Robert H. Deng
Orcid: 0000-0003-3491-8146
According to our database1,
Robert H. Deng
authored at least 590 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2016, "For contributions to security algorithms, protocols and systems".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
IEEE Trans. Knowl. Data Eng., November, 2024
IEEE Trans. Mob. Comput., July, 2024
Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement Learning.
IEEE Trans. Mob. Comput., June, 2024
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024
IEEE Trans. Knowl. Data Eng., April, 2024
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT.
IEEE Internet Things J., April, 2024
IEEE Trans. Ind. Informatics, March, 2024
IEEE/ACM Trans. Netw., February, 2024
PAM<sup>3</sup>S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS.
IEEE/ACM Trans. Netw., February, 2024
IEEE Trans. Knowl. Data Eng., January, 2024
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024
IEEE Trans. Serv. Comput., 2024
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage.
IEEE Trans. Inf. Forensics Secur., 2024
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
IEEE Trans. Inf. Forensics Secur., 2024
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data.
IEEE Trans. Inf. Forensics Secur., 2024
Lightweight Privacy-Preserving Cross-Cluster Federated Learning With Heterogeneous Data.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System.
IEEE Trans. Dependable Secur. Comput., 2024
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2024
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2024
J. Syst. Archit., 2024
IEEE Internet Things J., 2024
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Detecting and Measuring Security Implications of Entangled Domain Verification in CDN.
CoRR, 2024
Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning.
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Reliab., December, 2023
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023
TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET.
IEEE Trans. Veh. Technol., November, 2023
Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries.
ACM Trans. Storage, November, 2023
IEEE Trans. Cybern., November, 2023
Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data.
IEEE Trans. Computers, November, 2023
IEEE Trans. Mob. Comput., August, 2023
IEEE Internet Things J., August, 2023
Privacy-Preserving Ranked Spatial Keyword Query in Mobile Cloud-Assisted Fog Computing.
IEEE Trans. Mob. Comput., June, 2023
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023
LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes.
IEEE Trans. Ind. Informatics, June, 2023
IEEE Trans. Knowl. Data Eng., May, 2023
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing.
IEEE Trans. Knowl. Data Eng., May, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials.
IEEE Trans. Serv. Comput., 2023
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer.
IEEE Trans. Cloud Comput., 2023
Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN.
Knowl. Based Syst., 2023
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability.
J. Parallel Distributed Comput., 2023
A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction.
IEEE Internet Things J., 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
2022
IEEE Trans. Serv. Comput., 2022
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing.
IEEE Trans. Serv. Comput., 2022
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs.
IEEE Trans. Serv. Comput., 2022
ACM Trans. Sens. Networks, 2022
PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022
Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
Guest Editorial: 5G-Enabled Intelligent Application for Distributed Industrial Internet-of-Thing System.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2022
LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.
IEEE Trans. Inf. Forensics Secur., 2022
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering.
IEEE Trans. Dependable Secur. Comput., 2022
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2022
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022
Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification.
Comput. J., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing.
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory.
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2021
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
J. Comput. Secur., 2021
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing.
KSII Trans. Internet Inf. Syst., 2021
Inf. Sci., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability.
IACR Cryptol. ePrint Arch., 2021
ACM Comput. Surv., 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control.
IEEE Trans. Netw. Serv. Manag., 2020
IEEE J. Biomed. Health Informatics, 2020
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.
IEEE Trans. Cloud Comput., 2020
J. Comput. Secur., 2020
Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Int. J. Inf. Sec., 2020
IEEE Secur. Priv., 2020
Cybersecur., 2020
Concurr. Comput. Pract. Exp., 2020
Comput. Secur., 2020
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
IEEE/ACM Trans. Netw., 2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019
IEEE Trans. Big Data, 2019
J. Comput. Sci. Technol., 2019
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin.
J. Comput. Secur., 2019
Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019
IEEE Internet Things J., 2019
SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet Things J., 2019
Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
Comput. Secur., 2019
IEEE Commun. Mag., 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019
2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Smart Grid, 2018
IEEE Trans. Ind. Informatics, 2018
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things.
J. Netw. Comput. Appl., 2018
J. Netw. Comput. Appl., 2018
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management.
Int. J. Inf. Sec., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
Cybersecur., 2018
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the IEEE Global Communications Conference, 2018
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Trans. Serv. Comput., 2017
IEEE Trans. Intell. Transp. Syst., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Dependable Secur. Comput., 2017
Soft Comput., 2017
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications.
Inf. Sci., 2017
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017
IEEE Access, 2017
Proceedings of the A Systems Approach to Cyber Security, 2017
Proceedings of the Provable Security, 2017
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
Trustworthy Authentication on Scalable Surveillance Video with Background Model Support.
ACM Trans. Multim. Comput. Commun. Appl., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Theor. Comput. Sci., 2016
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
Secur. Commun. Networks, 2016
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR, 2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-17503-4, 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Pattern Recognit., 2015
Int. J. Inf. Sec., 2015
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. Secur., 2015
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Inf. Forensics Secur., 2014
Efficient authentication and access control of scalable multimedia streams over packet-lossy networks.
Secur. Commun. Networks, 2014
Multim. Syst., 2014
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks.
J. Comput. Syst. Sci., 2014
Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014
Unforgeability of an improved certificateless signature scheme in the standard model.
IET Inf. Secur., 2014
Comput. Secur., 2014
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02340-8, 2013
IEEE Trans. Multim., 2013
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting.
IEEE Trans. Multim., 2013
ACM Trans. Inf. Syst. Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
A novel service-oriented intelligent seamless migration algorithm and application for pervasive computing environments.
Future Gener. Comput. Syst., 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2012
Signal Process. Image Commun., 2012
Secur. Commun. Networks, 2012
TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications.
Pers. Ubiquitous Comput., 2012
J. Netw. Comput. Appl., 2012
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012
IEICE Trans. Inf. Syst., 2012
Comput. Secur., 2012
Proceedings of the Radio Frequency Identification System Security, 2012
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption.
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2011
Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011
IEEE Trans. Inf. Forensics Secur., 2011
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Secur. Commun. Networks, 2011
J. Internet Serv. Inf. Secur., 2011
Inf. Sci., 2011
Int. J. Inf. Sec., 2011
Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011
Electron. Commer. Res., 2011
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IEEE Trans. Inf. Technol. Biomed., 2010
IEEE Trans. Dependable Secur. Comput., 2010
J. Comput. Sci. Technol., 2010
J. Comput. Sci. Technol., 2010
Inf. Sci., 2010
Int. J. Appl. Cryptogr., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications.
ACM Trans. Multim. Comput. Commun. Appl., 2009
Secur. Commun. Networks, 2009
<i>n</i> PAKE<sup>+</sup>: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection.
Proceedings of the IEEE International Conference on Web Services, 2009
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Security Technology, 2009
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Secur. Commun. Networks, 2008
J. Softw., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Comput. Networks, 2007
Proceedings of the Information Security Practice and Experience, 2007
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems.
Proceedings of the Information Security Practice and Experience, 2007
<i>n</i> PAKE<sup> + </sup>: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
IEEE Trans. Wirel. Commun., 2006
A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Veh. Technol., 2006
IEEE Trans. Dependable Secur. Comput., 2006
IACR Cryptol. ePrint Arch., 2006
Data Knowl. Eng., 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Tailored reversible watermarking schemes for authentication of electronic clinical atlas.
IEEE Trans. Inf. Technol. Biomed., 2005
IEEE Trans. Circuits Syst. Video Technol., 2005
New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures.
IEEE Trans. Computers, 2005
New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures.
IEEE Trans. Computers, 2005
Electron. Colloquium Comput. Complex., 2005
Comput. Networks, 2005
Comput. Networks, 2005
Proceedings of the Internet and Network Economics, First International Workshop, 2005
DoS-resistant access control protocol with identity confidentiality for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Protecting Group Dynamic Information in Large Scale Multicast Groups.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Secure Person-To-Person Communications Based on Biometrics Signals.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004
IEEE Trans. Inf. Technol. Biomed., 2004
IACR Cryptol. ePrint Arch., 2004
New efficient user identification and key distribution scheme providing enhanced security.
Comput. Secur., 2004
Comput. Networks, 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004
2003
IEEE Trans. Consumer Electron., 2003
Flexible authentication of images.
Proceedings of the Visual Communications and Image Processing 2003, 2003
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes.
Informatica (Slovenia), 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Electronic Payment Systems with Fair On-line Verification.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Public Key Cryptography, 2000
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods.
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Web security sourcebook ñ a complete guide to web security threats and solutions; A. D. Rubin, D. Geer, M. J. Ranum.
Comput. Commun., 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation.
Proceedings of the Public Key Cryptography, 1999
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Integrating Security in the CORBA Architecture.
Theory Pract. Object Syst., 1997
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults.
Proceedings of the Security Protocols, 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
1994
IEEE Trans. Inf. Theory, 1994
IEEE Trans. Commun., 1994
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part I: Symmetric systems.
Comput. Commun., 1994
Exact and approximate models to obtain average throughput of the FDDI MAC protocol - Part II: asymmetric systems.
Comput. Commun., 1994
1993
Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels.
IEEE Trans. Commun., 1993
IEEE J. Sel. Areas Commun., 1993
Performance of a token-passing system with batch arrivals and its application to file transfers.
Comput. Commun., 1993
Comput. Commun., 1993
Comput. Networks ISDN Syst., 1993
A Probabilistic Approach to Fault Diagnosis in Linear Lightwave Networks.
Proceedings of the Integrated Network Management III, 1993
1991
Token-passing Systems with Batch Arrivals and their Application to Multimedia File Transfer over Token-ring LANs.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991
Analysis of Token Ring Networks with Both Finite and Infinite Buffer Capacity Stations.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991
1990
1989
Parity retransmission hybrid ARQ using rate 1/2 convolutional codes on a nonstationary channel.
IEEE Trans. Commun., 1989
High rate concatenated coding systems using multidimensional bandwidth-efficient trellis inner codes.
IEEE Trans. Commun., 1989
IEEE Trans. Commun., 1989
1988
1987
IEEE Trans. Commun., 1987