Deng, Robert Huijie
146  results:
Search for persons X
?
1

Privacy-Preserving Remote User Authentication with k-Times ..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
Tian, Yangguang ; Li, Yingjiu ; Sengupta, Binanda... - p. 647-657 , 2019
 
?
2

Trustworthy Authentication on Scalable Surveillance Video w..:

Wei, Zhuo ; Yan, Zheng ; Wu, Yongdong.
ACM Transactions on Multimedia Computing, Communications, and Applications.  12 (2016)  4s - p. 1-20 , 2016
 
?
3

Trustworthy Authentication on Scalable Surveillance Video w..:

Wei, Zhuo ; Yan, Zheng ; Wu, Yongdong.
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM).  12 (2016)  4s - p. 1-20 , 2016
 
?
5

Expressive search on encrypted data:

, In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security,
Lai, Junzuo ; Zhou, Xuhua ; Deng, Robert Huijie.. - p. 243-252 , 2013
 
?
6

Remote attestation on program execution:

, In: Proceedings of the 3rd ACM workshop on Scalable trusted computing,
Gu, Liang ; Ding, Xuhua ; Deng, Robert Huijie.. - p. 11-20 , 2008
 
?
7

Publicly verifiable ownership protection for relational dat..:

, In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security,
Li, Yingjiu ; Deng, Robert Huijie - p. 78-89 , 2006
 
?
 
?
13

Authorized Keyword Search on Encrypted Data:

SHI, Jie ; Lai, Junzuo ; LI, Yingjiu..
https://ink.library.smu.edu.sg/sis_research/2602.  , 2014
 
?
15

Android or iOS for Better Privacy Protection?:

Han, Jin ; Yan, Qiang ; GAO, Debin..
https://ink.library.smu.edu.sg/sis_research/2632.  , 2014
 
1-15