZHU, F. BAO, and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 09/2004, Proceedings of the 60th IEEE Vehicular Technology Conference, LA, USA<br />

.<br />

106. "Computing of Trust in Wireless Networks", by H. ZHU, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

09/2004, Proceedings of the 60th IEEE Vehicular Technology Conference, LA, USA<br />

.<br />

107. "Security Analysis of Two Signcryption Schemes", by G. WANG, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, D. KWAK,<br />

and S. MOON, 09/2004, Proceedings of the 2004 Information Security Conference, LNCS 3225,<br />

Palo Alto, USA<br />

.<br />

108. "Proxy signature scheme with multiple original signers for wireless E-commerce applications", by<br />

G. WANG, F. BAO, J. ZHOU, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/2004, Proceedings of 60th IEEE<br />

Vehicular Technology Conference, Los Angles, California<br />

.<br />

109. "On the security of the Lee-Hwang group-oriented undeniable signature schemes", by G. WANG,<br />

J. ZHOU, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/2004, The First International Conference on Trust and<br />

Privacy in Digital Business (TrustBus '04), Zaragoza, Spain, Pages 289 - 298<br />

.<br />

Page 15 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

110. "Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for<br />

true anonymity", by B. -M. GOI, R. C. PHAN, Y. YANG, F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and M. U.<br />

SIDDIQI, 06/2004, Applied Cryptography and Network Security (ACNS'04), LNCS 3089, Pages<br />

369-3825, China<br />

.<br />

111. "Security Analysis of Some Proxy Signature ", by G. WANG, F. BAO, J. ZHOU, and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 03/2004, Proceedings of Information Security and Cryptology, Springer, Pages 319 - 332<br />

.<br />

112. "A secure and privacy enhanced location-based service transaction protocol in ubiquitous<br />

computing environment", by K. DIVYAN, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, J. ZHU, and K. KIM, 01/2004,<br />

Proceedings of the 2004 Symposium on Cryptography and Information Security, Pages 931--936,<br />

Sendai, Japan<br />

.<br />

113. "An improved personal CA for personal area networks", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong> and F. BAO,<br />

12/2003, IEEE Globecom 2003, San Francisco, USA<br />

.<br />

114. "A flexible and scalable authentication scheme for JPEG 2000 image codestreams", by C. PENG,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Y. WU, and W. SHAO, 11/2003, Proceedings of the 11th ACM International<br />

Conference on Multimedia, Pages 443 - 441, Berkeley, USA<br />

.<br />

115. "Making the key agreement protocol in mobile ad hoc network more efficient", by G. YAO, K.<br />

REN, F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and D. FENG, 10/2003, The 1st International Conference on<br />

Applied Cryptography and Network Security, Lecture Notes in Computer Science 2846, Pages<br />

343 - 356, Kuming, China<br />

.<br />

116. "An efficient known plaintext attack on FEA-M", by H. WU, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

10/2003, 5th International Conference on Information and Communications Security, Lecture<br />

Notes in Computer Science 2836, Springer, Pages 84 - 87, China<br />

.<br />

117. "Validating digital signatures without TTP's time-stamping and certificate revocation", by J. ZHOU,<br />

F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/2003, 6th Information Security Conference, Lecture Notes in<br />

Computer Science 2851, Pages 96 - 110, Bristol, UK<br />

.<br />

118. "Adaptive collusion attack to a block oriented watermarking scheme", by Y. WU and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 10/2003, 5th International Conference on Information and Communications Security,<br />

Lecture Notes in Computer Science 2836, Springer, Pages 238 - 248, China<br />

.<br />

119. "An efficient public key framework", by J. ZHOU, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/2003, 5th<br />

International Conference on Information and Communications Security, Lecture Notes in<br />

Computer Science 2836, Springer, Pages 88 - 99, China<br />

.<br />

120. "Security remarks on a group signature scheme with member deletion", by G. WANG, F. BAO, J.<br />

ZHOU, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 10/2003, 5th International Conference on Information and<br />

Communications Security, Lecture Notes in Computer Science 2836, Springer, Pages 72 - 83,<br />

China<br />

.<br />

121. "Variations of Diffie-Hellman problem", by F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and H. ZHU, 10/2003, 5th<br />

International Conference on Information and Communications Security, Lecture Notes in<br />

Computer Science 2836, Springer, Pages 301 - 312, China<br />

.<br />

122. "Flexible authentication of images", by Y. YANG, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 07/2003,<br />

Visual Communications and Image Processing 2003, Pages 1905 - 1911, Lugano, Switzerland<br />

.<br />

123. "Security analysis of three oblivious transfer protocols", by G. YAO, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 06/2003, Workshop on Coding Cryptography and Combinatorics, Huangshan City, China<br />

.<br />

124. "Secure the image-based simulated telesurgery system", by Y. YANG, Z. WANG, F. BAO, and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 05/2003, IEEE International Symposium on Circuits and Systems, Vol. II,<br />

Pages 596 - 599, Thailand<br />

.<br />

Page 16 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

125. "Defending against redirect attacks in mobile IP", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, J. ZHOU, and F. BAO,<br />

11/2002, 9th ACM Conference on Computer and Communications Security, Pages 59 - 67,<br />

Washington DC.<br />

.<br />

126. "Cryptanalysis of some hash functions based on black ciphers and codes", by H. WU, F. BAO,<br />

and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 09/2002, 2002 International Workshop on Cryptology and Network<br />

Security, Pages 221 - 224, San Francisco<br />

.<br />

127. "Security analysis and improvement of the global key recovery system", by Y. YANG, F. BAO, and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 07/2002, 2002 Australasian Conference on Information Security and<br />

Privacy, Lecture Notes in Computer Science 2384, Springer, Pages 17 - 24, Melbourne, Australia<br />

.<br />

128. "Privacy protection for transactions of digital goods", by F. BAO and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 11/2001<br />

, Third International Conference on Information and Communications Security, Lecture Notes in<br />

Computer Science 2229, Springer, Pages 202 - 213, Xian, China<br />

.<br />

129. "Design of portable mobile devices based e-payment system and e-ticketing system with digital<br />

signature", by F. BAO, L. ANANTHARAMAN, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 11/2001, International<br />

conferences on Info-tech and Info-net, Pages 7 - 13, Beijing, China<br />

.<br />

130. "Secure and private distribution of online video and some related cryptographic issues", by F.<br />

BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, P. BAO, Y. GUO, and H. WU, 07/2001, 6th Australasian Conference<br />

on Information Security and Privacy, Lecture Notes in Computer Science 2119, Springer-Verlag,<br />

Pages 190 - 205, Sydney, Australia<br />

.<br />

131. "An optical watermarking solution for authenticating printed document", by Q. SUN, P. FENG, and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 04/2001, 2001 International Conference on Information Technology: Coding<br />

and Computing, Pages 65 - 70, Las Vegas, USA<br />

.<br />

132. "Cryptanalysis of a digital signature scheme on ID-based key-sharing infrastructure", by H. WU, F.<br />

BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 02/2001, 2001 International Workshop on Practice and Theory in<br />

Public Key Cryptography, Pages 173 - 179, Cheju Island, Korea<br />

.<br />

133. "Cryptanalysis of two sparse polynomial based public key cryptosystems", by F. BAO, <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, W. GEISELMANN, C. SCHNORR, R. STEINWANDT, and H. WU, 02/2001, 2001<br />

International Workshop on Practice and Theory in Public Key Cryptography, Lecture Notes in<br />

Computer Science 1992, Pages 153 - 164, Cheju Island, Korea<br />

.<br />

134. "Proactive secret sharing schemes with different security levels", by F. BAO and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 2000, ChinaCrypt 2000, Pages 92 - 101, China<br />

.<br />

135. "An efficient and practical scheme for privacy protection in e-commerce of digital goods", by F.<br />

BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and P. FENG, 12/2000, 3rd International Conference on Information<br />

Security and Cryptography, Lecture Notes in Computer Science 2015, Springer-Verlag, Pages<br />

162 - 170, Seoul, Korea<br />

.<br />

136. "Electronic payment systems with fair on-line verification", by F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and J.<br />

ZHOU, 08/2000, 451 - 460, 15th IFIP International Information Security Conference, Kluwer,<br />

Beijing, China<br />

.<br />

137. "Cryptanalysis of polynomial authentication and signature scheme", by H. WU, F. BAO, D. YE,<br />

and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 07/2000, 5th Australasian Conference on Information Security and<br />

Privacy, Lecutre notes in Computer Science 1841, Springer-Verlag, Pages 278 - 288, Australia<br />

.<br />

138. "Cryptanalysis of the m-permutation protection schemes", by H. WU, F. BAO, D. YE, and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 07/2000, 5th Australasian Conference on Information Security and Privacy, Lecture<br />

Notes in Computer Science 1841, Springer-Verlag, Pages 97 - 111, Australia<br />

.<br />

139. "Some remarks on fair exchange protocol", by J. ZHOU, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and F. BAO,<br />

01/2000, 2000 International Workshop on Practice and Theory in Public Key Cryptography,<br />

Page 17 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

Lecture Notes in Computer Science 1751, Pages 46 - 57, Melbourne, Australia<br />

.<br />

140. "Multi-party fair exchange with an offline trusted neutral party", by F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

K. Q. NGUYEN, and V. VARADHARAJAN, 09/1999, DEXA'99 Workshop on Electronic<br />

Commerce and Security, Pages 858 - 863, Florence, Italy<br />

.<br />

141. "Evaluation of fair non-repudiation with TTP", by J. ZHOU, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and F. BAO,<br />

07/1999, 4th Australasian Conference on Information Security and Privacy, Lecture Notes in<br />

Computer Science 1587, Springer-Verlag, Pages 258 - 269, Australia<br />

.<br />

142. "An efficient fair exchange protocol with an off-line semi-trusted third party", by F. BAO and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 07/1999, International Workshop on Cryptographic Techniques &<br />

E-Commerce, M. Blum and C. H. Lee (Eds), Pages 37 - 47, Hong Kong<br />

.<br />

143. "A new type of "magic ink" signatures - towards transcript-irrelevant anonymity revocation", by F.<br />

BAO and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 03/1999, International Workshop on Practice and Theory in Public<br />

Key Cryptography, Lecture Notes in Computer Science 1560, Pages 111, Kamakura, Japan<br />

.<br />

144. "Recovering modified watermarked image with reference to original image", by Q. SUN, J. WU,<br />

and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 01/1999, IS&T/SPIE Conference on Security and Watermarking of<br />

Multimedia Contents, Pages 415 - 424, San Jose, CA<br />

.<br />

145. "Copyright protection through watermarking towards tracing illegal users", by F. BAO, Q. SUN, J.<br />

HU, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Wu J., 11/1998, 6th IEEE International Workshop on Intelligent<br />

Signal Processing and Communication Systems, Pages 163 - 167, Melbourne, Australia<br />

.<br />

146. "Cryptanalysis on Rijmen-Preneel trapdoor ciphers", by H. WU, F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and<br />

Z. YE, 10/1998, Advances in Cryptology - Asiacrypt'98, Lecture Notes in Computer Science 1514<br />

, Springer-Verlag, Pages 126 - 132, Beijing, China<br />

.<br />

147. "Improved truncated differential attack on SAFER", by H. WU, F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and<br />

Z. YE, 10/1998, Advances in Cryptology - AsiaCrypt'98, Lecture Notes in Computer Science<br />

1514, Springer-Verlag, Pages 133 - 147, Beijing, China<br />

.<br />

148. "Related cipher attack on some block ciphers with flexible round number", by H. WU, F. BAO,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Q. YE, 10/1998, Rump Session of AsiaCrypt'98, Beijing, China<br />

.<br />

149. "A Ubiquitous Secure and Reliable Digital Data Depository System", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, J.<br />

HU, F. BAO, and Arcot Desai NARASIMHALU, 06/1998, The IEEE 7th International Workshop on<br />

Enabling Technologies: Infrastructure for Collaborative Enterprises,, Pages 354-358, Stanford<br />

University, CA, USA<br />

.<br />

150. "Efficient and practical fair exchange protocols", by F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and W. MAO,<br />

05/1998, 1998 IEEE Symposium on Security and Privacy, Pages 77 - 85, Oakland, CA<br />

.<br />

151. "A signcrytion scheme with signature verification not using recipient's private key", by F. BAO and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 01/1998, International workshop on Practice and Theory in Public Key<br />

Cryptography, Lecture Notes in Computer Science 1431, Springer-Verlag, Pages 55 - 59,<br />

Yokohama, Japan<br />

.<br />

152. "Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient<br />

Faults", by F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Y. HAN, A. JENG, Arcot Desai NARASIMHALU, and T.<br />

NGAIR, 1997, Security Protocols, Lecture Notes in Computer Science 1361, B. Christianson, B.<br />

Crispo, M. Lomas and M. Roe (Eds), Pages 115 - 124<br />

.<br />

153. "RSA-type signatures in the presence of transient faults", by M. JOYE, J-J QUISQUATER, F.<br />

BAO, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 1997, Cryptography and Coding, M. Darnell (ed),<br />

Springer-Verlag, Pages 155 - 160<br />

.<br />

Page 18 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

154. "Modified finite automata public key cryptosystem", by F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, X. GAO, and<br />

Y. IGARASHI, 1997, Information Security, Lecture Notes in Computer Science 1396, E. Okamoto,<br />

G. Davida and M. Mambo (Eds), Springer-Verlag, Pages 82 - 95<br />

.<br />

155. "Design and analysis of two basic protocols for use in TTP-based key escrow schemes", by F.<br />

BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Y. HAN, and A. JENG, 07/1997, 1997 the Australasian Conference on<br />

Information Security and Privacy, Lecture Notes in Computer Science 1270, Springer-Verlag,<br />

Pages 261 - 270, Sdyney, Australia<br />

.<br />

156. "A new on-line cash check scheme", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Y. HAN, A. B. JENG, and T. -H.<br />

NGAIR, 04/1997, 4th ACM Conference on Computer and Communications Security, Pages 111 -<br />

116, Zurich, Switzerland<br />

.<br />

157. "Authenticated key distribution and secure broadcast using no conventional encryption: a unified<br />

approach based on block codes", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, L. GONG, A. A. LAZAR, and W.<br />

WANG, 11/1995, IEEE Globecom'95, Pages 1193 - 1197, <strong>Singapore</strong><br />

.<br />

158. "Securing data transfer in asynchronous transfer mode networks", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, L.<br />

GONG, and A. A. LAZAR, 11/1995, IEEE Globecom'95, Pages 1198 - 1202, <strong>Singapore</strong><br />

.<br />

159. "Novel approach to secure broadcast in distributed systems", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong> and T. T.<br />

TJHUNG, 10/1995, 29th Annual IEEE International Carnahan Conference on Security<br />

Technology, Sanderstead, Surrey, England<br />

.<br />

160. "A new capture model for mobile radio slotted ALOHA systems", by H. ZHOU and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 07/1995, 1995 IEEE 45th Vehicular Technology Conference, Pages 549 - 553, Chicago<br />

.<br />

161. "A simulation environment for studying workstation multimedia capacities", by W. WANG, Li Y.,<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and X. H. CHEN, 07/1995, IEEE SICON/ICIE'95, Pages 627 - 631,<br />

<strong>Singapore</strong><br />

.<br />

162. "Integrating security in CORBA based object architectures", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, S. K.<br />

BHONSLE, W. WANG, and A. A. LAZAR, 05/1995, IEEE Symposium on Security and Privacy,<br />

Pages 50 - 61, Oakland, CA<br />

.<br />

163. "TCM ARQ scheme over a nonstationary channel ", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, H. ZHOU, and M. L.<br />

LIN, 09/1993, IEEE <strong>Singapore</strong> International Conference on Networks/International Conference on<br />

Information Engineering 93, Pages 654 - 658, <strong>Singapore</strong><br />

.<br />

164. "Code combining diversity reception for QPSK cellular mobile radio", by H. ZHOU, <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, and T. T. TJHUNG, 09/1993, 4th International Symposium on Personal, Indoor and<br />

Mobile Radio Communications, Yokohama, Japan<br />

.<br />

165. "A probabilistic approach to fault diagnosis in linear lightwave networks", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

A. A. LAZAR, and W. WANG, 04/1993, 3rd IFIP/IEEE International Symposium on Integrated<br />

Network Management, San Francisco, CA<br />

.<br />

166. "Exact and approximate mean throughput models of the FDDI MAC-symmetric systems", by K. S.<br />

LIM and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 11/1992, <strong>Singapore</strong> International Conference on<br />

Communications/International Symposium on Information Theory and Its Applications, Pages 700<br />

- 704, <strong>Singapore</strong><br />

.<br />

167. "Exact and approximate mean throughput models of the FDDI MAC-asymmetric systems", by K.<br />

S. LIM and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 11/1992, <strong>Singapore</strong> International Conference on<br />

Communications/International Symposium on Information Theory and Its Applications, Pages 695<br />

- 699, <strong>Singapore</strong><br />

.<br />

168. "Models and algorithms for network fault detection and identification: a review", by A. A. LAZAR,<br />

W. WANG, and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 11/1992, <strong>Singapore</strong> International Conference on<br />

Communications/International Symposium on Information Theory and Its Applications, Pages 999<br />

Page 19 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

- 1003, <strong>Singapore</strong><br />

.<br />

169. "An adaptive coding scheme for mobile radio systems", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong> and H. ZHOU,<br />

05/1992, 42nd IEEE Vehicular Technology Society Conference, Pages 906 - 909, Dever, CO<br />

.<br />

170. "A hybrid ARQ scheme with diversity combining for land mobile radio", by H. ZHOU and <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, 05/1992, 42nd IEEE Vehicular Technology Society Conference, Pages 902 - 905,<br />

Dever, CO<br />

.<br />

171. "Simulated performance of FDDI priority mechanism", by K. RANAI, K. S. LIM, and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, 12/1991, SEARCC'91, Pages 22.1 - 22.11, Bali, Indonesia<br />

.<br />

172. "Throughput-delay performance of interconnected token-ring networks", by B. C. TAN, <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, and C. C. KO, 11/1991, SICON'91, <strong>Singapore</strong><br />

.<br />

173. "Analysis of token-ring networks with both finite and infinite buffer capacity stations", by <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, W. C. L. CHIEW, and K. T. HUANG, 04/1991, 202 - 210, 1991 IEEE Infocom,<br />

Miami, Florida<br />

.<br />

174. "Token-passing systems with batch arrivals and their application to multimedia file transfer over<br />

token-ring LANs", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, X. Y. ZHANG, and K. T. HUANG, 04/1991, IEEE 1991<br />

Infocom, Pages 1041 - 1049, Miami, Florida<br />

.<br />

175. "Protocol conversions in gateway design for LAN-ISDN interconnections", by X. Y. ZHANG and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 07/1989, IEEE <strong>Singapore</strong> International Conference on Networks'89, Pages<br />

389 - 393, <strong>Singapore</strong><br />

.<br />

176. "Performance analysis of LAN-ISDN gateway", by W. C. L. CHIEW and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

07/1989, IEEE <strong>Singapore</strong> International Conference on Networks'89, Pages 540 - 545, <strong>Singapore</strong><br />

.<br />

177. "Channel coding with multi-dimensional trellis coded phase modulation", by S. PIETROBON, D. J.<br />

COSTELLO, JR., G. UNGERBOECK, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and A. LAFANECHERE, 06/1988,<br />

1988 International Symposium on Information Theory, Kobe, Japan<br />

.<br />

178. "Bandwidth efficient coding schemes for satellite communications", by D. J. COSTELLO, JR. and<br />

<strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 06/1988, International Forum on Information Theory and Its Applications,<br />

Tokyo, Japan<br />

.<br />

179. "Multi-dimensional unit-memory and partial-unti-memory trellis coded modulation", by D. J.<br />

COSTELLO, JR. and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 03/1987, 1987 Conference on Information Sciences<br />

and Systems, Baltimore, MD<br />

.<br />

180. "Error-correcting DC-free binary transmission codes for fiber optic digital communications", by M.<br />

A. HERRO and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 03/1987, 559 - 564, 1987 Conference on Information<br />

Sciences and Systems, Baltimore, MD<br />

.<br />

181. "Performance of convolutional codes on noisy channels", by M. A. HERRO, L. Z. HU., D. J.<br />

COSTELLO, JR., and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 08/1986, 1986 IEEE International Symposium on<br />

Information Theory, Ann Arbor, MI<br />

.<br />

182. "Concatenated coding systems employing bandwidth efficient inner codes", by D. J. COSTELLO,<br />

JR. and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 08/1986, 1986 IEEE International Symposium on Information<br />

Theory, Ann Arbor, MI<br />

.<br />

183. "Performance of a concatenated coding system", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong> and D. J. COSTELLO,<br />

JR., 10/1984, Twenty-Second Annual Allerton Conference on Communication, Control and<br />

Computing, Pages 535 - 544, Allerton, IL<br />

.<br />

184. "Fast decoding techniques for extended single-and-double-error correcting Reed-Solomon<br />

codes", by D. J. COSTELLO, JR., <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and S. LIN, 03/1984, 1984 Conference on<br />

Page 20 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

Information Sciences and Systems, Princeton, NJ<br />

.<br />

.<br />

Books and Monographs (Edited or Co-edited)<br />

.<br />

1. "Information Security Practice and Experience", by Jin KWAK, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Yoojae<br />

WON, and Guilin WANG, Springer, 05/2010, 399<br />

.<br />

2. "Proceedings of the ACM Symposium on Information, Computer and Communications Security<br />

(ASIACCS)", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong> and Pierangela SAMARATI, ACM Press, 03/2007, 401<br />

.<br />

3. "Information Security Practice and Experience", by Kefei CHEN, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Xuejia LAI,<br />

and Jianying ZHOU, Springer, 04/2006, 392<br />

.<br />

4. "Information Security", by J. ZHOU, J. LOPEZ, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and F. BAO, Springer,<br />

09/2005, 516<br />

.<br />

5. "Information Security Practice and Experience", by <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Feng BAO, Hwee Hwa<br />

PANG, and Jianying ZHOU, Lecture Notes in Computer Science 3439, Springer, 04/2005, 417<br />

.<br />

6. "Public Key Cryptography", by F. BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and J. ZHOU (EDS.), Lecture Notes<br />

in Computer Science 2947, Springer, 2004, 454<br />

.<br />

7. "Information and Communications Security", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, S. QING, F. BAO, and J.<br />

ZHOU (EDS), Lecture Notes in Computer Science 2513, Springer, 2002, 496<br />

.<br />

.<br />

Chapters in Books<br />

.<br />

1. "Dynamic Secure Cloud Storage with Provenance", by Sherman CHOW, Cheng-Kang CHU, Xinyi<br />

HUANG, Jianying ZHOU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, in Cryptography and Security: From Theory<br />

to Applications, Springer, 2012, 442-464.<br />

.<br />

2. "Remote platform attestation – the testimony for trust manageement", by Xuhua DING, Liang GU,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Bing XIE, and Hong MEI, in Trust Modelling and Management in Digital<br />

Environments: From Social Concept to System Development, edited by Zheng Yan, IGI Global,<br />

01/2010.<br />

.<br />

3. "Enforcing security in mobile networks: challenges and solutions", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, F.<br />

BAO, Y. QIU, and J. ZHOU, in Mobile, WIreless and Sensor Networks: Technology, Applications<br />

and Future Directions, edited by R. SHOREY, A. Ananda, M. CHAN and W. OOI, IEEE Press and<br />

Wiley Interscience, USA, 04/2006.<br />

.<br />

4. "Securing JPEG2000 code-streams", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Y. WU, and D. MA, in Security in<br />

the 21st Century, edited by D. T. LEE, S. SHIEH and D. TYGAR, Springer, 2005.<br />

.<br />

5. "Security analysis of three oblivious transfer protocols", by G. YAO, F. BAO, and <strong>Robert</strong> <strong>Huijie</strong><br />

<strong>DENG</strong>, in Coding, Cryptography and Combinatorics, edited by K. FENG, H. NIEDERREITER and<br />

C. XING, Birkhauser Verlag, 2004, 387 - 396.<br />

.<br />

6. "Securing JPEG2000 code-streams", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Y. WU, and D. MA, in Security in<br />

the 21st Century, edited by D.T. LEE, S. SHIEH and D. TYGAR, Springer, 2004.<br />

.<br />

7. "Charge constrained convolutional codes", by M. A. HERRO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, and Y. X. LI, in<br />

Communications and Cryptography: Two Slides of One Trapestry, edited by R. E. BLAHU, D. J.<br />

Costello, Jr., U. Maurer and T. Mittelholzer, Kluwer Academic Publishers, Boston, 1994, 173 -<br />

177.<br />

.<br />

Page 21 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

.<br />

Book Reviews<br />

.<br />

1. "Web security sourcebook: a complete guide to web security threats and solutions", by <strong>Robert</strong><br />

<strong>Huijie</strong> <strong>DENG</strong>, Journal of Computer Communications, 04/1999<br />

.<br />

2. "Invaluable state-of-the-art reference", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Journal of Computer<br />

Communications, 01/1995<br />

.<br />

3. "Bring network security out of the closet", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Journal of Computer<br />

Communications, 01/1995<br />

.<br />

4. "Comprehensive token ring coverage", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 01/1994<br />

.<br />

.<br />

Conference Program Committee and Advisory Services<br />

.<br />

1. Member, International Advisory Committee, IEEE Conference on Communications and Network<br />

Security, 14 October 2013 - 16 October 2013<br />

.<br />

2. Member, International Advisory Committee, International Conference on Network and System<br />

Security, 03 June 2013 - 04 June 2013<br />

.<br />

3. Co-chair, Program Committee, 9th Information Security Practice and Experience Conference., 12<br />

May 2013 - 14 May 2013<br />

.<br />

4. Program Committee, The 6th International Conference on Network and System Security, 21<br />

November 2012 - 23 November 2012<br />

.<br />

5. Co-chair, Technical Proogram Committee, International Conference on Multimedia Information<br />

Networking and Security., 02 November 2012 - 04 November 2012<br />

.<br />

6. Program Committee, The 19th ACM Conference on Computer and Communications Security., 16<br />

October 2012 - 18 October 2012<br />

.<br />

7. Program Committee, The Sixth International Conference on Software Security and Reliability., 20<br />

June 2012 - 22 June 2012<br />

.<br />

8. Co-chair, Steering Committee, ACM Symposium on Information, Computer and Communications<br />

Security., June 2012 - May 2012<br />

.<br />

9. Program Committee, International Conference on Applied Cryptography and Network Security, 07<br />

June 2012 - 09 June 2012<br />

.<br />

10. Program Committee, ACM Symposium on Information, Computer and Communications Security,<br />

01 May 2012 - 03 May 2012<br />

.<br />

11. Program Committee, The Fifth ACM Conference on Security and Privacy in Wireless and Mobile<br />

Networks., 16 April 2012 - 18 April 2012<br />

.<br />

12. General Co-Chair, Information Security Practice and Experience Conference, 09 April 2012 - 12<br />

April 2012<br />

.<br />

13. Program Committee, ACM Multimedia Conference, 28 November 2011 - 01 December 2011<br />

.<br />

14. General Co-Chair, International Conference on Trusted Systems, 27 November 2011 - 29<br />

November 2011<br />

.<br />

15. Program Committee, IEEE International Conference on Trust, Security and Privacy in Computing<br />

and Communications, 16 November 2011 - 18 November 2011<br />

Page 22 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

.<br />

16. Program Committee, ACM Conference on Wireless Network Security , 14 June 2011 - 17 June<br />

2011<br />

.<br />

17. General Co-Chair, Information Security Practice and Experience Conference, 14 May 2011 - 16<br />

May 2011<br />

.<br />

18. Program Committee, ACM Symposium on Information, Computer and Communications Security,<br />

22 March 2011 - 24 March 2011<br />

.<br />

19. General Co-Chair, International Conference on Trusted Systems, 13 December 2010 - 15<br />

December 2010<br />

.<br />

20. International Advisory Board, International Workshop on Multimedia, Information Privacy and<br />

Intelligent Computing Systems, 10 December 2010 - 12 December 2010<br />

.<br />

21. Technical Committee Co-Chair, International Conference on Multimedia Information Networking<br />

and Security, 04 November 2010 - 06 November 2010<br />

.<br />

22. Program Committee, - International Conference on Information Security and Cryptology , 20<br />

October 2010 - 23 October 2010<br />

.<br />

23. Program Committee, International Conference on Trusted Cloud Infrastructure<br />

TechnologiesAnnual , 18 October 2010 - 20 October 2010<br />

.<br />

24. Program Committee, ACM Workshop on Scalable Trusted Computing, 04 October 2010 - 04<br />

October 2010<br />

.<br />

25. Program Committee, International Symposium on Data, Privacy and E-Commerce, 13 September<br />

2010 - 14 September 2010<br />

.<br />

26. Program Committee, International Conference on Applied Cryptography and Network Security, 22<br />

June 2010 - 25 June 2010<br />

.<br />

27. Program Committee, IEEE International Conference on Secure Software Integration and<br />

Reliability Improvement, 09 June 2010 - 11 June 2010<br />

.<br />

28. Program Committee, International Conference on Applied Cryptography and Network Security, 07<br />

June 2010 - 10 June 2010<br />

.<br />

29. Co-Chair, Program Committee, Information Security Practice and Experience Conference, 12<br />

May 2010 - 13 May 2010<br />

.<br />

30. Program Committee, ACM Symposium on Information, Computer and Communications Security,<br />

13 April 2010 - 16 April 2010<br />

.<br />

31. Co-Chair, The International Conference on Trusted Systems, 17 December 2009 - 19 December<br />

2009<br />

.<br />

32. Program Committee, International Conference on Information Security and Cryptology , 12<br />

December 2009 - 15 December 2009<br />

.<br />

33. International Advisory Board, International Workshop on Multimedia, Information Privacy and<br />

Intelligent Computing Systems, 10 December 2009 - 12 December 2009<br />

.<br />

34. Program Committee, International Conference on Cloud Computing, 01 December 2009 - 04<br />

December 2009<br />

.<br />

35. Technical Program Committee, International Conference on Multimedia Information Networking<br />

and Security, 18 November 2009 - 20 November 2009<br />

Page 23 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

.<br />

36. Program Committee, International Conference on Network and System Security, 19 October<br />

2009 - 20 October 2009<br />

.<br />

37. Program Committee, IEEE International Symposium on Trust, Security and Privacy for Pervasive<br />

Applications, 05 October 2009 - 07 October 2009<br />

.<br />

38. General, Co-chair, Information Security Practice and Experience Conference, 13 April 2009 - 15<br />

April 2009<br />

.<br />

39. Program Committee, International Conference on the Technical and Socio-economic Aspects of<br />

Trusted Computing, 06 April 2009 - 08 April 2009<br />

.<br />

40. Program Committee, ACM Symposium on Information, Computer and Communications Security,<br />

10 March 2009 - 12 March 2009<br />

.<br />

41. Program Committee, Australasian Conference on Information Security and Privacy, 20 January<br />

2009 - 23 January 2009<br />

.<br />

42. Technical Program Committee, IEEE/IFIP International Conference on Embedded and Ubiquitous<br />

Computing, 17 December 2008 - 20 December 2008<br />

.<br />

43. Program Committee, International Conference on Computational Intelligence and Security, 13<br />

December 2008 - 17 December 2008<br />

.<br />

44. Program Committee, Annual Computer Security Applications Conference , 08 December 2008 -<br />

12 December 2008<br />

.<br />

45. Program Committee, International Conference on Cryptology and Network Security, 02<br />

December 2008 - 04 December 2008<br />

.<br />

46. Program Committee, International Conference on Provable Security, 01 November 2008 - 03<br />

November 2008<br />

.<br />

47. Program Committee, ACM Conference on Computer and Communications Security, 27 October<br />

2008 - 31 October 2008<br />

.<br />

48. Program Committee, International Conference on Information and Communications Security, 20<br />

October 2008 - 22 October 2008<br />

.<br />

49. Program Committee, Annual Conference on Privacy, Security and Trust, 01 October 2008 - 03<br />

October 2008<br />

.<br />

50. Program Committee, International Conference on Network and System Security, 18 September<br />

2008 - 18 September 2008<br />

.<br />

51. Program Committee, Information Security Conference, 15 September 2008 - 18 September 2008<br />

.<br />

52. Program Committee, Asia Pacific Trusted Infrastructure Technologies Conference, 08 September<br />

2008 - 10 September 2008<br />

.<br />

53. Program Committee, International Conference on Communications and Networking in China, 25<br />

August 2008 - 27 August 2008<br />

.<br />

54. Technical Program Committee, IEEE International Conference on Communications, 19 May 2008<br />

- 23 May 2008<br />

.<br />

55. Program Committee, ACM Symposium on Information, Computer and Communications Security,<br />

18 March 2008 - 20 March 2008<br />

.<br />

Page 24 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

56. Technical Program Committee, IFIP International Conference on Embedded and Ubiquitous<br />

Computing (EUC 2007), December 2007, Taipei, Taiwan.<br />

.<br />

57. Program Committee, ACM Conference on Computer and Communications Security, (ACM CCS<br />

2007), October 2007, Washington, DC, USA.<br />

.<br />

58. Program Committee, the 12th European Symposium on Research in Computer Security<br />

(ESORICS 2007), September 2007, Dresden, Germany.<br />

.<br />

59. Program Committee, The Second Conference on Availability, Reliability and Security (AReS<br />

2007), 10th-13th April 2007, Vienna, Austria.<br />

.<br />

60. Technical Program Committee, IEEE Wireless Communications and Networking Conference<br />

2007 (WCNC 2007), March 2007, Hong Kong, China.<br />

.<br />

61. Co-Chair Program Committee, ACM Symposium on Information, Computer and<br />

.<br />

62. Advisory Committee, the 1st International Conference on Information Security and Computer<br />

Forensics (ISCF 2006), December 2006, Chennai, India.<br />

.<br />

63. Program Committee, the 2nd International Conference on Mobile Ad-hoc and Sensor Networks<br />

(MSN 2006), December 2006, Hong Kong, China.<br />

.<br />

64. Program Committee, ACM Workshop on Digital Rights Management (ACM DRM 2006), October<br />

2006, Washington, DC, USA.<br />

.<br />

65. Program Committee, ChinaCOM 2006, October 2006, Beijing, China.<br />

.<br />

66. Program Committee, the 11th European Symposium on Research in Computer Security<br />

(ESORICS 2006), September 2006, Hamburg, Germany.<br />

.<br />

67. Technical Program Committee, The Second International Conference on Security and Privacy for<br />

Emerging Areas in Communication Networks (SECURECOMM 2006), September 2006,<br />

Baltimore, USA.<br />

.<br />

68. Program Committee, The 11th Australasian Conference on Information Security and Privacy<br />

(ACISP 2006), July 2006, Melbourne, Australia.<br />

.<br />

69. Program Committee, International Conference on Applied Cryptography and Network Security<br />

(ACNS 2006), June 2006, <strong>Singapore</strong>.<br />

.<br />

70. Program Committee, The First Conference on Availability, Reliability and Security (AReS 2006),<br />

20th-22nd April 2006, Vienna, Austria.<br />

.<br />

71. Co-Chair of Program Committee, The Second Information Security Practice and Experience<br />

Conferecne 2006 (ISPEC 2006), (Hangzhou, China)<br />

.<br />

72. Program Committee, ACM Symposium on Information, Computer and Communications Security<br />

(AsiaCCS'2006), (Taipei, Taiwan)<br />

.<br />

73. Technical Program Committee, Workshop on Internet and Network Economics, (WINE 2005),<br />

(15-17 December, 2005)<br />

.<br />

74. International Program Committee, The IASTED International Conference on Communication,<br />

Network and Information Security (CNIS 2005), (November 14-16 2005, Phoenix, USA)<br />

.<br />

75. Technical Program Committee, The First International Conference on Security and Privacy for<br />

Emerging Areas in Communication Networks, SECURECOMM 2005 (5-9 September 2005,<br />

Athens, Greece)<br />

.<br />

Page 25 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

76. Technical Program Committee, IEEE Wireless Networks, Communications and Mobile<br />

Computing, IEEE WirelessCom 2005 (June 13-14, 2005, Hawaii, USA)<br />

.<br />

77. Technical Program Committee, IEEE Globecom 2005, Symposium on Computer and Networks<br />

Security, 2005 (Nov. 28- Dec. 2, 2005, St. Louis, USA).<br />

.<br />

78. International Program Committee, IASTED International Conference on Communications and<br />

Computer Networks, CCN'2005 (Oct. 24-26, 2005, Marina Del Rey, CA, USA)<br />

.<br />

79. General Co-Chair, The 8th Information Security Conference 2005 (ISC 2005), 20-23 September<br />

2005,(<strong>Singapore</strong>)<br />

.<br />

80. General Chair, The 1st Information Security Practice and Experience Conference, 2005<br />

(<strong>Singapore</strong>)<br />

.<br />

81. Technical Program Committee, The 1st IEEE Workshop on Information Assurance in Wireless<br />

Sensor Networks 2005 (WSNIA 2005), (April 7-9, Arizona, USA)<br />

.<br />

82. Program Committee, The Third Australasian Information Security Workshop (AISW 2005): Digital<br />

Rights Management, 31 Jan - 3 Feb 2005 (Australia)<br />

.<br />

83. General Chair and Program Committee, International Public Key Cryptosystems Workshop, 2004<br />

(<strong>Singapore</strong>)<br />

.<br />

84. Technical Committee, Workshop on Mobile, Wireless and Sensor Networks, 2004 (<strong>Singapore</strong>).<br />

.<br />

85. Program Committee, the Annual International Conference on Information Security and<br />

Cryptology, 2003 (Seoul, Korea), 2004 (Seoul, Korea).<br />

.<br />

86. Program Committee, International Conference on Information and Communications Security,<br />

1997 (Beijing, China), 1999 (Sydney, Australia), 2003 (Huhehote, China), 2004 (Malaga, Spain),<br />

2005 (Beijing, China).<br />

.<br />

87. Technical Program Committee, IEEE Globecom 2003, Symposium on Communications Security,<br />

2003 (San Francisco, USA).<br />

.<br />

88. International Program Committee, the IASTED Conference on Communication, Networks and<br />

Security, 2003 (New York, USA).<br />

.<br />

89. Program Committee, the First International Conference on Applied Cryptography and Network<br />

Security, 2003 (Kuming, China), 2006 (<strong>Singapore</strong>)<br />

.<br />

90. Program Committee, Asiacrypt 2003 (Taipei, Taiwan).<br />

.<br />

91. Program Committee, the Second International Workshop for Asian Public Key Infrastructures,<br />

2002 (Taipei, Taiwan).<br />

.<br />

92. Chair of Program Committee, the International Conference on Information and Communications<br />

Security, 2002 (<strong>Singapore</strong>).<br />

.<br />

93. Program Committee, IEEE Symposium on Security and Privacy, 1999 (Oakland, CA, USA), 2000<br />

(Oakland, CA, USA).<br />

.<br />

94. Program Committee, ACM Conference on Computer and Communications Security, 1999<br />

(<strong>Singapore</strong>).<br />

.<br />

95. Program Committee, Information Security Workshop, 1999 (Kuala Lumpur, Malaysia).<br />

.<br />

96. International Advisory Committee, IEEE International Carnahan Conference on Security<br />

Technology, 1995 (Sanderstead, Surrey, England), 1997 (Canberra, Australia), 1998 (Alexandria,<br />

Page 26 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

VA, USA), 1999 (Madrid, Spain).<br />

.<br />

97. Program Committee, ChinaCOM 2006, 16-19 October 2006, Beijing, China,<br />

http://www.chinacom.org/progcom.html<br />

.<br />

98. Program Committee, the 11th European Symposium on Research in Computer Security<br />

(ESORICS 2006), 18-20 September 2006, Hamburg, Germany,<br />

http://www.esorics06.tu-harburg.de<br />

.<br />

99. Program Committee, the 11th Australasian Conference on Information Security and Privacy<br />

(ACISP 2006), 3-5 July 2006, Melbourne, Australia, http://acisp2006.it.deakin.edu.au<br />

.<br />

100. Technical Program Committee, IEEE International Conference on Communications (ICC 2006) -<br />

Wireless Ad Hoc and Sensor Networks, 11th - 15th June 2006, Istanbul, Turkey,<br />

http://www.icc2006.org/index.html<br />

.<br />

101. Program Committee, IEEE Conference on Availability, Reliability and Security (AReS 2006),<br />

20-22 April 2006, Vienna, Austria, http://www.ares-conf.org<br />

.<br />

102. Program Committee, ACM Symposium on Information, Computer and Communications Security<br />

(AsiaCCS 2006), 21-24 March 2006, Taipei, Taiwan,<br />

http://www.iis.sinica.edu.tw/asiaccs06/indexhome.html<br />

.<br />

103. Technical Program Committee, The IEEE Communications Society/CreateNet International<br />

Conference on Security and Privacy for Emerging Areas in Communication Networks,<br />

(SECURECOMM 2006), 11-15 September 2006, Baltimore, USA, http://www.securecomm.org<br />

.<br />

104. Program Committee, the Fourth International Conference on Applied Cryptography and Network<br />

Security (ANCS 2006), 6-9 June, <strong>Singapore</strong>, http://acns2006.i2r.a-star.edu.sg<br />

.<br />

105. Program Committee, The Seventh International Conference on Electronic Commerce, ICEC<br />

2005, 15-17 Aug 2005, Xi'an, China, http://www.icec2005.org<br />

.<br />

106. Program Committee, The Seventh International Conference on Information and Communications<br />

Security, (ICICS 2005), 10-13 December 2005, Beijing, China, http://www.icics2005.org<br />

.<br />

107. Technical Program Committee, Emerging Networks, Technologies and Standards Symposium,<br />

(IEEE WirelessCom 2005), Hawaii, USA, http://sa1.sice.umkc.edu/wc05/<br />

.<br />

.<br />

Editorial Boards<br />

.<br />

1. Associate Editor, IEEE Transactions on Dependable and Secure Computing, February 2012<br />

.<br />

2. Guest Editor, Special Issue on Ubiquitous Electronic Commerce Systems, Journal of Electronic<br />

Commerce Research, Vol. 11, No. 1, 2011, Springer,, January 2011 - January 2011<br />

.<br />

3. Member, Editorial Board, International Journal of Multimedia Intelligence and Security,<br />

Inderscience, 2009<br />

.<br />

4. Associate Editor, IEEE Transactions on Information Forensics and Security (since March 2009),<br />

March 2009<br />

.<br />

5. Associate Editor, Security and Communication Network Journal, John Wiley and Sons (2007-),<br />

2007<br />

.<br />

6. Editorial Board, Journal of Computer Science and Technology (JCST), Institute of Computing<br />

Technology, Chinese Academy of Sciences, co-publisshed by Springer (2006-), 2006<br />

.<br />

Page 27 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

7. Editorial Board, Advances in Cryptology and Information Security (ACSI) series, IOS Press (since<br />

August 2005), 2005<br />

.<br />

8. Associate Editor, International Journal of Internet Technology and Secured Transactions (IJITST)<br />

(since August 2005), August 2005<br />

.<br />

.<br />

Patents<br />

.<br />

1. (Granted): D. Ye, F. Bao, R. H. Deng and H. Wu, "Method and apparatus for constructing efficient<br />

elliptic curve cryptosystems", <strong>Singapore</strong> Patent 99167 [WO02/0827170], 27th January 2006.<br />

.<br />

2. (Granted): F. Bao and R. H. Deng, " Method and apparatus for encrypting and decrypting data",<br />

US 7,110,539B1, 19th Sept. 2006.<br />

.<br />

3. (Granted): F. Bao and R. H. Deng, "A method of exchanging digital data", European Patent<br />

1082836, 23rd November 2005.<br />

.<br />

4. (Granted): F. Bao, J. Zhou and R. H. Deng, "Method of generating an authentication", US<br />

2005/0246769A, November 3, 2005.<br />

.<br />

5. (Granted): P. Feng, F. Bao and R. H. Deng, "Method and apparatus for providing XML document<br />

encryption", <strong>Singapore</strong> Patent 97038, 31st October 2005.<br />

.<br />

6. (Granted): R. H. Deng, F. Bao and Y. Wu, "Remote authenticaiton based on exchanging signals<br />

representing biometrics information", US Patent 6910129B1, 21st June 2005.<br />

.<br />

7. (Granted): A. Lakshminarayanan, F. Bao and R. H. Deng and T. Li, "Method for cryptographically<br />

processing a message", PCT WO2005/034423A1, 14th April 2005.<br />

.<br />

8. (Granted): Y. Wu and R. H. Deng, "Method for incremental authentication of documents", US<br />

2005/0091261A1, 28th April 2005.<br />

.<br />

9. (Granted): J. Wu, Q. Sun and R. H. Deng, "Legitimacy protection of electronic document and a<br />

printed copy thereof" GB 2365184, 16th June 2004.<br />

.<br />

10. (Granted): P. Feng, F. Bao and R. H. Deng, "Method and apparatus for providing XML document<br />

encryption", US 2004/0078577A1, 22nd April 2004.<br />

.<br />

11. (Granted): J. Zhou, F. Bao and R. H. Deng, "A public key cryptography and a framework<br />

therefore", PCT WO2004/032416A1, 15th April 2004.<br />

.<br />

12. (Granted): R. H. Deng and Y. Wu, "Method and apparatus for digital content copy protection", US<br />

6711553B1, 23rd March 2004.<br />

.<br />

13. (Granted): F. Bao, R. H. Deng, and H. Wu, "A method of sale auditing in private transaction of<br />

e-goods", PCT WO 03/044619 A2, 30th May 2003.<br />

.<br />

14. (Granted): Q. Sun, J. Wu and R. H. Deng, 'Method and apparatus for embedding digital<br />

information in digital multimedia data", <strong>Singapore</strong> Patent 81505; UK Patent GB 2366112, 28th<br />

May 2003; PCT WO00/39954, 6th July 2000<br />

.<br />

15. (Granted): J. Wu, Q. Sun, R. H. Deng, "Method and apparatus for protecting the legitimacy of an<br />

article", UK Patent GB 2364513B, 9th April 2003.<br />

.<br />

16. (Granted): P. Feng, F. Bao and R. H. Deng, "A method and apparatus for providing XML<br />

document encryption", PCT/SG4 00/00196, December 2002.<br />

.<br />

17. (Granted): J. Hu, F. Bao, R. H. Deng, "A method of data storage and apparatus therefor", UK<br />

Patent GB 2349964, 24th July 2002; SG Patent SG 73941, 30th Sept 2002.<br />

Page 28 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

.<br />

18. (Granted): B. Feng and R. H. Deng, "A method of exchanging digital data", SG Patent SG75691,<br />

20th Sept 2002.<br />

.<br />

19. (Granted): B. Feng, R. H. Deng, "Method and apparatus for encrypting and decrypting data", SG<br />

Patent SG 82916, 23rd May 2002<br />

.<br />

20. (Granted): R. H. Deng and T. Ngair, "Microprocessor card payment system", SG Patent<br />

SG64957, 19th April 2002.<br />

.<br />

21. (Granted): N. A. Desai, R. H. Deng, and W. Wang, "Computationally efficient method for trusted<br />

and dynamic digital objects dissemination", US Patent 6058383, 2nd May 2000.<br />

.<br />

22. (Granted): R. H. Deng, Y. X. Li, and E. H. Koh, "Correcting up to two disc drive read errors and<br />

detecting the occurrence of more than two read errors ", US Patent 5627843, 6th May 1997.<br />

.<br />

23. (Granted): A. Lakshminarayanan, F. Bao, R. H. Deng and T. Li, "Method for cryptographically<br />

processing a message, method for generating a cryptographically processed message, method<br />

for performing a cryptographic operation on a message, computer system, client computer,<br />

server computer and computer program elements", <strong>Singapore</strong> Patent No. 120791, 30 May 2007.<br />

.<br />

24. (Granted): F. Bao, J. Zhou and R. H. Deng, "Method of generating an authentication", <strong>Singapore</strong><br />

Patent 110390, 28th February 2007. US Patent 7,233,782B2, June 19, 2007.<br />

.<br />

25. (Granted): Y. Wu and R. H. Deng, "Method for incremental authentication of documents", US<br />

Patent 7,315,866, 1st January 200801 January 2008<br />

.<br />

.<br />

Awards, Recognition and Honors<br />

.<br />

1. Best Paper Award, The 13th Joint IFIP TC6 and TC11 Conference on Communications and<br />

Multimedia Security (CMS 2012), Canterbury, UK., 03 September 2012 - 05 September 2012<br />

.<br />

2. Distinguished Paper Award, The 19th Network and Distributed System Security Symposium<br />

(NDSS 2012), San Diego, USA., 05 February 2012 - 08 February 2012<br />

.<br />

3. Asia-Pacific Information Security Leadership Achievements (ISLA) Community Service Star and<br />

Showcased Senior Information Security Professional, International Information Systems Security<br />

Certification (ISC)2), 2010, July 2010<br />

.<br />

4. Lee Kuan Yew Fellow for Research Excellence, <strong>Singapore</strong> Management University, 2006.<br />

.<br />

5. Quarterly Best Paper Award for the 1st quarter of 2003, Institute for Infocomm Research,<br />

<strong>Singapore</strong>, 2003.<br />

.<br />

6. Role Model for the category of Principal Research Staff Member, Laboratories for Information<br />

Technology, <strong>Singapore</strong>, 2002.<br />

.<br />

7. University Outstanding Researcher Award, National University of <strong>Singapore</strong>, <strong>Singapore</strong>,<br />

November 1999.<br />

.<br />

8. KRDL Excellence Award, Kent Ridge Digital Labs, <strong>Singapore</strong>, March 1999.<br />

.<br />

9. KRDL Achievement Award, Kent Ridge Digital Labs, <strong>Singapore</strong>, June 1998.<br />

.<br />

10. ISS Meritorious Award, Institute of Systems Science, National University of <strong>Singapore</strong>,<br />

<strong>Singapore</strong>, October 1990.<br />

.<br />

11. US NASA Research Fellowship, 1986-1987.<br />

.<br />

Page 29 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

12. Excellent Graduate Certificate, National University of Defense Technology, China, December<br />

1981.<br />

.<br />

13. First Prize of the 1st University Physics Contest, National University of Defense Technology,<br />

China, May 1980.<br />

.<br />

.<br />

Invited Talks<br />

.<br />

1. Keynote speech. <strong>Robert</strong> H. Deng, "Access control of encrypted data in untrusted servers", The<br />

4th International Symposium on Cyberspace Safety and Security (CSS 2012), Melbourne,<br />

Australia., 12 December 2012 - 13 December 2012<br />

.<br />

2. Invited Talk. <strong>Robert</strong> H. Deng, "On limitations of designing leakage-resilient password systems",<br />

Coding and Cryptography Research Seminar, NTU., 25 November 2011<br />

.<br />

3. Invited talk. <strong>Robert</strong> H. Deng & Yingjiu Li, "RFID security and privacy at both physical and system<br />

levels", Internet of Things-Global Standards Initiative (IoT-GSI) Meeting, International<br />

Telecommunications Union (ITU), Geneva, Switzerland., 22 August 2011 - 26 August 2011<br />

.<br />

4. Invited talk. R. H. Deng, "Recent development in RFID privacy models",<br />

French-German-<strong>Singapore</strong>an Workshop on Applied Cryptography, Jointly organized by NTU,<br />

German Academic Exchange Service DAAD, the Embassies of France and Germany., 02<br />

December 2010 - 03 December 2010<br />

.<br />

5. Keynote Speech. R. H. Deng, “Detecting node clones in wireless sensor networks”, The 6th<br />

International ICST Conference on Security and Privacy in Communication Networks<br />

(SecureComm 2010), <strong>Singapore</strong>., 07 September 2010 - 09 September 2010<br />

.<br />

6. Keynote Speech. R. H. Deng, “RFID privacy models and a minimal condition”, The 5th China<br />

International Conference on Information Security and Cryptology (INSCRYPT 2009), Beijing,<br />

China., 12 December 2009 - 15 December 2009<br />

.<br />

7. Keynote Speech. R. H. Deng, “Scalable end-to-end multimedia content authentication<br />

techniques”, 2009 International Conference on Multimedia Information NEtworking and Security<br />

(MINES 2009), Wuhan, China., 18 November 2009 - 20 November 2009<br />

.<br />

8. Keynote Speech. R. H. Deng, “The future of password”, the 19th Cryptology and Information<br />

Security Conference, Taipei, Taiwan., 04 June 2009 - 05 June 2009<br />

.<br />

9. Invited Talk. R. H. Deng, “Innovative and practical applications of cryptography”, School of<br />

Computer Science and Technology, Xidian University, Xi'an, China., 14 April 2009<br />

.<br />

10. Invited Talk. R. H. Deng, "Achieving strong user authentication using weak secret", Information<br />

Security Seminar for Mindef/DSTA, organized by ST Electronics (Info-Security), 29th August<br />

2008, 29 August 2008 - 29 August 2008<br />

.<br />

11. Keynote Speech. R. H. Deng, "Scalable authentication techniques compatible with modern<br />

multimedia coding standards", The 4th Information Security Practice and Experience Conference,<br />

21st-23rd April 2008, Sydney, Australia, 21 April 2008 - 23 April 2008<br />

.<br />

12. Invited Lecture. R. H. Deng, "Innovative applications of trusted computing platform", The First<br />

Asia-Pacific Summer School on Trusted Infrastructure Technologies, 20th - 24th August 2007,<br />

Zhuhai, China<br />

.<br />

13. Invited lecture. R. H. Deng, "Techniques for trusted electronic transactions", 2007 Information<br />

Security Summer School, Taiwan Information Security Center, 6th - 16th August 2007, Taipei,<br />

Taiwan.<br />

.<br />

Page 30 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

14. Keynote Speech. R. H, Deng, "Towards efficient and novel security solutions - a marriage of<br />

crypto and trusted computing platform", The 3rd Information Security Practice and Experience<br />

Conference (ISPEC2007), 7th-9th May, 2007, Hong Kong, China.<br />

.<br />

15. Invited Talk. R. H. Deng, "Cryptography and Innovative Applications", 7th March 2007, College of<br />

Computer Science and Technology, Wuhan University, China.<br />

.<br />

16. Plenary Lecture. R. H. Deng, "Towards practical private information retrieval", the First<br />

International Conference on Information Security and Computer Forensics (ISCF 2006),<br />

December 2006, Chennai, India.<br />

.<br />

17. Invited Speech. R. H. Deng, "Recent advances in privacy protection in database applications",<br />

the Second National Conference on Cryptology (NCC 2006), November 2006, Kuala Lumpur,<br />

Malaysia.<br />

.<br />

18. Invited paper. R. H. Deng, Y. Qiu, J. Zhou and F. Bao, "Protecting location information of mobile<br />

nodes in Mobile IPv6", ChinaCOM 2006, October 2006, Beijing, China.<br />

.<br />

19. Keynote Speech. R. H. Deng, "Inference control and private information retrieval - two sides of<br />

one tapestry", the Fourth International Conference on Applied Cryptography and Network<br />

Security (ACNS 2006), June 2006, <strong>Singapore</strong>.<br />

.<br />

20. Invited Speaker. R. H. Deng, "Developments in security systems and cryptographic applications",<br />

The Croucher Foundation Advanced Study Institute Cryptography and Wireless Security,<br />

11th-16th December 2004, City University of Hong Kong.<br />

.<br />

21. Invited talk. R. H. Deng, "Challenges in securing mobile IP", Workshop on Mobile, Wireless and<br />

Sensor Networks: Technology and Future Directions", sponsored by BSIG, Cisco Systems, IBM,<br />

IEEE, IBM, NUS, and Pearson, 5th-6th March 2004.<br />

.<br />

22. Invited talk. R. H. Deng, "Securing JPEG2000 the next generation image compression standard",<br />

Workshop on Advanced Developments in Software and Systems Security, sponsored by UC<br />

Berkeley, Academia Sinica, National Chiao Tung University, IEEE Taipei Section and the Chinese<br />

Cryptology and Information Security Association, 5th-7th December 2003, Taipei, Taiwan.<br />

.<br />

23. Invited speaker. R. H. Deng, "Security challenges in ubiquitous computing", Annual Meeting of<br />

the Korea Institute for Information Security and Cryptology (Pohang Section), 21st February<br />

2003, Pohang , Korea.<br />

.<br />

24. Invited talk. R. H. Deng, "Defending against redirect attacks in mobile IP", Mathematics<br />

Department and Temasek Labs joint seminar on Coding/Crypto/Combinatorics, 16th October<br />

2002, National University of <strong>Singapore</strong>.<br />

.<br />

25. Invited talk. R. H. Deng, "Enabling information security technologies", organized by Bioinformatics<br />

Institute, <strong>Singapore</strong>, 4th October 2002.<br />

.<br />

26. Invited keynote and panel discussion. R. H. Deng, Bao Feng, and Karen Worstell, "What's over<br />

the horizon? New technologies to watch", the 43rd International Information Integrity Institute<br />

Forum, 11th-13th June 2001, Berlin, German.<br />

.<br />

27. Invited talk. R. H. Deng, "Overview of internet security issues and technologies", Workshop on<br />

Internet Security and e-Commerce, organized by Shanghai City Information Technology Office<br />

and Computer Center, 14th December 2000, Shanghai, China.<br />

.<br />

28. Panel discussion. R. H. Deng, Panel discussion at Removing the Barriers to e-Business - Net<br />

Present Value of Security: CEO Luncheon Briefing, organized by AtomicTangerine and Forbes,<br />

11th October 2000, Gibson Hall, London.<br />

.<br />

29. Invited talk. R. H. Deng, "Virtual private network standards and technologies", Secure e-Business<br />

Internet Infrastructure Symposium, organized by the Chinese Academy of Sciences and Internet<br />

Page 31 of 32


<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

Appliance, Inc, 12th September 2000, Beijing, China.<br />

.<br />

30.<br />

.<br />

<strong>Education</strong> talk. R. H. Deng, "Virtual private networks in remote access", Mobile/Remote Access<br />

Network and Platform Challenges: Extending the Boundaries of Business Conference, 22nd -<br />

24th March 2000, New Orleans, Louisiana.<br />

31.<br />

.<br />

.<br />

Invited talk. R. H. Deng, "Information security R&D at Kent Ridge Digital Labs", the 6th ACM<br />

Conference on Computer and Communications Security, 2nd-4th November 1999, <strong>Singapore</strong>.<br />

Journal Articles (Forthcoming)<br />

.<br />

1.<br />

.<br />

"Efficient authentication and access control of scalable multimedia streams over packet-lossy<br />

networks", by <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Xuhua DING, and Swee Won LO, 2013, Journal of Security<br />

and Communication Networks, Wiley InterScience<br />

2. "A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV<br />

broadcasting", by Zhiguo WAN, June LIU, Rui ZHANG, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2013, IEEE<br />

Transactions on Multimedia<br />

.<br />

3.<br />

.<br />

"Attributed-based access to scalable media in cloud-assisted content sharing", by Yongdong WU,<br />

Zhuo WEI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 2013, IEEE Transactions on Multimedia<br />

4.<br />

.<br />

"Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile<br />

networks", by Yifan ZHAO, Swee Won LO, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Xuhua DING, 2013, Journal<br />

of Computer and System Sciences, Elsevier<br />

Page 32 of 32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!