D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 73 Citations 19,356 576 World Ranking 968 National Ranking 17

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Robert H. Deng mainly investigates Computer security, Encryption, Cryptography, Computer network and Public-key cryptography. His study explores the link between Computer security and topics such as Proxy that cross with problems in Proxy re-encryption. Robert H. Deng has included themes like Cloud computing and Database in his Encryption study.

His Cloud computing study integrates concerns from other disciplines, such as Distributed computing, Server and Access control. His Cryptography study combines topics in areas such as Security analysis, Data security, Linear code and Digital signature. His work carried out in the field of Computer network brings together such families of science as Certificate and Wireless ad hoc network.

His most cited work include:

  • HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing (366 citations)
  • Public Key Cryptography – PKC 2004 (303 citations)
  • Efficient unidirectional proxy re-encryption (277 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Encryption, Computer network, Cryptography and Authentication. His Computer security study combines topics from a wide range of disciplines, such as Server and Internet privacy. His Encryption research incorporates elements of Cloud computing and Theoretical computer science.

Robert H. Deng has researched Cloud computing in several fields, including Security analysis, Homomorphic encryption and Database. His Computer network research is multidisciplinary, incorporating perspectives in Scalability and Distributed computing. His study connects Digital signature and Cryptography.

He most often published in these fields:

  • Computer security (50.43%)
  • Encryption (25.82%)
  • Computer network (22.53%)

What were the highlights of his more recent work (between 2018-2021)?

  • Encryption (25.82%)
  • Computer security (50.43%)
  • Cloud computing (12.65%)

In recent papers he was focusing on the following fields of study:

Robert H. Deng focuses on Encryption, Computer security, Cloud computing, Computer network and Server. His Encryption research is multidisciplinary, incorporating elements of Database and Access control. His study in Computer security is interdisciplinary in nature, drawing from both Android, Correctness and Scalability.

His studies deal with areas such as Data security, Cryptography, Security analysis, Verifiable secret sharing and Information privacy as well as Cloud computing. His research in the fields of Public-key cryptography, Quality of service and Protocol overlaps with other disciplines such as Data sharing. He interconnects Data modeling and Service in the investigation of issues within Server.

Between 2018 and 2021, his most popular works were:

  • CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing (144 citations)
  • A blockchain-based location privacy-preserving crowdsensing system (46 citations)
  • Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT (37 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Encryption, Cloud computing, Computer security, Server and Information privacy are his primary areas of study. His study in Encryption is interdisciplinary in nature, drawing from both Security analysis, Overhead and Access control. His Cloud computing research includes themes of Homomorphic encryption, Threat model, Database, Cryptography and Computer network.

He works mostly in the field of Computer security, limiting it down to topics relating to Mobile device and, in certain cases, mHealth. His Server research incorporates themes from Data modeling, Service, Correctness, Dynamic data and Echo. The various areas that Robert H. Deng examines in his Information privacy study include Data security, Computation and Information retrieval.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

Zhiguo Wan;Jun'e Liu;R. H. Deng.
IEEE Transactions on Information Forensics and Security (2012)

696 Citations

Attribute-Based Encryption With Verifiable Outsourced Decryption

Junzuo Lai;Robert H. Deng;Chaowen Guan;Jian Weng.
IEEE Transactions on Information Forensics and Security (2013)

501 Citations

Efficient and practical fair exchange protocols with off-line TTP

Feng Bao;R.H. Deng;Wenbo Mao.
ieee symposium on security and privacy (1998)

481 Citations

Public Key Cryptography – PKC 2004

Feng Bao;Robert Deng;Jianying Zhou.
(2004)

451 Citations

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Cheng-Kang Chu;Sherman S. M. Chow;Wen-Guey Tzeng;Jianying Zhou.
IEEE Transactions on Parallel and Distributed Systems (2014)

430 Citations

Efficient unidirectional proxy re-encryption

Sherman S. M. Chow;Jian Weng;Yanjiang Yang;Robert H. Deng.
international conference on cryptology in africa (2010)

388 Citations

Variations of Diffie-Hellman Problem

Feng Bao;Robert H. Deng;HuaFei Zhu.
international conference on information and communication security (2003)

367 Citations

Trellis-coded multidimensional phase modulation

S.S. Pietrobon;R.H. Deng;A. Lafanechere;G. Ungerboeck.
IEEE Transactions on Information Theory (1990)

348 Citations

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings

Robert H. Deng;Jian Weng;Shengli Liu;Kefei Chen.
cryptology and network security (2008)

347 Citations

ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks

Yueqiang Cheng;Zongwei Zhou;Miao Yu;Xuhua Ding.
network and distributed system security symposium (2014)

335 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Robert H. Deng

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 95

Yi Mu

Yi Mu

Fujian Normal University

Publications: 67

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 58

Zheng Yan

Zheng Yan

Xidian University

Publications: 55

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 45

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 43

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 42

Jianying Zhou

Jianying Zhou

Singapore University of Technology and Design

Publications: 42

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 38

Hui Li

Hui Li

Xidian University

Publications: 38

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 37

Thomas E. Saulpaugh

Thomas E. Saulpaugh

Oracle (United States)

Publications: 36

Gregory L. Slaughter

Gregory L. Slaughter

Oracle (United States)

Publications: 36

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 32

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 30

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 30

Trending Scientists

Jean Bézivin

Jean Bézivin

French Institute for Research in Computer Science and Automation - INRIA

Gun-Woo Moon

Gun-Woo Moon

Korea Advanced Institute of Science and Technology

Fatih G. Sen

Fatih G. Sen

Argonne National Laboratory

Mohammad Jahazi

Mohammad Jahazi

École de Technologie Supérieure

Nicholas D. Spencer

Nicholas D. Spencer

ETH Zurich

Michael J. Hoffmann

Michael J. Hoffmann

Karlsruhe Institute of Technology

Catherine Picart

Catherine Picart

Centre national de la recherche scientifique, CNRS

Derek C. Sinclair

Derek C. Sinclair

University of Sheffield

Judith Klumperman

Judith Klumperman

Utrecht University

Sophie Matheron

Sophie Matheron

Université Paris Cité

Gaël Durand

Gaël Durand

Grenoble Alpes University

Mark A. Kramer

Mark A. Kramer

Boston University

Carol Gilligan

Carol Gilligan

New York University

Paul F. Engstrom

Paul F. Engstrom

Fox Chase Cancer Center

Peter Sleegers

Peter Sleegers

University of Twente

Subhash C. Sharma

Subhash C. Sharma

Southern Illinois University Carbondale

Something went wrong. Please try again later.