Chunming Rong

Professor Ph.D

University of  Stavanger Norway

Phone: (+47) 5183 2013

Fax:     (+47) 5183 1750

Email: chunming.rong@uis.no

 

Bio

Experience

Publications

 

BOOKS:

(1)     Erdal Cayirci and Chunming Rong, “SECURITY IN WIRELESS AD HOC, SENSOR AND MESH NETWORKS”, John Wiley & Sons, 2008, ISBN 978-0-470-02748-6.

(2)     George O. M. Yee, Chunming Rong, Laurence Tianruo Yang, Journal of Computer Security, Special issue, Vol. 16, Number 3, 2008, IOS Press,  ISSN 0926-227X .

(3)     Chunming Rong, Martin G. Jaatun, Frode Eika Sandnes, Laurence T.Yang, Jianhua Ma, Lecture Note for Computer Science  Autonomic and Trusted Computing”, Proceedings of 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008,  Springer, ISSN 0302-9743, ISBN 978-3-540-69294-2.

(4)     Frode Eika Sandnes, Yan Zhang, Chunming Rong, Laurence T.Yang, Jianhua Ma, Lecture Note for Computer Science  Ubiquitous Intelligent Computing”, Proceedings of 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Springer, ISSN 0302-9743, ISBN 978-3-540-69292-8.


PATENT in EU:

UK patent No. 0723617.7: Dingyi Pei, Junwu Dong, and Chumming Rong,
Use Rational Normal Curves (RNC) to construct a Key Pre-Distribution (KPD) for Distributed Sensor Networks.

 

INTERNATIONAL JOURNALS AND PREPRINTS

(1)     Dingyi Pei, Junwu Dong, and Chunming Rong, “A novel key pre-distribution scheme for wireless distributed sensor networks”, submitted to IEEE Transactions on Information Theory.

(2)     Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong, Protection against unauthorized access and computer crime in Norwegian enterprises”; in Journal of Computer Security, pp.341-366, ISSN 0926-227X , Vol. 16, Number 3, IOS Press, 2008.

(3)     Kari Anne Haaland Thorsen, and Chunming Rong, “On Ubiquitous Integrated Computing”, in International Journal of Computer Science and Applications, pp. 46-55, Vol. 5, No. 3, 2008, ISSN: 0972-9038.

(4)     Christian Veigner, Chunming Rong, Flooding Attack of the Binding Cache in Mobile IPv6”; in E-business and Telecommunication Networks. Volume III. pp. 187-200. 2007. ISSN 1865-0929. ISBN 9783540759928.

(5)     Geng Yang, Chunming Rong, Jian-gang Sheng, Jiangtao Wang A Novel Approach to Role-Based Access Control”; in Chinese Journal of Electronics (in English), Vol. 16 No. 1, pp. 1-6, 2007.

(6)     Geng Yang, Chunming Rong, Christian Veigner, Jiangtao Wang, Hongbing Cheng, “Identity-Based Key Agreement and Encryption For Wireless Sensor Networks”, in International Journal of Computer Science and Network Security, Vol. 6  No. 5  pp. 182-189, 2006. http://paper.ijcsns.org/07_book/html/200605/200605206.html

(7)     Geng Yang, Jian-gang Sheng, Chunming Rong, “Theoretical Research on Role Based Access Control (in Chinese with English title and abstract); in Journal of Nanjing University  of Posts and Telecommunications (Natural Science), ISSN 1673-5439, Vol.26, No.3, (Sum. No. 104), June 2006.

(8)     Anne Marie Hegland, Eli Winjum, Stig F. Mjølsnes, Chunming Rong, Øivind Kure, Pål Spilling,A Survey of Key Management in ad hoc Networks; in the IEEE Communications Surveys & Tutorials,  ISSN 1553-877X,  pp. 48-66, Vol. 8, No.3, 3rd quarter issue of 2006.

(9)     Kjell Olav Kaland, Chunming Rong, Geng Yang, “An E-Wallet System with Decentralized Management”; Management of E-Commerce and E-Government, Series: Advances in Computation Theory and Practice, ISBN: 1-60021-324-3, by NOVA Science Publisher, New York, 2006

(10) Geng Yang, Chunming Rong and Lei Peng, “A Novel Approach for Redirecting Module in Honeypot Systems”, the Journal of China Universities of Posts and Telecommunications, 12(3): 58-62. 2005.

(11) Geng Yang, Chunming Rong and Daiyue Ping, “A Distributed Honeypots for Grid Security”, Lecture Notes in Computer Science(LNCS) 3032, pp. 1083-1087, Springer, 2004.

(12) Chunming Rong, Geng Yang, “Honeypots in Blackhat Mode and its Implications”;preprint manuscript for Journal of Computer Security.

(13) Geng Yang, Chunming Rong, “An Effective Parallel Algorithm for Solving Nonlinear Systems of Equations Using MPI”; submitted to International Journal of Parallel, Emergent and Distributed Systems.

(14) Geng Yang, Chunming Rong, “Performance Analysis of Partition Algorithms for Parallel Solution of Nonlinear Systems of Equations”; preprint manuscript for Journal of Parallel and Distributed Computing.

(15) Chunming Rong, On Probabilistic Scheme For Encryption Using Nonlinear Codes Mapped from Z4 Linear Codes; In IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - Special issue on Nonlinear Theory and its Applications, Vol.E86-A, No.9, pp.2248-2250, September 2003.

(16) Stig Frode Mjølsnes, Chunming Rong, On-line E-Wallet System with Decentralized Credential Keeper; In ACM Journal Mobile networks & Applications Journal (MONET), special issue on Personal Environment Mobility in Multi-Provider and Multi-Segment Networks, Vol. 8, No. 1, pp.87-99, Feb. 2003.

(17) Tor Helleseth, Chunming Rong, Kyeongcheol Yang, On t-designs from Codes over Z4; In Journal Discrete Mathematics, vol. 238/1-3, pp. 6780, 2001.

(18) Tor Helleseth, Chunming Rong, Kyeongcheol Yang, New 3-Designs from Goethals Codes over Z4; In Journal Discrete Mathematics, vol. 226, pp. 403409, 2001.

(19) Tor Helleseth, Chunming Rong, Daniel Sandberg, New Families of Almost Perfect Nonlinear Power Mappings; In Journal IEEE Trans. on Information Theory, vol. IT-45, no. 2, pp. 475485, March, 1999.

(20) Chunming Rong, Tor Helleseth, Jyrki Lahtonen, On Algebraic Decoding of the Z4-Linear Calderbank-McGuire Code; In Journal IEEE Trans. on Information Theory, vol. IT-45, no. 5, pp. 14231434, July, 1999.

(21) Iwan Duursma, Tor Helleseth, Chunming Rong, Kyeongcheol Yang, Split Weight Enumerators for the Preparata Codes with Applications to Designs; In Journal Designs, Codes and Cryptography, vol. 18, pp. 103124, 1999.

(22) Tor Helleseth, Chunming Rong, Kyeongcheol Yang, New Infinite Families of 3-Designs from Preparata Codes over Z4; In Journal Discrete Mathematics, vol. 195/1-3, pp. 139156, 1999.

(23) Chunming Rong, Tor Helleseth, Use Characteristic Sets to Decode Cyclic Codes up to Actual Minimum Distance; In London Mathematical Society Lecture Note Series 233, pp. 297312, 1996.

INTERNATIONAL CONFERENCE PROCEEDINGS

(1)     A DMR Fair algorithm for real-time scheduler

(2)     Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding

(3)     Yan Liang and Chunming Rong, Strengthen RFID Tags Security Using New Data Structure, in Lecture Note for Computer Science (Springer) – Proc. of  .. (FGCN) 2008, Sanya, China, pp.??-??, ISSN 0302-9743, ISBN 978-3-540-69292-8.

(4)     Tomomi Kawashima, Jianhua Ma, Bernady O. Apduhan, Runhe Huang, Chunming Rong, A System Prototype with Multiple Robots for Finding u-Objects in a Smart Space”, in Proc. ICESS2008 (The 5th International Conference on Embedded Software and Systems), Chengdu, China, July 29-31, 2008,  pp. 229-236, IEEE Computer Society Press, ISBN 978-0-7695-3287-5.

(5)     Kari Anne Haaland Thorsen and Chunming Rong, “Towards Dataintegration from WITSML to ISO 15926”, in Lecture Note for Computer Science (Springer) – Proc. of Ubiquitous Intelligent Computing  (UIC) 2008, Oslo, pp. 626-635, ISSN 0302-9743, ISBN 978-3-540-69292-8.

(6)     Liang Yan and Chunming Rong, RFID System Security Using Identity-Based Cryptography, in Lecture Note for Computer Science (Springer) – Proc. of Ubiquitous Intelligent Computing (UIC) 2008, Oslo, pp.482-489, ISSN 0302-9743, ISBN 978-3-540-69292-8.

(7)     Zhengxin Lu, Chen Huang, Furong Wang and Chunming Rong, SEMAP: Improving Multipath Security based on Attacking Point in Ad Hoc Networks”, in Lecture Note for Computer Science (Springer) – Proc. of Autonomic & Trusted Computing (ATC) 2008, Oslo, pp.134-148, ISSN 0302-9743, ISBN 978-3-540-69294-2.

(8)     Tao Yang, Ye Huang, Jianxin Chen, Geng Yang and Chunming Rong, Di-GAFR: Directed Greedy Adaptive Face-Based Routing, in Lecture Note for Computer Science (Springer) – Proc. of Autonomic and Trusted Computing (ATC) 2008, Oslo, pp. 555-566, ISSN 0302-9743, ISBN 978-3-540-69294-2.

(9)     Furong Wang, Chen Huang, Jing Zhao, and Chunming Rong, “IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks”, in Proc. of AINA 2008, Okinawa, Japan, pp. 978-984, ISSN 1550-445X, ISBN 978-0-7695-3095-6.

(10) Yi Wang, Furong Wang, Chunming Rong, and Sufang Wang, “SPM: A Security Policy Based on Micropayment in Ad Hoc Networks”. The 1st International Workshop on Applications of Ad hoc and Sensor Networks (AASNET2008). AINA 2008, Okinawa, Japan, pp.639-643, ISBN 978-0-7695-3096-3.

(11) Kari Anne Haaland Thorsen, and Chunming Rong, “Data Integration in Oil and Gas at Norwegian Continental Shelf”, The Third International Symposium on Ubiquitous Application & Security Service (UASS2008). AINA 2008, Okinawa, Japan,  pp.1597-1602, ISBN 978-0-7695-3096-3.

(12) Geng Yang; Jiangtao Wang; Hongbing Cheng; Chunming Rong, “An Identity-Based Encryption Scheme for Broadcasting”Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP International Conference on Volume , Issue , 18-21 Sept. 2007 Page(s):123 – 126.

(13) Son Thanh Nguyen, Chunming Rong, Zigbee Security using Identity Based Cryptography; In Lecture Note for Computer Science (Springer Berlin / Heidelberg) – Computer Science – Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11 - 13, 2007, pp. 3-12.

(14) Son Thanh Nguyen, Chunming Rong, Electronic Payment Scheme using Identity-Based Cryptography; In Lecture Note for Computer Science, 4th European PKI Workshop – EuroPKI 2007, Mallorca, Balearic Islands, Spain, June 28 - 30, 2007.

(15) Chunming Rong, Won-Chol Kim, Effective Storage Security in Incompletely Trusted Environment; In Proc. of  the 21th International Conference on Advanced Information Networking and Applications, Workshop SSNDS, 21-23 May, 2007, Niagara Falls, Canada, pp.432-437, ISBN 978-0-7695-2847-2.

(16) Janne Merete Hagen Tormod Kalberg Sivertsen Chunming Rong, Information Security Threats and Access Control Practices in Norwegian Businesses; In Proc. of  the 21th Intl. Conf. on Advanced Information Networking and Applications, Workshop SSNDS, 21-23 May, 2007, Niagara Falls, Canada, pp.470-476. 

(17) Chunming Rong, Hein Meling, Dagfinn Wåge, Towards Integrated Services for Health Monitoring; In Proc. of  the 21th International Conference on Advanced Information Networking and Applications, Workshop SmarTel, 21-23 May, 2007, Niagara Falls, Canada, pp.776-781, ISBN 978-0-7695-2847-2.

(18) Christian Veigner, Chunming Rong, “On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption; In Lecture Note for Computer Science (Springer Berlin / Heidelberg) – Computer Science – Autonomic and Trusted Computing - ISSN 0302-9743 Vol. 4158/2006: 3rd International Conference, ATC 2006, Wuhan, China, September 3 - 6, 2006, Proceedings, pp. 521 - 530.

(19) Christian Veigner, Chunming Rong, On Use of Identity-Based Encryption for Secure Emailing; In SECRYPT 2006: International Conference on Security and Cryptography, Setúbal, Portugal, August 2006, Proceedings, pp. 289 – 296, ISBN: 972-8865-63-5 or 978-972-8865-63-4. Published by the INTICC (Institute for Systems and Technologies of Information, Control and Communication) Press.

(20) Kari Anne Haaland, Chunming Rong, Securing Web Services Using Identity-Based Encryption (IBE); n SECRYPT 2006: International Conference on Security and Cryptography, Setúbal, Portugal, August 2006, Proceedings, pp. 413 – 418, ISBN: 972-8865-63-5 or 978-972-8865-63-4. Published by the INTICC (Institute for Systems and Technologies of Information, Control and Communication) Press.

(21) Peng Jiang, Geng Yang, Chunming Rong, Combined Method for Nonlinear Systems of Equations; In Lecture Note for Computer Science (Springer Berlin / Heidelberg) - Computational Science – ICCS 2006 - ISSN 0302-9743 Vol. 3994/2006: 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV, pp. 693 - 699. ISBN: 3-540-34385-7

(22) Peng Jiang, Geng Yang, Chunming Rong, Performance Analysis of Block Jacobi Preconditioning Technique Based on Block Broyden Method; In Lecture Note for Computer Science (Springer Berlin / Heidelberg) - Computational Science – ICCS 2006 - ISSN 0302-9743 Vol. 3991/2006: 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part I, pp. 794 - 797. ISBN: 3-540-34379-2

(23) Anne Marie Hegland, Eli Winjum, Pal Spilling, Chunming Rong and Øivind Kure, Analysis of IBS for MANET Security in Emergency and Rescure Operations; In Proc. of  the 20th Intl. Conf. on Advanced Information Networking and Applications,  Vol. 2, ISSN 1550-445X, Workshop on Pervasive Computing and Ad Hoc Communications (PCAC 2006), Vienna, Austria, April 2006, Proceedings,  pp. 155-159.

(24) Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong, A Scalable Security Architecture for Grid”; In Proc. of  the 2005 International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Dalian, China, December 2005.

(25) Christian Veigner, Chunming Rong Flooding attack of the binding cache in Mobile IPv6; In Proc. of  the 2nd International Conference on E-Business and Telecommunication Networks (ICETE), Reading, U.K., October 3-7, 2005

(26) Christian Veigner, Chunming Rong, A New Route Optimization Protocol for Mobile IPv6 (ROM); In Proc. of  the International Computer Symposium (ICS) 2004, Taipei, 2004.

(27) Geng Yang, Chunming Rong,Yunping Dai, A Distributed Honeypot System for Grid Security; In Proc. of  the Grid and Cooperative Computing (GCC) 2003, Shanghai, China, 2003.

(28) Chunming Rong, Kjell Olav Kaland, Geng Yang, A E-Wallet System with Decentralized Management; In Proc. of  the International Conference on Management of e-Commerce and e-Government (ICMeCG), Nanchang, China, October, 2003.

(29) Kjell Olav Kaland, Chunming Rong, “Implementing a Online E-Wallet System with Decentralized Credential Keepers”; In Proc. of  the 6th  International Conference on Electronic Commerce Research (ICECR-6),  Dallas, USA, October 2003.

(30) Chunming Rong, Geng Yang, “Honeypots in Blackhat Mode and its Implications”;
In Proc. of  the
2003 International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Chengdu, China, August 2003.

(31) Geng Yang, Chunming Rong, “Performance Analysis of Partition Algorithms for Parallel Solution of Nonlinear Systems of Equations”; In Proc. of  the 2003 International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Chengdu, China, August 2003.

(32) Chunming Rong, On Probabilistic Scheme For Encryption Using Nonlinear Codes Mapped from Z4 Linear Codes; In Proc. of  the 2002 International Symposium on Information Theory and Its Applications (ISITA 2002), Xi’an, China, October 2002.

(33) Chunming Rong, Reggie Davidrajuh, A New Decentralized P2P Architecture Providing User Anonymity by Using Secret Sharing; In Proc. of  the 5th  International Conference on Electronic Commerce Research (ICECR-5),  Montréal, Canada, October 2002.

(34) Reggie Davidrajuh, Chunming Rong, A Methodology for Tactical Design of Virtual Supply Chain for E-Tailing; In Proc. of the 5th  International Conference on Electronic Commerce Research (ICECR-5),  Montréal, Canada, October 2002.

(35) Stig Frode Mjølsnes, Chunming Rong, Localized Credentials for Server Assisted Mobile Wallet; In Proc. ICCNMC’01: 2001 Intl. Conf. on Computer Networks and Mobile Computing, Beijing, China, October 2001.

(36) Tor Helleseth, Chunming Rong, Kyeongcheol Yang, On t-designs from Codes over Z4; In the 3rd Shanghai Conference on Codes, Designs and Finite Geometries, ShanghaiChina, 1999.

(37)  Tor Helleseth, Chunming Rong, Kyeongcheol Yang, Some 3-designs from Goethals Codes over Z4;
In Proc. the II Intl. Workshop on Optimal codes and related topics, Sozopol, Bulgaria, 1998.

(38) Chunming Rong, Tor Helleseth, The Algebraic Decoding of the Z4-Linear Calderbank-McGuire Code; In Proc. ISIT’97: 1997 IEEE Intl. Symposium on Information Theory, pp. 328, Ulm, Germany, 1997.

(39)   Tor Helleseth, P. Vijay Kumar, Chunming Rong, Kyeongcheol Yang,
On Infinite Families of 3-Designs from Preparata Codes and Related Codes over Z4;
In Proc. 35th Annual Allerton Conf. on Communication, Control and Computing, Allerton USA, Sept. 1997.

(40) Chunming Rong, Tor Helleseth, Computational Algorithms for Decoding;
In Abstracts  3rd Intl. Conference on Finite Fields and Applications, Glasgow Scotland, 1995.