15.08.2013 Views

Huijie, Robert DENG Education Position(s) Held - Singapore ...

Huijie, Robert DENG Education Position(s) Held - Singapore ...

Huijie, Robert DENG Education Position(s) Held - Singapore ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong><br />

28 January 2013<br />

.<br />

USA<br />

.<br />

38. "Secure mobile agents with designated hosts", by Qi ZHANG, Yi MU, Minji ZHANG, and <strong>Huijie</strong>,<br />

<strong>Robert</strong> <strong>DENG</strong>, 10/2009, 286-293, Proceedings of the 3rd International Conference on Network &<br />

System Security (NSS’09), Gold Coast, Australia<br />

.<br />

39. "Hierarchical self-healing key distribution for heterogeneous wireless sensor networks", by<br />

Yanjiang YANG, Jianying ZHOU, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, and Feng BAO, 09/2009, 285-295,<br />

Proceedings of the 5th International ICST Conference on Security and Privacy in Communication<br />

Networks (SecureComm 2009), Athens, Greece<br />

.<br />

40. "Efficient conditional proxy re-encryption with chosen-ciphertext security", by Jian WENG,<br />

Yanjiang YANG, Qiang TANG, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 09/2009, 151-166, Proceedings of the<br />

2009 Information Security Conference (ISC 2009), LNCS 5735, Springer, Pisa, Italy<br />

.<br />

41. "Applying sanitizable signature to web-service-enabled business processes: going beyond<br />

integrity protection", by Kar Way TAN and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 67-74, Proceedings of<br />

the IEEE 7th International Conference on Web Services (ICWS 2009), Los Angeles, USA<br />

.<br />

42. "On the effectiveness of software diversity: a systematic study on real-world vulnerabilities", by<br />

Jin HAN, Debin GAO, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 127-146, Proceedings of the 6th SIG<br />

SIDAR Conference on Detection of Intrusions and Malware, and Vulnerability Assessment<br />

(DIMVA2009), LNCS 5587, Springer, Milan, Italy<br />

.<br />

43. "Conditional proxy broadcast re-encryption", by Cheng-Kang CHU, Jian WENG, Sherman<br />

CHOW, Jianying ZHOU, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 07/2009, 327-242, Proceedings of the 14th<br />

Australasian Conference on Information Security and Privacy (ACISP 2009), LNCS 5594,<br />

Springer, Brisbane, Australia<br />

.<br />

44. "Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems", by Shaoying CAI,<br />

Tieyan LI, Yingjiu LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 04/2009, 372-383, the 5th Information Security<br />

Practice and Experience Conference (ISPEC 2009), LNCS 5451, Springer, Xi'an, China<br />

.<br />

45. "Achieving better privacy protection in wireless sensor networks using trusted computing", by<br />

Yanjiang YANG, <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Jianying ZHOU, and Ying QIU, 04/2009, 384-395,<br />

Proceedings of the 5th Information Security Practice and Experience Conference (ISPEC 2009),<br />

LNCS 5451, Springer, Xi'an, China<br />

.<br />

46. "Attacks and improvements to an RFID mutual authentication protocol", by Shaoying CAI, Yingjiu<br />

LI, Tieyan LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 03/2009, 51-58, the Second ACM Conference on<br />

Wireless Network Security (WiSec' 09), Zurich, Switzerland<br />

.<br />

47. "Conditional Proxy Re-encryption Secure against Chosen-ciphertext Attacks", by Jian WENG,<br />

<strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, Xuhua DING, Chengkang CHU, and Junzuo LAI, 03/2009, 54-65, ACM<br />

Symposium on Information, Computer & Communication Security (ASIACCS)<br />

.<br />

48. "A comprehensive study for RFID malwares on mobile devices", by Qiang YAN, Yingjiu LI, Tieyan<br />

LI, and <strong>Huijie</strong>, <strong>Robert</strong> <strong>DENG</strong>, 01/2009, the 5th Workshop on RFID Security (RFIDsec 2009 Asia),<br />

Taipei, Taiwan<br />

.<br />

49. "Private Query on Encrypted Data in Multi-User Setting", by Feng BAO, <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>,<br />

Xuhua DING, and Yanjiang YANG, 2008, 71-85, Proceedings of Information Security Practice and<br />

Experience Conference (ISPEC), LNCS 4991, Springer, Sydney, Australia<br />

.<br />

50. "Efficient Client-to-Client Password Authenticated Key Exchange", by Yanjiang YANG, Feng BAO,<br />

and <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, 12/2008, 202-207, Proceedings of IEEE/IFIP International Symposium<br />

on Trust, Security and Privacy for Pervasive Applications, Shanghai, China<br />

.<br />

51. "Chosen-Ciphertext Secure Proxy Re-encryption Without Pairing", by <strong>Robert</strong> <strong>Huijie</strong> <strong>DENG</strong>, Jian<br />

WENG, Shengli LIU, and Kefei CHEN, 12/2008, pp. 1-17, Proceedings of the 7th International<br />

Page 11 of 32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!