Huijie, Robert DENG Education Position(s) Held - Singapore ...
Huijie, Robert DENG Education Position(s) Held - Singapore ...
Huijie, Robert DENG Education Position(s) Held - Singapore ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />
28 January 2013<br />
.<br />
USA<br />
.<br />
38. "Secure mobile agents with designated hosts", by Qi ZHANG, Yi MU, Minji ZHANG, and <strong>Huijie</strong>,<br />
<strong>Robert</strong> <strong>DENG</strong>, 10/2009, 286-293, Proceedings of the 3rd International Conference on Network &<br />
System Security (NSS’09), Gold Coast, Australia<br />
.<br />
39. "Hierarchical self-healing key distribution for heterogeneous wireless sensor networks", by<br />
Yanjiang YANG, Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 09/2009, 285-295,<br />
Proceedings of the 5th International ICST Conference on Security and Privacy in Communication<br />
Networks (SecureComm 2009), Athens, Greece<br />
.<br />
40. "Efficient conditional proxy re-encryption with chosen-ciphertext security", by Jian WENG,<br />
Yanjiang YANG, Qiang TANG, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 09/2009, 151-166, Proceedings of the<br />
2009 Information Security Conference (ISC 2009), LNCS 5735, Springer, Pisa, Italy<br />
.<br />
41. "Applying sanitizable signature to web-service-enabled business processes: going beyond<br />
integrity protection", by Kar Way TAN and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 67-74, Proceedings of<br />
the IEEE 7th International Conference on Web Services (ICWS 2009), Los Angeles, USA<br />
.<br />
42. "On the effectiveness of software diversity: a systematic study on real-world vulnerabilities", by<br />
Jin HAN, Debin GAO, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 127-146, Proceedings of the 6th SIG<br />
SIDAR Conference on Detection of Intrusions and Malware, and Vulnerability Assessment<br />
(DIMVA2009), LNCS 5587, Springer, Milan, Italy<br />
.<br />
43. "Conditional proxy broadcast re-encryption", by Cheng-Kang CHU, Jian WENG, Sherman<br />
CHOW, Jianying ZHOU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 327-242, Proceedings of the 14th<br />
Australasian Conference on Information Security and Privacy (ACISP 2009), LNCS 5594,<br />
Springer, Brisbane, Australia<br />
.<br />
44. "Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems", by Shaoying CAI,<br />
Tieyan LI, Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 04/2009, 372-383, the 5th Information Security<br />
Practice and Experience Conference (ISPEC 2009), LNCS 5451, Springer, Xi'an, China<br />
.<br />
45. "Achieving better privacy protection in wireless sensor networks using trusted computing", by<br />
Yanjiang YANG, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Jianying ZHOU, and Ying QIU, 04/2009, 384-395,<br />
Proceedings of the 5th Information Security Practice and Experience Conference (ISPEC 2009),<br />
LNCS 5451, Springer, Xi'an, China<br />
.<br />
46. "Attacks and improvements to an RFID mutual authentication protocol", by Shaoying CAI, Yingjiu<br />
LI, Tieyan LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 03/2009, 51-58, the Second ACM Conference on<br />
Wireless Network Security (WiSec' 09), Zurich, Switzerland<br />
.<br />
47. "Conditional Proxy Re-encryption Secure against Chosen-ciphertext Attacks", by Jian WENG,<br />
<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Xuhua DING, Chengkang CHU, and Junzuo LAI, 03/2009, 54-65, ACM<br />
Symposium on Information, Computer & Communication Security (ASIACCS)<br />
.<br />
48. "A comprehensive study for RFID malwares on mobile devices", by Qiang YAN, Yingjiu LI, Tieyan<br />
LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 01/2009, the 5th Workshop on RFID Security (RFIDsec 2009 Asia),<br />
Taipei, Taiwan<br />
.<br />
49. "Private Query on Encrypted Data in Multi-User Setting", by Feng BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />
Xuhua DING, and Yanjiang YANG, 2008, 71-85, Proceedings of Information Security Practice and<br />
Experience Conference (ISPEC), LNCS 4991, Springer, Sydney, Australia<br />
.<br />
50. "Efficient Client-to-Client Password Authenticated Key Exchange", by Yanjiang YANG, Feng BAO,<br />
and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 12/2008, 202-207, Proceedings of IEEE/IFIP International Symposium<br />
on Trust, Security and Privacy for Pervasive Applications, Shanghai, China<br />
.<br />
51. "Chosen-Ciphertext Secure Proxy Re-encryption Without Pairing", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Jian<br />
WENG, Shengli LIU, and Kefei CHEN, 12/2008, pp. 1-17, Proceedings of the 7th International<br />
Page 11 of 32