Robert H. Deng mainly investigates Computer security, Encryption, Cryptography, Computer network and Public-key cryptography. His study explores the link between Computer security and topics such as Proxy that cross with problems in Proxy re-encryption. Robert H. Deng has included themes like Cloud computing and Database in his Encryption study.
His Cloud computing study integrates concerns from other disciplines, such as Distributed computing, Server and Access control. His Cryptography study combines topics in areas such as Security analysis, Data security, Linear code and Digital signature. His work carried out in the field of Computer network brings together such families of science as Certificate and Wireless ad hoc network.
His main research concerns Computer security, Encryption, Computer network, Cryptography and Authentication. His Computer security study combines topics from a wide range of disciplines, such as Server and Internet privacy. His Encryption research incorporates elements of Cloud computing and Theoretical computer science.
Robert H. Deng has researched Cloud computing in several fields, including Security analysis, Homomorphic encryption and Database. His Computer network research is multidisciplinary, incorporating perspectives in Scalability and Distributed computing. His study connects Digital signature and Cryptography.
Robert H. Deng focuses on Encryption, Computer security, Cloud computing, Computer network and Server. His Encryption research is multidisciplinary, incorporating elements of Database and Access control. His study in Computer security is interdisciplinary in nature, drawing from both Android, Correctness and Scalability.
His studies deal with areas such as Data security, Cryptography, Security analysis, Verifiable secret sharing and Information privacy as well as Cloud computing. His research in the fields of Public-key cryptography, Quality of service and Protocol overlaps with other disciplines such as Data sharing. He interconnects Data modeling and Service in the investigation of issues within Server.
Encryption, Cloud computing, Computer security, Server and Information privacy are his primary areas of study. His study in Encryption is interdisciplinary in nature, drawing from both Security analysis, Overhead and Access control. His Cloud computing research includes themes of Homomorphic encryption, Threat model, Database, Cryptography and Computer network.
He works mostly in the field of Computer security, limiting it down to topics relating to Mobile device and, in certain cases, mHealth. His Server research incorporates themes from Data modeling, Service, Correctness, Dynamic data and Echo. The various areas that Robert H. Deng examines in his Information privacy study include Data security, Computation and Information retrieval.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
Zhiguo Wan;Jun'e Liu;R. H. Deng.
IEEE Transactions on Information Forensics and Security (2012)
Attribute-Based Encryption With Verifiable Outsourced Decryption
Junzuo Lai;Robert H. Deng;Chaowen Guan;Jian Weng.
IEEE Transactions on Information Forensics and Security (2013)
Efficient and practical fair exchange protocols with off-line TTP
Feng Bao;R.H. Deng;Wenbo Mao.
ieee symposium on security and privacy (1998)
Public Key Cryptography – PKC 2004
Feng Bao;Robert Deng;Jianying Zhou.
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Cheng-Kang Chu;Sherman S. M. Chow;Wen-Guey Tzeng;Jianying Zhou.
IEEE Transactions on Parallel and Distributed Systems (2014)
Efficient unidirectional proxy re-encryption
Sherman S. M. Chow;Jian Weng;Yanjiang Yang;Robert H. Deng.
international conference on cryptology in africa (2010)
Variations of Diffie-Hellman Problem
Feng Bao;Robert H. Deng;HuaFei Zhu.
international conference on information and communication security (2003)
Trellis-coded multidimensional phase modulation
S.S. Pietrobon;R.H. Deng;A. Lafanechere;G. Ungerboeck.
IEEE Transactions on Information Theory (1990)
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Robert H. Deng;Jian Weng;Shengli Liu;Kefei Chen.
cryptology and network security (2008)
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks
Yueqiang Cheng;Zongwei Zhou;Miao Yu;Xuhua Ding.
network and distributed system security symposium (2014)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: