Chunming Rong

Orcid: 0000-0002-8347-0539

According to our database1, Chunming Rong authored at least 209 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Equipping computational pathology systems with artifact processing pipelines: a showcase for computation and performance trade-offs.
BMC Medical Informatics Decis. Mak., December, 2024

Genetic Algorithm Empowering Unsupervised Learning for Optimizing Building Segmentation from Light Detection and Ranging Point Clouds.
Remote. Sens., October, 2024

Profit-Aware Cooperative Offloading in UAV-Enabled MEC Systems Using Lightweight Deep Reinforcement Learning.
IEEE Internet Things J., June, 2024

FedShift: Tackling Dual Heterogeneity Problem of Federated Learning via Weight Shift Aggregation.
CoRR, 2024

Towards Privacy-, Budget-, and Deadline-Aware Service Optimization for Large Medical Image Processing across Hybrid Clouds.
CoRR, 2024

Building Precision: Efficient Encoder-Decoder Networks for Remote Sensing Based on Aerial RGB and LiDAR Data.
IEEE Access, 2024

PriCE: Privacy-Preserving and Cost-Effective Scheduling for Parallelizing the Large Medical Image Processing Workflow over Hybrid Clouds.
Proceedings of the Euro-Par 2024: Parallel Processing, 2024

2023
Load Balancing for Multiedge Collaboration in Wireless Metropolitan Area Networks: A Two-Stage Decision-Making Approach.
IEEE Internet Things J., October, 2023

Time Controlled Expressive Predicate Query With Accountable Anonymity.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training.
IEEE Trans. Inf. Forensics Secur., 2023

Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer.
IEEE Trans. Cloud Comput., 2023

Joint Trajectory and Energy Consumption Optimization Based on UAV Wireless Charging in Cloud Computing System.
IEEE Trans. Cloud Comput., 2023

Resource Allocation With Workload-Time Windows for Cloud-Based Software Services: A Deep Reinforcement Learning Approach.
IEEE Trans. Cloud Comput., 2023

Precision in Building Extraction: Comparing Shallow and Deep Models using LiDAR Data.
CoRR, 2023

A Comprehensive Study on Dataset Distillation: Performance, Privacy, Robustness and Fairness.
CoRR, 2023

Welcome Message from the General Chairs.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2023

pFedV: Mitigating Feature Distribution Skewness via Personalized Federated Learning with Variational Distribution Constraints.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Solving Nonlinear Conservation Laws of Partial Differential Equations Using Graph Neural Networks.
Proceedings of the 2023 Northern Lights Deep Learning Workshop, 2023

A Survey on Dataset Distillation: Approaches, Applications and Future Directions.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Towards a Privacy-Preserving Distributed Cloud Service for Preprocessing Very Large Medical Images.
Proceedings of the IEEE International Conference on Digital Health, 2023

Flexible and Secure Code Deployment in Federated Learning using Large Language Models: Prompt Engineering to Enhance Malicious Code Detection.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

An Isolation-aware Online Virtual Network Embedding via Deep Reinforcement Learning.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
NttpFL: Privacy-Preserving Oriented No Trusted Third Party Federated Learning System Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., December, 2022

DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022

Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control With Reinforcement Learning.
IEEE Trans. Cloud Comput., 2022

Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems.
Peer-to-Peer Netw. Appl., 2022

OpenIaC: open infrastructure as code - the network is my computer.
J. Cloud Comput., 2022

Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.
Comput. J., 2022

Quantifying the effect of color processing on blood and damaged tissue detection in Whole Slide Images.
Proceedings of the 14th IEEE Image, Video, and Multidimensional Signal Processing Workshop, 2022

Blockchain Empowered and Self-sovereign Access Control System.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

Managing Digital Objects with Decentralised Identifiers based on NFT-like schema.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

Blockchain-based Cross-organizational Workflow Platform.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

NFT as a proof of Digital Ownership-reward system integrated to a Secure Distributed Computing Blockchain Framework.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

2021
Blockchain Based Transaction System with Fungible and Non-Fungible Tokens for a Community-Based Energy Infrastructure.
Sensors, 2021

Welcome to the new Journal of Cloud Computing by Springer.
J. Cloud Comput., 2021

Towards General Deep Leakage in Federated Learning.
CoRR, 2021

A Survey of Decentralizing Applications via Blockchain: The 5G and Beyond Perspective.
IEEE Commun. Surv. Tutorials, 2021

IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications.
IEEE Access, 2021

An Ensemble Approach for Multi-Step Ahead Energy Forecasting of Household Communities.
IEEE Access, 2021

Optimized Federated Learning on Class-Biased Distributed Data Sources.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2021

DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities.
Proceedings of the EASE 2021: Evaluation and Assessment in Software Engineering, 2021

Anomaly Detection in Smart Meter Data for Preventing Potential Smart Grid Imbalance.
Proceedings of the AICCC 2021: 4th Artificial Intelligence and Cloud Computing Conference, Kyoto, Japan, December 17, 2021

2020
Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Efficient Regular Language Search for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Efficient Traceable Authorization Search System for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services.
IEEE Internet Things J., 2020

QHSE: An efficient privacy-preserving scheme for blockchain-based transactions.
Future Gener. Comput. Syst., 2020

Fog Computing for Realizing Smart Neighborhoods in Smart Grids.
Comput., 2020

PSO-GA-Based Resource Allocation Strategy for Cloud-Based Software Services With Workload-Time Windows.
IEEE Access, 2020

Adaptive Resource Allocation and Consolidation for Scientific Workflow Scheduling in Multi-Cloud Environments.
IEEE Access, 2020

Blockchain based Power Transaction Asynchronous Settlement System.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Improving Load Forecast Accuracy of Households Using Load Disaggregation Techniques.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

RenewLedger : Renewable energy management powered by Hyperledger Fabric.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Distributed computational framework in TOTEM architecture enabled by blockchain.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Distributed Fog Computing Architecture for Real-Time Anomaly Detection in Smart Meter Data.
Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, 2020

2019
A Markov Random Field Based Approach for Analyzing Supercomputer System Logs.
IEEE Trans. Cloud Comput., 2019

Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures.
Sensors, 2019

Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019

A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond.
IEEE Internet Things J., 2019

Foreword to the special issue of green cloud computing: Methodology and practice.
Concurr. Comput. Pract. Exp., 2019

Advancing Deep Learning to Improve Upstream Petroleum Monitoring.
IEEE Access, 2019

DBFT: A Byzantine Fault Tolerant Protocol with Graceful Performance Degradation.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Neural Network Architectures for Electricity Consumption Forecasting.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Neural Network Frameworks. Comparison on Public Transportation Prediction.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019

Transactive Energy on Hyperledger Fabric.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

TOTEM : Token for controlled computation: Integrating Blockchain with Big Data.
Proceedings of the 10th International Conference on Computing, 2019

Evolutionary Ensemble LSTM based Household Peak Demand Prediction.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019

A Cost-efficient Protocol for Open Blockchains.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Evaluating Feature Selection Methods for Short-Term Load Forecasting.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019

2018
An efficient cascaded method for network intrusion detection based on extreme learning machines.
J. Supercomput., 2018

Parallel Blockchain: An Architecture for CPSS-Based Smart Societies.
IEEE Trans. Comput. Soc. Syst., 2018

Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption.
IEEE Access, 2018

Data Recovery and Security in Cloud.
Proceedings of the 9th International Conference on Information, 2018

Improve Security Over Multiple Cloud Service Providers for Resource Allocation.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Secure customer data over cloud forensic reconstruction.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Energy Informatics Applicability; Machine Learning and Deep Learning.
Proceedings of the 2018 IEEE International Conference on Big Data, 2018

2017
Framework for context-aware computation offloading in mobile cloud computing.
J. Cloud Comput., 2017

Adaptive real-time anomaly detection in cloud infrastructures.
Concurr. Comput. Pract. Exp., 2017

Mobile contact synchronous with cloud server.
Appl. Soft Comput., 2017

Ushare: user controlled social media based on blockchain.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Scalable, Efficient Anonymization with INCOGNITO - Framework & Algorithm.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Resource Allocation in Cloud-Based Distributed Cameras.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
ELM-based spammer detection in social networks.
J. Supercomput., 2016

Fast algorithms to evaluate collaborative filtering recommender systems.
Knowl. Based Syst., 2016

Flexible Building Blocks for Software Defined Network Function Virtualization.
EAI Endorsed Trans. Cloud Syst., 2016

Using Spearman's correlation coefficients for exploratory data analysis on big dataset.
Concurr. Comput. Pract. Exp., 2016

Big data and smart computing: methodology and practice.
Concurr. Comput. Pract. Exp., 2016

Enrichment of machine learning based activity classification in smart homes using ensemble learning.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Protein Function Detection Based on Machine Learning: Survey and Possible Solutions.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Smart Home Security Monitor System.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Perfect Gaussian integer sequences from cyclic difference sets.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Securing big data in the Cloud by protected mapping over multiple providers.
Proceedings of the Digital Media Industry & Academic Forum, 2016

SD-HDFS: Secure Deletion in Hadoop Distributed File System.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data.
Int. J. Data Warehous. Min., 2015

A secure user authentication protocol for sensor network in data capturing.
J. Cloud Comput., 2015

Detecting spammers on social networks.
Neurocomputing, 2015

Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

Machine Learning Based Scalable and Adaptive Network Function Virtualization.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2015

AFFM: Auto Feature Engineering in Field-Aware Factorization Machines for Predictive Analytics.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Cross-Device Consumer Identification.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Risk Management Using Big Real Time Data.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Gaussian Mixture Model Based Interest Prediction In Social Networks.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Time Series Similarity Evaluation Based on Spearman's Correlation Coefficients and Distance Measures.
Proceedings of the Cloud Computing and Big Data, 2015

Survey on Software-Defined Networking.
Proceedings of the Cloud Computing and Big Data, 2015

Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model.
Proceedings of the Cloud Computing and Big Data, 2015

2014
A secure many-to-many routing protocol for wireless sensor and actuator networks.
Secur. Commun. Networks, 2014

Architecture-based integrated management of diverse cloud resources.
J. Cloud Comput., 2014

STSHC: secure and trusted scheme for Hadoop cluster.
Int. J. High Perform. Syst. Archit., 2014

A new approach for accurate distributed cluster analysis for Big Data: competitive K-Means.
Int. J. Big Data Intell., 2014

A distributed gaussian-means clustering algorithm for forecasting domestic energy usage.
Proceedings of the International Conference on Smart Computing, 2014

A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Optimization Scheduling for Scientific Applications with Different Priorities across Multiple Clouds.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

R2Time: A Framework to Analyse Open TSDB Time-Series Data in HBase.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Multiple Data Integration Service.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Mobile cloud computing [Guest Editorial].
IEEE Wirel. Commun., 2013

Semantic description of scholar-oriented social network cloud.
J. Supercomput., 2013

Beyond lightning: A survey on security challenges in cloud computing.
Comput. Electr. Eng., 2013

Privacy Preserving Data Analytics for Smart Homes.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Multi-tenant Network Monitoring Based on Software Defined Networking.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

TSHC: Trusted Scheme for Hadoop Cluster.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Competitive K-Means, a New Accurate and Distributed K-Means Algorithm for Large Datasets.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Safer@Home Analytics: A Big Data Analytical Solution for Smart Homes.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Performance Analysis and Optimization of Map Only Left Outer Join.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Resource Pool Oriented Trust Management for Cloud Infrastructure.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Reference deployment models for eliminating user concerns on cloud security.
J. Supercomput., 2012

Preface to special issue on Advances in Cloud Computing.
J. Supercomput., 2012

Purpose Based Access Control for Privacy Protection in E-Healthcare Services.
J. Softw., 2012

Special issue on security in cloud computing.
J. Cloud Comput., 2012

Evaluation of some optimisation techniques for semantic query answering on shared-nothing architecture.
Int. J. Space Based Situated Comput., 2012

A Novel Identity-Based Key Management and Encryption Scheme for Distributed System.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A fast estimation of shortest path distance for power-law network predominant cloud service.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Cluster analysis for the cloud: Parallel Competitive Fitness and parallel K-means++ for large dataset analysis.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A multi-criteria design scheme for service federating inter-cloud applications.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Authenticated health monitoring scheme for wireless body sensor networks.
Proceedings of the 7th International Conference on Body Area Networks, 2012

Performance of Left Outer Join on Hadoop with Right Side within Single Node Memory Size.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Applying SWRL-F to intercloud constraints analysis.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

Intercloud for simulation federations.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

An Initial Survey on Integration and Application of Cloud Computing to High Performance Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Integer Factorization Using Hadoop.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Energy-Aware Task Consolidation Technique for Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Using Mahout for Clustering Wikipedia's Latest Articles: A Comparison between K-means and Fuzzy C-means in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Performance Analysis of Hadoop for Query Processing.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

K-means Clustering in the Cloud - A Mahout Test.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
A novel key pre-distribution scheme for wireless distributed sensor networks.
Sci. China Inf. Sci., 2010

DataStorm.
Proceedings of the 6th World Congress on Services, 2010

SWRL-F - A Fuzzy Logic Extension of the Semantic Web Rule Language.
Proceedings of the 6th International Workshop on Uncertainty Reasoning for the Semantic Web (URSW 2010), 2010

Deployment models: Towards eliminating security concerns from cloud computing.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

An efficient approach to intelligent real-time monitoring using ontologies and Hadoop.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Trusted Data Sharing over Untrusted Cloud Storage Providers.
Proceedings of the Cloud Computing, Second International Conference, 2010

On the Sustainability Impacts of Cloud-Enabled Cyber Physical Space.
Proceedings of the Cloud Computing, Second International Conference, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Performance Considerations of Data Acquisition in Hadoop System.
Proceedings of the Cloud Computing, Second International Conference, 2010

Social Impact of Privacy in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Towards Free Task Overloading in Passive Replication Based Real-time Multiprocessors.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A shadow zone aware routing protocol for acoustic underwater sensor networks.
IEEE Commun. Lett., 2009

Secure many to many routing for wireless sensor and actuator networks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Bayesian Networks for Fault Detection under Lack of Historical Data.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Automatic Web Service Detection in Oil and Gas.
Proceedings of the Communication and Networking, 2009

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Industrial Cloud: Toward Inter-enterprise Integration.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

An Integrated Information Sharing Structure for Resuscitation Data.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Guest Editors' Introduction.
J. Comput. Secur., 2008

Protection against unauthorized access and computer crime in Norwegian enterprises.
J. Comput. Secur., 2008

On Ubiquitous Integrated Computing.
Int. J. Comput. Sci. Appl., 2008

Towards Dataintegration from WITSML to ISO 15926.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

RFID System Security Using Identity-Based Cryptography.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space.
Proceedings of the International Conference on Embedded Software and Systems, 2008

Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Flexible Garbage Collect Algorithm for Flash Storage Management.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Di-GAFR: Directed Greedy Adaptive Face-Based Routing.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

SPM: A Security Policy Based on Micropayment in Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Data Integration in Oil and Gas at Norwegian Continental Shelf.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Electronic Payment Scheme Using Identity-Based Cryptography.
Proceedings of the Public Key Infrastructure, 2007

ZigBee Security Using Identity-Based Cryptography.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Towards Integrated Services for Health Monitoring.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Effective Storage Security in Incompletely Trusted Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Information Security Threats and Access Control Practices in Norwegian Businesses.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A survey of key management in ad hoc networks.
IEEE Commun. Surv. Tutorials, 2006

On Use of Identity-Based Encryption for Secure Emailing.
Proceedings of the SECRYPT 2006, 2006

Securing Web Services Using Identity-Based Encryption (IBE).
Proceedings of the SECRYPT 2006, 2006

Combined Method for Nonlinear Systems of Equations.
Proceedings of the Computational Science, 2006

Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method.
Proceedings of the Computational Science, 2006

On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Analysis of IBS for MANET Security in Emergency and Rescue Operations.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A Scalable Security Architecture for Grid.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Flooding attack on the binding cache in mobile IPv6.
Proceedings of the ICETE 2005, 2005

2003
On-Line E-Wallet System with Decentralized Credential Keepers.
Mob. Networks Appl., 2003

On Probabilistic Scheme for Encryption Using Nonlinear Codes Mapped from ℤ<sub>4</sub> Linear Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Distributed Honeypot System for Grid Security.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
New 3-designs from Goethals codes over <i>Z</i><sub>4</sub>.
Discret. Math., 2001

On <i>t</i>-designs from codes over <i>Z</i><sub>4</sub>.
Discret. Math., 2001

1999
On algebraic decoding of the Z<sub>4</sub>-linear Calderbank-McGuire code.
IEEE Trans. Inf. Theory, 1999

New Families of Almost Perfect Nonlinear Power Mappings.
IEEE Trans. Inf. Theory, 1999

New infinite families of 3-designs from preparata codes over Z<sub>4</sub>.
Discret. Math., 1999

Split Weight Enumerators for the Preparata Codes with Applications to Designs.
Des. Codes Cryptogr., 1999


  Loading...