当前位置: X-MOL首页全球导师 国内导师 › 陈晓峰

个人简介

教育经历 1994.09-2000.03:西北大学,数学系(基础数学专业,六年制本硕连读),获理学硕士学位。 2000.03-2003.03:西安电子科技大学,通信工程学院(密码学专业),获工学博士学位。 2003.04-2004.04:韩国,信息与通信大学国际信息安全研究中心,博士后研究。 工作经历 2004.05-2009.03:中山大学,副教授 2009.03-至今:西安电子科技大学,教授 2013.10-2014.01:美国弗吉尼亚理工大学,访问学者 荣誉奖励 国家万人计划科技创新领军人才 教育部“青年长江学者” 网络安全优秀教师奖(2018) 科技部“中青年科技创新领军人才” 教育部“新世纪优秀人才支持计划” 陕西省密码学专业教学团队带头人 西安电子科技大学华山青年学者/华山学者 西安电子科技大学优秀教师(2011);师德先进个人(2016) 陕西省青年科技奖(2016) 中国密码学会密码创新奖(2016) 陕西省高等学校科学技术奖一等奖(2018) 中国密码学会优秀博士学位论文指导教师(2017) 教育部自然科学奖励二等奖、陕西省科学技术奖励自然科学奖二等奖(2019) 课程教学 信息安全专题讨论(研究生)(2018);公钥密码学研究生(2018);应用密码学(2018) 应用密码学(2017);信息安全专题讨论(研究生)(2017) 离散数学(2016);信息安全专题讨论(研究生)(2016) 编码理论新进展(研究生)(2010-2016) 通信网安全与保密(2010-2015) 抽象代数;组合数学与数论;公钥密码学(研究生)(2008) 离散数学(2007);电子商务安全技术;组合数学与数论(2007) 线性代数;电子商务;公钥密码体制的可证明安全性(研究生)(2006) 电子商务;金融密码学(研究生)(2005) 现代密码学(2004) 招生要求欢迎优秀的博士(代数、数论、公钥密码学背景均可)做博士后合作研究 博士研究生:有学术理想;数学和外语基础好;思维活跃,做事有恒心;(学术路漫漫,读博需谨慎!) 硕士研究生:工程背景好,有较强的编程能力;性格开朗,有团队意识;喜欢运动(篮球最好)和音乐(架子鼓最好)。 研究项目 国家"万人计划"科技创新领军人才项目(负责人) 国家自然科学基金重点项目“开放融合环境下密文数据安全服务关键理论与技术”(61960206014)(负责人) 国家自然科学基金项目“云环境中的安全外包计算技术研究”(61572382)(负责人) 国家自然科学基金项目“云计算平台下数据安全的关键密码技术研究”(61272455)(负责人) 国家自然科学基金项目“陷门承诺方案及其应用研究”(60970144)(负责人) 国家自然科学基金项目“保护隐私性的特殊签名技术研究”(60503006)(负责人) 国家自然科学基金项目国际(地区)合作与交流项目“第五届可证明安全性国际会议”(61210306010)(负责人) 国家自然科学基金项目中韩国际合作研究项目“安全电子投票方案的设计”(NSFC—KOSEF)(负责人) “十三五”国家密码发展基金密码理论课题"云外包模式下新型密码理论研究"(负责人) 新世纪优秀人才支持计划(负责人) 教育部博士点基金“基于属性的加密体制及其应用研究”(20130203110004)(负责人) 陕西省自然科学基础研究计划重点项目“云环境下大数据库安全密码关键技术研究”(负责人) 科研团队 谭示崇副教授密码学专业博士 1979年生,籍贯广西贵港;2002年7月毕业于西安电子科技大学通信工程专业,获学士学位;2005年和2009年毕业于西安电子科技大学密码学专业,分别获得密码学硕士和博士学位。2005年3月至今工作于西安电子科技大学,主要研究方向为密码协议和区块链技术。 王剑锋讲师密码学专业博士 1985年生,河北邯郸人,2009年7月毕业于唐山师范学院信息与计算科学专业,获理学学士学位,并获得2009年河北省优秀毕业生称号;2013年3月毕业于西安电子科技大学应用数学专业,获理学硕士位;2016年6月毕业于西安电子科技大学密码学专业,获军事学博士学位。2016年7月至今于西安电子科技大学网络与信息安全学院从事师资博士后研究。主要研究方向为应用密码学及安全云存储。 齐赛宇讲师计算机专业博士 1986年生,2008年毕业于西安交通大学,获计算机科学与技术专业学士学位;2014年毕业于香港科技大学,获计算机科学与工程专业博士学位。现任西安电子科技大学网络与信息安全学院讲师。他的研究兴趣包括应用密码学、云安全、分布式系统和普适计算等;主要研究成果发表在计算机领域权威刊物和会议上(中国计算机学会推荐A类和B类国际期刊和会议),包括IEEETransactionsonDependableandSecureComputing,IEEE/ACMTransactionsonnetworking,IEEETransactionsoncomputer,IEEEINFOCOM,IEEEICDCS,IEEEICNP等。 郭晶晶密码学专业博士生 1988年生河南省修武县人。2008年考入商丘师范学院应用数学专业;2012年考入西安交通大学基础数学专业攻读硕士学位;2015年起在西安电子科技大学攻读博士学位;主要研究方向为密码学。 袁浩然密码学专业博士生 1993年生,陕西渭南人,2011年考入西安邮电大学网络工程专业;2015年考入西安电子科技大学,攻读硕士学位;2017年硕博连读攻读博士学位;目前研究方向:云计算安全,大数据安全。 潘静密码学专业博士 1989年生,云南弥勒人,2008年-2012年就读于西北农林科技大学农学专业,获农学学士学位;2014年-2017年就读于昆明理工大学应用数学专业,获理学硕士学位;从2017年起在西安电子科技大学攻读博士学位,目前主要研究基于格的数字签名及其应用。 沈珺密码学专业博士生 1994年生,江苏省南通市人;2015年毕业于南京信息工程大学软件工程专业,获工学学士学位;2018年毕业于南京信息工程大学计算机科学与技术专业,获工学硕士学位;于2018年起在西安电子科技大学攻读博士学位,目前主要的研究方向为云数据审计和区块链技术。 江雨婷密码学专业博士生 1992年生,四川省成都市人,2013年6月毕业于四川师范大学数学与应用数学专业,获理学学士学位;2018年6月毕业于四川师范大学应用数学专业,获理学硕士学位;2018年9月至今在西安电子科技大学攻读博士学位;目前的主要研究方向:应用密码学、电子现金和以太坊。 曹艳梅密码学专业博士生 1992年生,山西省太谷县人;2015年7月毕业于山西大同大学数学与应用数学专业,获得理学学士学位;2018年7月毕业于西北大学基础数学专业,获得理学硕士学位;将于2019年在西安电子科技大学攻读博士学位;主要研究方向密码学 黄梦蝶网络空间安全专业博士生 1994年生,安徽省蚌埠市人;2017年7月毕业于淮阴工学院通信工程专业,获工学学士学位;2019年7月毕业于中国传媒大学电子与通信工程专业,获工学硕士学位;2019年起在西安电子科技大学攻读博士学位;研究方向为机器学习安全、多媒体安全。 谢意网络空间安全专业直博生 1997年生,安徽池州人,2019年毕业于西安电子科技大学信息安全实验班,获工学学士学位;于2019年9月起在西安电子科技大学攻读博士学位;目前研究方向:机器学习隐私保护、对抗机器学习。 田国华网络空间安全专业博士生 1993年生,陕西省宝鸡市人;2016年毕业于陕西师范大学信息与计算科学专业,获理学学士学位;2019年毕业于西安电子科技大学应用数学专业,获理学硕士学位;2019年起于西安电子科技大学攻读网络空间安全专业博士学位;研究方向为区块链、数据隐私保护等。 合作博士后 出站:齐赛宇习宁赵教练 在站:马旭魏江宏张跃欣 在读硕士研究生 19级:党天然胡云瀚李天赐盛祺天王涛姜安琪龚建鹏闫瑞驰吕春阳原仲豪刘耀田冠杰 18级:王畅王璐璐冯珮柔李瑞阳李昂泰陈羽祺王国强周敬凯 17级:张中俊宿雅萍赵尹源王一凡张夫猷张萌 已毕业学生名单 毕业博士研究生: 12届:张应辉(合作指导) 16届:王剑锋姜涛叶俊 18届:黄慧 19届:张肖瑜王赟玲张志为杨昌松 毕业硕士研究生: 12届:燕斐刘玉定李娟英 13届:党晓刘志强王剑锋赵远杰王星 14届:令狐雄展尤沛张振宇冯岩盛李航李科莹 15届:高雅倩贾红李金洋张少军 16届:陈鹏 17届:王志英邹琴尹梦萍陈平刘劲峰刘子骜倪远聂凯欧冰鹏钱坤 18届:汪园管文浩霍慧霞王晶晶廖飞强李昊轩 学生成果 论文 SCI: XiaoyuZhang,XiaofengChen,JianfengWang,ZhihuiZhan,JinLi,VerifiableandPrivacy-preservingSingle-LayerPerceptronTrainingSchemeinCloudComputing,SoftComputing,2018. HuiHuang,XiaofengChen,QianhongWu,XinyiHuang,JianShen,Bitcoin-basedFairPaymentsforOutsourcingComputationsofFogDevices,FutureGenerationComputerSystems,78:850-858,2018. ChangsongYang,XiaofengChen,YangXiang,Blockchain-basedpubliclyverifiabledatadeletionschemeforcloudstorage,JournalofNetworkandComputerApplications,103:185–193,2018. HaoranYuan,XiaofengChen,TaoJiang,XiaoyuZhang,ZhengYanandYangXiang,DedupDUM:SecureandScalableDataDeduplicationWithDynamicUserManagement,InformationScience,2018. TaoJiang,XiaofengChen,JianfengMa,PublicIntegrityAuditingforSharedDynamicCloudDatawithGroupUserRevocation,IEEETransactionsonComputers,65(8):2363-2373(2016). ZhiweiZhang,XiaofengChen,JianfengMa,JianShen,SLDS:Secureandlocation-sensitivedatasharingschemeforcloud-assistedCyber-PhysicalSystems,FutureGenerationComputerSystems,2018. ZhiweiZhang,XiaofengChen,JinLi,XiaolingTao,JianfengMa,HVDB:ahierarchicalverifiabledatabaseschemewithscalableupdates,JournalofAmbientIntelligenceandHumanizedComputing,2018. FeiqiangLiao,JianfengWang,JianShen,BCDP:ABlockchain-basedCredibleDataPublishingSystem,JournalofInternetTechnology,2018. XiaoyuZhang,TaoJiang,Kuan-ChingLi,AnielloCastiglione,XiaofengChen,NewPubliclyVerifiableComputationforBatchMatrixMultiplication,InformationSciences,2017. JinfengLiu,JianfengWang,XiaolingTao,JianShen,Securesimilarity-basedclouddatadeduplicationinUbiquitouscity,PervasiveandMobileComputing,41:231-242(2017). JunYe,JianfengWang,JiaolianZhao,JianShen,Kuan-ChingLi,Fine-grainedsearchableencryptioninmulti-usersetting,SoftComput.21(20):6201-6212(2017). JianfengWang,XiaofengChen,JinLi,KamilKluczniak,MiroslawKutylowski,TrDup:enhancingsecuredatadeduplicationwithusertraceabilityincloudcomputing,IJWGS13(3):270-289(2017). JianfengWang,XiaofengChen,JinLi,JiaolianZhao,JianShen,Towardsachievingflexibleandverifiablesearchforoutsourceddatabaseincloudcomputing,FutureGenerationComp.Syst.67:266-275(2017). TaoJiang,XiaofengChen,QianhongWu,JianfengMa,WillySusilo,WenjingLou,SecureandEfficientCloudDataDeduplicationwithRandomizedTag,IEEETransactionsonInformationForensicsandSecurity,12(3):532-543(2017). JunYe,JianfengWang,JiaolianZhao,Fine-grainedSearchableEncryptioninMulti-userSetting,SoftComputing,21(20),pp.6201-6212,2017. YinghuiZhang,XiaofengChen,JinLi,DuncanS.Wong,HuiLi,IlsunYou,Ensuringattributeprivacyprotectionandfastdecryptionforoutsourceddatasecurityinmobilecloudcomputing,InformationScience,379:42-61(2017). YinghuiZhang,JinLi,DongZheng,XiaofengChen,HuiLi,Towardsprivacyprotectionandmaliciousbehaviortraceabilityinsmarthealth,PersonalandUbiquitousComputing,21(5):815-830(2017). YuanWang,MeixiaMiao,JianShen,JianfengWang,TowardsEfficientPrivacy-preservingEncryptedImageSearchinCloudComputing,SoftComputing,2017. JinfengLiu,JianfengWang,XiaolingTao,JianShen,Securesimilarity-basedclouddatadeduplicationinUbiquitouscity[J],Pervasive&MobileComputing,2017. QinZou,JianfengWang,JunYe,Efficientandsecureencryptedimagesearchinmobilecloudcomputing[J].SoftComputing,2016:1-11. JunYe,XiaofengChen,JianfengMa,Improvedalgorithmforsecureoutsourcingofmodularexponentiationswithhighcheckability,InternationalJournalofAdHocandUbiquitousComputing,23(3/4):182-191(2016). JianfengWang,MeixiaMiao,YaqianGao,XiaofengChen,Enablingefficientapproximatenearestneighborsearchforoutsourceddatabaseincloudcomputing,SoftComput,20(11):4487-4495(2016). YinghuiZhang,DongZheng,XiaofengChen,JinLi,HuiLi,Efficientattribute-baseddatasharinginmobileclouds,PervasiveandMobileComputing,28:135-149(2016). YinghuiZhang,JinLi,XiaofengChen,HuiLi,Anonymousattribute-basedproxyre-encryptionforaccesscontrolincloudcomputing,SecurityandCommunicationNetworks,9(14):2397-2411(2016). PengChen,JunYe,XiaofengChen,Efficientrequest-basedcomparableencryptionschemebasedonslidingwindowmethod,SoftComputing,20(11):4589-4596(2016). JianfengWang,XiaofengChen,XinyiHuang,IlsunYou,andYangXiang,VerifiableAuditingforOutsourcedDatabaseinCloudComputing,IEEETransactionsonComputers,64(11):3293-3303,2015. TaoJiang,XiaofengChen,JinLi,DuncanS.Wong,JianfengMa,JosephK.Liu,Towardssecureandreliablecloudstorageagainstdatare-outsourcing,FutureGenerationComputerSystems,52:86-94(2015). YanshengFeng,HuaMa,XiaofengChen,EfficientandVerifiableOutsourcingSchemeofSequenceComparisons,IntelligentAutomation&SoftComputing,21(1):51-63(2015). YinghuiZhang,XiaofengChen,JinLi,HuiLi,GenericconstructionforsecureandefficienthandoffauthenticationschemesinEAP-basedwirelessnetworks,ComputerNetworks,75:192-211(2014). JianfengWang,HuaMa,QiangTang,JinLi,HuiZhu,SiqiMa,XiaofengChen,EfficientVerifiableFuzzyKeywordSearchOverEncryptedDatainCloudComputing,ComputerSciencesandInformationSystems,Vol.10,No.2,667-684,2013. EI: HaoxuanLi,HuiHuang,ShichongTan,NingZhang,XiaotongFu,XiaolingTao,ANewRevocableReputationEvaluationSystemBasedonBlockchain,InternationalJournalofHighPerformanceComputingandNetworking,2018. JingjingWang,XiaoyuZhang,XiaolingTao,JianfengWang,EPSLP:Efficientandprivacy-preservingsingle-layerperceptronlearningincloudcomputing,JournalofHighSpeedNetworks,2018. WenhaoGuan,YunLingWang,JianfengWang,XiaotongFu,VerifiableMemoryLeakage-ResilientDynamicSearchableEncryption,JournalofHighSpeedNetworks,24(3):201-217(2018). JunYe,MeixiaMiao,PengChen,XiaofengChen,Comparableencryptionschemesupportingmultipleusersincloudcomputing,InternationalJournalofHighPerformanceComputingandNetworking,11(1):24-33(2018). XiaoyuZhang,TaoJiang,Kuan-ChingLi,XiaofengChen,NewPubliclyVerifiableComputationforBatchMatrixMultiplication,InternationalConferenceonGreen,Pervasive,andCloudComputing,53-65,2017. ZiaoLiu,TaoJiang,XiaolingTao,AResultCorrectnessVerificationMechanismforCloudComputingBasedonMapReduce,InternationalJournalofEmbeddedSystems,2017. PingChen,ZhiyingWang,XiaolingTao,ANewEfficientPrivacy-PreservingDataPublish-SubscribeScheme,InternationalJournalofEmbeddedSystems,2017. BingpengOu,JingjingGuo,XiaolingTao,Anefficientprivacy-preservingfriendship-basedrecommendationsystem,InternationalJournalofEmbeddedSystems,2017. KunQian,HuiHuang,Anewidentity-basedpublicauditingagainstmaliciousauditorinthecloud,InternationalJournalofEmbeddedSystems(IJES),2017. KaiNie,YunlingWang,XiaolingTao,Efficientpubliclyverifiableconjunctivekeywordsearchoverencrypteddataincloudcomputing,InternationalJournalofEmbeddedSystems,2017. ZhiyingWang,JunYe,JianfengWang,Anefficienttraceabledatasharingschemeincloudcomputingformobiledevices,Int.J.HighPerformanceComputingandNetworking,2017. YunlingWang,JianfengWang,Shi-FengSun,XiaofengChen,JosephK.Liu,WillySusilo,XiaofengChen,TowardsMulti-userSearchableEncryptionSupportingBooleanQueryandFastDecryption,ProvSec2017:24-38. JianfengWang,XiaofengChen,EfficientandSecureStorageforOutsourcedData:ASurvey,DataScienceandEngineering,1(3):178-188(2016). TaoJiang,XiaofengChen,QianhongWu,JianfengMa,WillySusilo,WenjingLou,TowardsEfficientFullyRandomizedMessage-LockedEncryption,ACISP(1)2016:361-375. YuanNi,ZhiweiZhang,XiaolingTao,ANewSchemeforImprovingtheUtilizationofNested-cloudResources,InternationalJournalofEmbeddedSystems,2016. YinghuiZhang,JinLi,DongZheng,XiaofengChen,HuiLi,AccountableLarge-UniverseAttribute-BasedEncryptionSupportingAnyMonotoneAccessStructures,ACISP,(1)2016:509-524. YunlingWang,JianfengWang,XiaofengChen,SecureSearchableEncryption:ASurvey,JournalofCommunicationsandInformationNetworks,2016,1(4):52-65. ChangsongYang,JunYe,SecureandEfficientFine-GrainedDataAccessControlSchemeinCloudComputing,JournalofHighSpeedNetworks,21(4):259-271,2015. JinyangLi,JunYe,SecureOutsourcingofMultipleModularExponentiations,IEEE,InternationalConferenceonAdvancedInformationNETWORKINGandApplications.IEEE,2015:808-811. PengChen,JunYe,XiaofengChen,ANewEfficientRequest-BasedComparableEncryptionScheme,AINAWorkshops2015:436-439. JunYe,JianfengWang,SecureOutsourcingofModularExponentiationwithSingleUntrustedServer,The18thInternationalConferenceonNetwork-BasedInformationSystems,September2-4,Taipei,Taiwan,pp.643-645,2015. JunYe,XiaofengChen,JianfengMa,AnImprovedAlgorithmforSecureOutsourcingofModularExponentiations,AINAWorkshops2015:73-76. JunYe,MeixiaMiao,PengChen,XiaofengChen,Request-BasedComparableEncryptionSchemewithMultipleUsers,BWCCA2015:414-416. JianfengWang,XiaofengChen,JinLi,KamilKluczniak,MiroslawKutylowski,ANewSecureDataDeduplicationApproachSupportingUserTraceability,BWCCA2015:120-124. TaoJiang,XiaofengChen,JinLi,DuncanS.Wong,JianfengMa,JosephK.Liu,TIMER:SecureandReliableCloudStorageagainstDataRe-outsourcing,ISPEC2014:346-358. TaoJiang,XiaofengChen,JinLi,JianfengMa,M-SRS:SecureandTrustworthyMobileServiceReviewSystemBasedonMobileCloudlet,ICT-EurAsia2014:612-621. ZhenyuZhang,WujunZhang,JianfengWang,XiaofengChen,AnEffectiveCloud-BasedActiveDefenseSystemagainstMaliciousCodes,ICT-EurAsia2014:690-695. YinghuiZhang,DongZheng,XiaofengChen,JinLi,HuiLi,ComputationallyEfficientCiphertext-PolicyAttribute-BasedEncryptionwithConstant-SizeCiphertexts,ProvSec2014:259-273. YaqianGao,MeixiaMiao,JianfengWang,XiaofengChen,SecureApproximateNearestNeighborSearchoverEncryptedData,InternationalConferenceonBroadband,WirelessComputing,CommunicationandApplications,2014:578-583. ShaojunZhang,PengChen,JianfengWang.Online/Offlineattributebasedsignature,BWCCA,2014.116:566-571. FeiYan,XiaofengChen,YinghuiZhang,Efficientonline/offlinesigncryptionwithoutkeyexposure,InternationalJournalofGridandUtilityComputing,4(1):85-93(2013). YinghuiZhang,XiaofengChen,HuiLi,Key-EvolvingHierarchicalID-BasedSigncryption,Comput.J.56(10):1228-1248(2013). YinghuiZhang,XiaofengChen,JinLi,DuncanS.Wong,HuiLi,Anonymousattribute-basedencryptionsupportingefficientdecryptiontest,AsiaCCS2013:511-516. YinghuiZhang,XiaofengChen,JinLi,HuiLi,FenghuaLi,FDR-ABE:Attribute-BasedEncryptionwithFlexibleandDirectRevocation,INCoS2013:38-45. YanshengFeng,HuaMa,XiaofengChen,HuiZhu,SecureandVerifiableOutsourcingofSequenceComparisons,ICT-EurAsia2013:243-252. JianfengWang,XiaofengChen,HuaMa,QiangTang,JinLi,HuiZhu,AVerifiableFuzzyKeywordSearchOverEncryptedData,JournalofInternetServicesandInformationSecurity,2(1/2),49-58,2012. JianfengWang,HuaMa,QiangTang,JinLi,HuiZhu,SiqiMa,XiaofengChen,ANewEfficientVerifiableFuzzyKeywordSearchScheme,JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,4(3),61-71,2012. YuanjieZhao,XiaofengChen,HuaMa,QiangTang,HuiZhu,ANewTrapdoor-indistinguishablePublicKeyEncryptionwithKeywordSearch,JournalofWirelessMobileNetworks,UbiquitousComputingandDependableApplications,3(1/2),72-81,2012. 奖励 2018张肖瑜,袁浩然,杨昌松获得网络安全奖学金 2017王剑锋博士学位论文被评为2017年中国密码学会优秀博士学位论文 2017邹琴,倪远,刘劲峰毕业论文被评为优秀硕士学位论文 2015王剑锋论文ANewSecureDataDeduplicationApproachSupportingUserTraceability被评为BWCCA-2015最佳论文奖 2014姜涛论文TIMER:SecureandReliableCloudStorageagainstDataRe-outsourcing被评为ISPEC-2014最佳学生论文奖 2015杨昌松获得硕士国家奖学金 2015邹琴获得硕士国家奖学金 2014陈鹏获得硕士国家奖学金 2014王剑锋获得博士国家奖学金 2017张树理,尚晶,都林,邱震尧获得优秀研究生荣誉称号 2017廖飞强,汪园,霍慧霞获得优秀研究生荣誉称号 2016邹琴,倪远获得优秀研究生荣誉称号 2015杨昌松获得优秀研究生荣誉称号 2014王剑锋获得优秀研究生荣誉称号 2017袁浩然,廖飞强,张心语获得2017年第三届全国密码技术竞赛二等奖 2017郭晶晶,翁晨凯,叶柏威获得2017年第三届全国密码技术竞赛三等奖 2017张中俊,宿雅萍,张萌获得2017年第三届全国密码技术竞赛三等奖 2017尚晶,都林,邱震尧获得2017年第三届全国密码技术竞赛三等奖 2018袁浩然,廖飞强获得竞赛与科技创新奖学金 2018张肖瑜获得学校单项奖学金 2018张萌,宿雅萍获得2017级硕士研究生“青衿计划”奖学金 2017王剑锋获得“第十届全国大学生信息安全竞赛”优秀指导教师奖 2017王剑锋获得“第三届全国密码技术竞赛”优秀指导教师奖 密码链接 密码学会议(纯属个人观点。如有巧合,不胜荣幸;如不认同,欢迎来电来函洽谈。) 1.密码学中最著名的会议当属国际密码学协会(IACR)所资助的三大会:Crypto,Eurocrypt,Asiacrypt。即所谓的美密会,欧密会,亚密会。密码学中最重要的最好的文章一般都在这三个会议中。 2.国际密码学协会除了资助三大会以外,还资助了几个Workshop(有的也已经变成Conference):PublicKeyCryptography(PKC),FastSoftwareEncryption(FSE),CryptographicHardwareandem[ant]beddedSystems(CHES),TheoryofCryptographyConference(TCC)等。PKC主要接受与公钥体制相关的文章,FSE和CHES主要接受对称体制相关的文章,分别偏重软件和硬件。TCC是2005年开始的一个会议,主要接受密码学理论和基础的文章,非常难中。此外还有一些较好的会议如CT-RSA,FinancialCryptographyandDataSecurity(FC)等。其中CT-RSA是RSA会议中密码学理论(CryptographyTheory)的子会议,由RSA公司资助。FC由国际金融密码协会(IFCA)资助,主要接受与金融密码学相关的文章。 PKC:focusingonallaspectsofpublic-keycryptography. FastSoftwareEncryption:concentratesonfastandsecureprimitivesforsymmetriccryptography,includingthedesignandanalysisofblockciphers,streamciphers,encryptionschemes,analysisandevaluationtools,hashfunctions,andmessageauthenticationcodes. CryptographicHardwareandembeddedSystems:onallaspectsofcryptographichardwareandsecurityinembeddedsystems. TheoryofCryptographyConference:dealswiththeparadigms,approachesandtechniquesusedtoconceptualize,defineandprovidesolutionstonaturalcryptographicproblems. 3.首先包括一些历史悠久的密码会议如澳大利亚密码会(ACISP),印度密码会(Indocrypt),韩国密码会(ICISC),ICICS,InformationSecurityConference(ISC),SelectedAreasinCryptography(SAC),SecurityandCryptographyforNetworks(formlySecurityinCommunicationNetworks:SCN),ACNS。最近的有马来西亚密码会(Mcrypt),越南密码会(Vietcrypt),CANS,IPSEC,Inscrypt(formlyCISC),ProvSec等。还有很多的会议不能一一列出。值得一提的是Inscrypt是信息安全国家重点实验室发起的在中国举办的LNCS出版的密码年会。还有两个信息安全会议也是非常难中(五星级): 1.IEEESymposiumonSecurityandPrivacy:computersecurityandelectronicprivacy. 2.ACMComputerandCommunicationsSecurityConference:academiaandindustrypresentingnovelresearchonalltheoreticalandpracticalaspectsofcomputersecurity LinksonCryptographyandInformationSecurity: IACRCryptologyePrintArchive:http://eprint.iacr.org/ Cryptologypointers:http://kodu.ut.ee//-lipmaa/crypto/ ECC(StevenGalbraith):http://www.isg.rhul.ac.uk/~sdg/ecc.html BibliographyonDigitalSignatures(GuilinWang):http://icsd.i2r.a-star.edu.sg/staff/guilin/bible.htm sci.cryptByThread:http://www.derkeiler.com/Newsgroups/sci.crypt/2003-12/ RivesthotlinksonCryptography:http://people.csail.mit.edu/rivest/crypto-security.html ResearchInstitute: CryptologyandInformationSecurityLaboratoryatKAIST:http://caislab.kaist.ac.kr/ I2RSystems&SecurityDepartment:http://icsd.i2r.a-star.edu.sg/ RSA:http://www.rsa.com/ TheAppliedCryptoGroupatStanfordUniversity:http://crypto.stanford.edu/ UCLCryptoGroup:http://www.dice.ucl.ac.be/crypto/ IBMresearch:http://www.ibm.com/us/en/ UniversityofWaterloo:http://www.cacr.math.uwaterloo.ca/ StateKeyLaboratoryOfInformationSecurity(SKLOIS):http://www.lois.cn/ GuangdongKeyLaboratoryofInformationSecurityTechnology:http://ist.sysu.edu.cn/ TrustedDigitalTechnologyLaboratory:http://tdt.sjtu.edu.cn/ JournalsonCryptographyandInformationSecurity: ACMTransactionsonComputerSystems ACMTransactionsonInformationandSystemSecurity CommunicationsoftheACM ComputerCommunications Computers&Security Designs,CodesandCryptography IEEEProceeedingsInformationSecurity IEEESecurity&Privacy IEEETransactionsonDependableandSecureComputing IEEETransactionsonInformationForensicsandSecurity IEEETransactionsonParallelandDistributedSystems IEEETransactionsonComputers IEEETransactionsonServiceComputing IEEETransactionsonCloudComputing InformationProcessingLetters InternationalJournalofAppliedCryptography InternationalJournalofInformationSecurity JournaloftheACM JournalofComputerSecurity JournalofCryptology http://www.elsevier.com(InformationComputation;JournalofSystemandsoftware,etc.) JournalofInformationAssuranceandSecurity JournalofMathematicalCryptology SIAMJournalonComputing Others: SCI:http://www.medsci.cn/sciif.asp 人在江湖 午夜惊魂-MyLovelyWife 昨日,我参加了一个电影拍摄,我是男主角。 晚上讨论结束后,我回家,发现忘带钥匙。在楼下按门铃,无人,能听见屋内有收音机的声音。于是让4楼人开防盗门上楼。敲门良久,无人。我怀疑我老婆去方国家,打方国电话,他与他老婆两个人电话都关机。我用逻辑推测,我老婆没去他们家。 复上楼,敲门,声音很大。无人。对门男主人开门,问我要不要帮助,我说不用,并感谢。开始擂门,估计全楼人都醒了,无人。我猜老婆出去了?或者…我有些担心,开始踢门。 还是无人应。感谢邻居配合无人骂我。至于是否偷着骂,不能考证。 10分钟!漫长的时间。我开始恐慌!!!! 15分钟,异常恐慌!对门男主人一直好心陪我。 决定先不报警! 我右脚支撑,左脚抬起,施展陈家独门无影脚,连踢数脚,门被踏开,锁子被踏飞。 卧室的门还被插着,不能开!!!!!!我恐慌到极点,施展少林大力金刚腿,一脚踹开门。 收音机还在响!! 我老婆仍在熟睡! God!!!!!! 我施展佛门狮子吼,老婆醒来,一脸无辜,怎么了? 我朝自己胸口打了一掌空明拳,昏倒...... 第二天,买锁申报维修. 本片获中山大学最佳“无可奈何”表演奖,最佳男主角奖,最佳女主角奖。 观众只有对门的男主人。听众不能考证。 投资:道具38元(买锁),额外支出(担心所造成的脑细胞死亡的精神损失费不计其数),还有饮料费(最后我喝啤酒压惊),修理等费用。 收入:0 五阳闪电如意爪 天下武功出少林,少林派生武当,武当派生峨嵋。江湖格局,风云突变。然而,合久必分,分久必合,循环伦常,生生不息【引自金庸群侠传】。 我六岁学艺,勤奋有加,然资质有限,终不能成为一代剑客。所以,人生轨迹有如前世安排,稳妥而有秩序。直至二十五那年,我碰上了我的妻子,我人生格局有了巨变。 她性格温柔善良,外表娇小秀美【引自张文涛语】。可是,我怎么也没有想到她竟有绝世武功――五阳闪电如意爪。每当我犯了她所认为的“错误”时,我便要接受“五阳闪电如意爪”的挑战。她出招神出鬼没,招无定数,防不胜防。有时她当机立断,挥挥衣袖,一阵风后,只有五道血痕,不带走一丝云彩。有时她会趁我在梦中进行偷袭,所谓人生如梦,于是我每在人生中品味梦醒时分的痛苦。 “你怎么还偷袭?”我按捺心中的怒火。 “唐门暗器名震天下,发暗器时还要通知你吗?” “因为你是女人,所以我不打你,不要以为我怕你。” “who怕who。” “不要逼我出绝招,八卦游龙掌,少林大力金刚拳,无影脚我样样精通。” “来啊!” 她神情自若,轻描淡写的样子使我不敢贸然出击,我好歹也是武当的弟子,如果输给一个女人,传出去我还怎么在江湖立足。 “你好歹也要给我面子” “所以我从不抓你的脸”。 我开始研究“五阳闪电如意爪”,此武功看似平常,可是博大精深。无论我怎么腾挪躲闪,终究不能逃脱一击。我查阅各种武功秘笈,发现她的招数仿佛是由江湖早以失传的“小李飞刀”演变而来。再加上她对暗器的崇拜,难道是….? 更主要的是,她娘家的确姓李。 如果她用谁也躲不开的小李飞刀来对付我,那我…..。我一阵后怕,心中感激她手下留情。 于是,我决定退出江湖。我有一个很好的理由,好男不和女斗。可是我不能废了一身的武功,这样怎么对得起师父的教诲。后来我听说周星驰大侠将少林武功用到足球中,我突然有一个绝妙的想法,将武当派的绝技用到篮球中。 篮球是一门西洋群体决斗艺术。两队各有五名剑客协同作战。一方主攻,另一方主守。一个回合后,攻防转换。攻方主要采用“乾坤大挪移”“北斗五星阵”“冲天剑法”等武功;守方主要采用“大擒拿手”“金钟罩”“大碑手”等武功。君子动手不动口,谁要出言不逊,就会被取消决斗资格。 于是每周一下午四点,决战广寒宫外【注:广寒宫乃女研究生宿舍,旁有广寒宫体育场】。 我有两个亲密的战友“晓铭”,“小水”。“晓铭”躲闪功夫出神入化,勾手一击令人叫绝;“小水”基本功异常扎实,常常一剑封喉。我则充当冷血杀手,不经意中给敌人致命一击。后来,我们就成了传说中的“三剑客”。 我每次决战前都要用千里传音【注:电话】告诉老婆。老婆总要嘱咐一番,“切磋而已,点到为止,不能受伤”。我点头答应。“带点钱买水喝”。每当这时,我觉得娶一个会“五阳闪电如意爪”的老婆没什么不好。 决战归来。夕阳,黄昏,我拉着老婆的手,闲庭信步。 “假如有一天,我老了身手不再敏捷,无法再使“五阳闪电如意爪”怎么办?” “没关系,那时我可以教你我们陈家独门秘技太极拳来对付我。” 决战 农历二月初六,惊蛰。 残阳,无风。 静,极静。 她站在我的面前,一动也不动,脸上没有任何表情。 她不动,我也不能动,也不敢动。 高手对决,以静制动,后发制人,这个道理我非常明白。 她的眼睛离我只有三十公分。我开始冒汗,汗珠进了我的眼睛,可是我不敢擦。 谁动谁输。我和她都非常清楚!! 忽然,她做了一个我从未见过的鬼脸。 我实在忍不住,笑了起来。 她也笑了起来,“爸爸,你先笑的,你输了”。 这个游戏我从没有赢过她。我宁愿一生都输给她。 谁与争峰! 我与女儿玩比大小的游戏。 我:我是老鹰。 女儿:我是猎人。 我:我是老虎。 女儿:武松。 我:我是县官。 女儿:我是皇上。 我:我是皇上他爸。哈哈! 女儿不说话了。我笑着说:“这回没办法了吧。” 女儿忽然说:我是皇上他姥姥。我认输了。 丈母娘一出,谁与争峰!小孩子都懂这个道理。 喜欢 和爱人、女儿去吃自助餐,每次都会被女儿嘲笑。因为,我所选的都是那些味美价廉的食品:刀削面、臊子面、炸酱面..... 女儿很不解:你看看别人点的都是什么?牛排、大虾、生蚝......跑到这里吃面条?奇葩! 我笑着告诉她:面条是我最喜欢的食物,能吃到自己最喜欢的东西有什么可抱怨的?喜欢就好! “那为什么要到这里来吃自助餐?外面一碗面10多块钱就就够了!” “因为这里就餐的氛围好,轻松愉快,自由挑选,而且食物品种多样,你和妈妈都喜欢啊。喜欢就好!” 世界上的任何事情,喜欢就好! 爱情的真谛 她是一个生活极其精致的人,爱一切精致的事物。 她做菜,重食材,重口味,重品相。即使做一道简单的青菜,她也一定要放在精美的餐具中,做出法国大餐的感觉。我和孩子吃的极香,赞不绝口。一方面确实香,另一方面是精致有余而量不足。吃不尽兴的时候,就觉得格外香。 她喝咖啡,要配备阳光,心情等一切佐料,慢慢喝。我喝茶,定要用大杯,一饮而尽。 她做米饭,每顿必有一汤。用精美小碗和汤勺,慢慢喝。我直接用吃饭的大碗,不仅喝的痛快,还少洗个碗。她就和女儿在旁边偷笑,轻轻的摇头,粗人啊。 吵架时,我吹胡子瞪眼,脸红耳赤。她在旁边看着书,安安静静,带着一丝轻蔑。 和她一起生活,我感觉就是一个山大王抢了一个大家闺秀做了压寨夫人! 我问她,生活了这么多年,你难受不?她说,忍忍就习惯了。 一切美好的婚姻都来自忍耐。 爱是包容,这就是爱情的真谛。

研究领域

公钥密码学、金融密码学 云计算与云安全 数据安全

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

2016 XiaofengChen,JianfengWang,XinyiHuang,Proceedingsofthe11thACMonAsiaConferenceonComputerandCommunicationsSecurity,AsiaCCS2016,Xi'an,China,May30-June3,2016.ACM2016,ISBN978-1-4503-4233-9. XiaofengChen,JinLi,JianWeng,JianfengMa,WenjingLou,VerifiableComputationoverLargeDatabasewithIncrementalUpdates.IEEEtransactionsonComputers,65(10):3184-3195,2016. TaoJiang,XiaofengChen,JianfengMa,PublicIntegrityAuditingforSharedDynamicCloudDatawithGroupUserRevocation.IEEEtransactionsonComputers,65(8):2363-2373,2016. JianfengWang,MeixiaMiao,YaqianGao,XiaofengChen,Enablingefficientapproximatenearestneighborsearchforoutsourceddatabaseincloudcomputing.SoftComput.20(11):4487-4495(2016) PengChen,JunYe,XiaofengChen,Efficientrequest-basedcomparableencryptionschemebasedonslidingwindowmethod.SoftComput.20(11):4589-4596(2016) JunYe,XiaofengChen,JianfengMa,Improvedalgorithmforsecureoutsourcingofmodularexponentiationswithhighcheckability.IJAHUC23(3/4):182-191(2016) BaojiangCui,ZiyueWang,BingZhao,XiaofengChen,DesignandanalysisofsecuremechanismsbasedontripartitecredibilityforRFIDsystems.ComputerStandards&Interfaces44:110-116(2016). LiangLiu,XiaofengChen,WenjingLou,Securethree-partycomputationalprotocolsfortrianglearea.Int.J.Inf.Sec.15(1):1-13(2016). ZheliLiu,XiaofengChen,JunYang,ChunfuJia,IlsunYou,Neworderpreservingencryptionmodelforoutsourceddatabasesincloudenvironments.J.NetworkandComputerApplications59:198-207(2016). YinghuiZhang,DongZheng,XiaofengChen,JinLi,HuiLi,Efficientattribute-baseddatasharinginmobileclouds.PervasiveandMobileComputing28:135-149(2016). YinghuiZhang,JinLi,XiaofengChen,HuiLi,Anonymousattribute-basedproxyre-encryptionforaccesscontrolincloudcomputing.SecurityandCommunicationNetworks9(14):2397-2411(2016). JianfengWang,XiaofengChen,EfficientandSecureStorageforOutsourcedData:ASurvey.DataScienceandEngineering1(3):178-188(2016). ZheliLiu,DejiangLuo,JinLi,XiaofengChen,ChunfuJia,N-Mobishare:newprivacy-preservinglocation-sharingsystemformobileonlinesocialnetworks.Int.J.Comput.Math.93(2):384-400(2016). TaoJiang,XiaofengChen,QianhongWu,JianfengMa,WillySusilo,WenjingLou,TowardsEfficientFullyRandomizedMessage-LockedEncryption.ACISP(1)2016:361-375. YinghuiZhang,JinLi,DongZheng,XiaofengChen,HuiLi,AccountableLarge-UniverseAttribute-BasedEncryptionSupportingAnyMonotoneAccessStructures.ACISP(1)2016:509-524. KamilKluczniak,JianfengWang,XiaofengChen,MiroslawKutylowski,Multi-deviceAnonymousAuthentication.NSS2016:21-36. 2015 XiaofengChen,JinLi,XinyiHuang,JianfengMa,WenjingLou,NewPubliclyVerifiableDatabaseswithEfficientUpdates.IEEETransactionsonDependableandSecureComputing,12(5):546-556,2015. Xiaofeng,XinyiHuang,JinLi,JianfengMa,WenjingLou,NewAlgorithmsforSecureOutsourcingofLarge-scaleSystemsofLinearEquations.IEEETransactionsonInformationandForensicsSecurity,10(1),69-78,2015. XiaofengChen,WillySusilo,JinLi,DuncanSWong,JianfengMa,ShaohuaTang,QiangTang,EfficientAlgorithmsforSecureOutsourcingofBilinearPairings,TheoreticalComputerScience,562:112-121,2015. JianfengWang,XiaofengChen,XinyiHuang,IlsunYou,andYangXiang,VerifiableAuditingforOutsourcedDatabaseinCloudComputing,IEEETransactionsonComputers,64(11):3293-3303,2015. JinLi,XiaofengChen,XinyiHuang,ShaohuaTang,andYangXiang,SecureDistributedDeduplicationSystemswithImprovedReliability.IEEETransactionsonComputers,64(12):3569-3579,2015. JinLi,XiaoTan,XiaofengChen,DuncanWong,FatosXhafa.OPoR:EnablingProofofRetrievabilityinCloudComputingwithResource-ConstrainedDevices.IEEETransactionsonCloudComputing,3(2):195-205,2015. JinLi,YanKitLi,XiaofengChen,PatrickP.C.Lee,WenjingLou:AHybridCloudApproachforSecureAuthorizedDeduplication,IEEETransactionsonParallelandDistributedSystems,26(5),1206-1216,2015. JinLi,JingweiLi,XiaofengChen,ChunfuJiaandWenjingLou.Identity-basedEncryptionwithOutsourcedRevocationinCloudComputing.IEEETransactionsonComputers,64(2):425-437,2015. TaoJiang,XiaofengChen,JinLi,DuncanS.Wong,JianfengMa,andJosephK.Liu,Towardssecureandreliablecloudstorageagainstdatare-outsourcing,FutureGenerationComputerSystems,Vol.52,2015,pp.86-94. JinLi,XiaofengChen,JingweiLi,ChunfuJia,JianfengMa,WenjingLou,Newaccesscontrolsystemsbasedonoutsourcedattribute-basedencryption1.JournalofComputerSecurity,23(6):659-683(2015). JinLi,XiaofengChen,FatosXhafa,LeonardBarolli,Securededuplicationstoragesystemssupportingkeywordsearch.J.Comput.Syst.Sci.81(8):1532-1541(2015). JinLi,XiaofengChen,XinyiHuang:Newattribute-basedauthenticationanditsapplicationinanonymouscloudaccessservice.IJWGS11(1),125-141,2015. MeixiaMiao,JianfengWang,HuiLi,XiaofengChen,Securemulti-server-aideddatadeduplicationincloudcomputing.PervasiveandMobileComputing24:129-137(2015). HuiZhu,YingfangXue,XiaofengChen,QiangLi,HuiLi,V-MGSM:AMultilevelandGroupingSecurityVirtualizationModelforMobileInternetService.MobileInformationSystems2015:841292:1-841292:9(2015). QiangTang,HuaMa,XiaofengChen,ExtendtheConceptofPublicKeyEncryptionwithDelegatedSearch.TheComputerJournal,58(4):724-734(2015). YanshengFeng,HuaMa,XiaofengChen,EfficientandVerifiableOutsourcingSchemeofSequenceComparisons.IntelligentAutomation&SoftComputing,21(1):51-63(2015). JinLi,ZheliLiu,XiaofengChen,FatosXhafa,XiaoTan,DuncanS.Wong,L-EncDB:Alightweightfr[ant]ameworkforprivacy-preservingdataqueriesincloudcomputing.Knowl.-BasedSyst.79:18-26(2015). ShaohuaTang,BoLv,GuominChen,ZhiniangPeng,AdamaDiene,XiaofengChen,EfficienthardwareimplementationofPMI+forlow-resourcedevicesinmobilecloudcomputing.FutureGenerationComp.Syst.52:116-124(2015). JianfengWang,XiaofengChen,JinLi,KamilKluczniak,MiroslawKutylowski,ANewSecureDataDeduplicationApproachSupportingUserTraceability.BWCCA2015:120-124. JunYe,XiaofengChen,JianfengMa,AnImprovedAlgorithmforSecureOutsourcingofModularExponentiations.AINAWorkshops2015:73-76 PengChen,JunYe,XiaofengChen,ANewEfficientRequest-BasedComparableEncryptionScheme.AINAWorkshops2015:436-439. QinZou,JianfengWang,XiaofengChen,SecureEncryptedImageSearchinMobileCloudComputing.BWCCA2015:572-575. YujueWang,QianhongWu,BoQin,XiaofengChen,XinyiHuang,YunyaZhou,Group-orientedProofsofStorage.ASIACCS2015:73-84. BaojiangCui,ZiyueWang,JunYang,XiaofengChen,DesignandAnalysisofanEnhancedSecureMechanismofLLRPinRFIDSystems.AINAWorkshops2015:17-21. JunYe,MeixiaMiao,PengChen,XiaofengChen,Request-BasedComparableEncryptionSchemewithMultipleUsers.BWCCA2015:414-416. XuYang,WeiWu,JosephK.Liu,XiaofengChen,LightweightAnonymousAuthenticationforAdHocGroup:ARingSignatureApproach.ProvSec2015:215-226. TranVietXuanPhuong,GuominYang,WillySusilo,XiaofengChen,AttributeBasedBroadcastEncryptionwithShortCiphertextandDecryptionKey.ESORICS(2)2015:252-269. 2014 XiaofengChen,JinLi,JianfengMa,QiangTang,WenjingLou,NewAlgorithmsforSecureOutsourcingofModularExponentiations,IEEETransactionsonParallelandDistributedSystems,25(9),2386-2396,2014. XiaofengChen,JinLi,XinyiHuang,JingweiLi,YangXiang,DuncanWong.SecureOutsourcedAttribute-basedSignatures.IEEETransactionsonParallelandDistributedSystems,25(12):3285-3294,2014. XiaofengChen,FangguoZhang,WillySusilo,HaiboTian,JinLi,KwangjoKim,Identity-basedchameleonhashingandsignatureswithoutkeyexposure,InformationSciences,265:198-210,2014. XiaofengChen,JinLi,JianWeng,JianfengMa,WenjingLou,VerifiableComputationoverLargeDatabasewithIncrementalUpdates,ESORICS2014,LNCS8712,148–162,Springer-Verlag,2014. XiaofengChen,JinLi,JianfengMa,WenjingLou,DuncanS.Wong:Newandefficientconditionale-paymentsystemswithtransferability.FutureGenerationComp.Syst.37:252-258(2014). JingweiLiu,ZonghuaZhang,XiaofengChen,KyungSupKwak:CertificatelessRemoteAnonymousAuthenticationSchemesforWirelessBodyAreaNetworks.IEEETrans.ParallelDistrib.Syst.25(2):332-342(2014). JinLi,XiaofengChen,MingqiangLi,JingweiLi,PatrickP.C.Lee,WenjingLou:SecureDeduplicationwithEfficientandReliableConvergentKeyManagement.IEEETrans.ParallelDistrib.Syst.25(6):1615-1625(2014). XinyiHuang,XiaofengChen,JinLi,YangXiang,LiXu:FurtherObservationsonSmart-Card-BasedPassword-AuthenticatedKeyAgreementinDistributedSystems.IEEETrans.ParallelDistrib.Syst.25(7):1767-1775(2014). JinLi,XinyiHuang,JingweiLi,XiaofengChen,YangXiang,SecurelyOutsourcingAttribute-BasedEncryptionwithCheckability.IEEETrans.ParallelDistrib.Syst.25(8):2201-2210(2014). HaiboTian,XiaofengChen,WillySusilo:Deniabilityandforwardsecrecyofone-roundauthenticatedkeyexchange.TheJournalofSupercomputing67(3):671-690(2014). YinghuiZhang,XiaofengChen,JinLi,HuiLi,GenericconstructionforsecureandefficienthandoffauthenticationschemesinEAP-basedwirelessnetworks.ComputerNetworks75:192-211(2014). FatosXhafa,XiaofengChen,XinyiHuang,VladiKolici,Advancesinsecureandintelligentdataprocessing.ConcurrencyandComputation:PracticeandExperience26(5):1021-1022(2014). YinghuiZhang,XiaofengChen,JinLi,HuiLi,FenghuaLi,Attribute-BasedDataSharingwithFlexibleandDirectRevocationinCloudComputing.TIIS8(11):4028-4049(2014). LeonardBarolli,FatosXhafa,XiaofengChen,MakotoIkeda,NinthInternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,BWCCA2014,Guangdong,China,November8-10,2014.IEEEComputerSociety2014,ISBN978-1-4799-4173-5. LiXu,YuanHe,XiaofengChen,XinyiHuang,Ticket-basedhandoffauthenticationforwirelessmeshnetworks.ComputerNetworks73:185-194(2014). HaixinNie,HuaMa,JianfengWang,XiaofengChen,VerifiableAlgorithmforSecureOutsourcingofSystemsofLinearEquationsintheCaseofNoSolution.BWCCA2014:572-577. YaqianGao,MeixiaMiao,JianfengWang,XiaofengChen,SecureApproximateNearestNeighborSearchoverEncryptedData.BWCCA2014:578-583. JingweiLi,JinLi,XiaofengChen,ZheliLiu,ChunfuJia:Privacy-preservingdatautilizationinhybridclouds.FutureGenerationComp.Syst.30:98-106(2014). QiHan,YinghuiZhang,XiaofengChen,HuiLi,JiaxiangQuan:Efficientandrobustidentity-basedhandoffauthenticationforEAP-basedwirelessnetworks.ConcurrencyandComputation:PracticeandExperience26(8):1561-1573(2014). JinLi,XiaofengChen,QiongHuang,DuncanS.Wong:Digitalprovenance:Enablingsecuredataforensicsincloudcomputing.FutureGenerationComp.Syst.37:259-266(2014). YuanChen,XiaofengChen,HuiLi,MoreDCCA-securepublic-keyencryptionsfromKEM+DEMstylehybridparadigmsandsomeobservationsonthe'inner-outer'structure,IJGUC5(1):60-70(2014). FatosXhafa,JianfengWang,XiaofengChen,JosephK.Liu,JinLi,PaulKrause,AnefficientPHRservicesystemsupportingfuzzykeywordsearchandfine-grainedaccesscontrol.SoftComput.18(9):1795-1802(2014). LiangLiu,XiaofengChen,WenjingLou:ASecureThree-PartyComputationalProtocolforTriangleArea.ACISP2014:82-97. ZheliLiu,JinLi,XiaofengChen,JunYang,ChunfuJia:TMDS:Thin-ModelDataSharingSchemeSupportingKeywordSearchinCloudStorage.ACISP2014:115-130. HaixinNie,XiaofengChen,JinLi,JosolphLiu,WenjingLou:EfficientandVerifiableAlgorithmforSecureOutsourcingofLarge-scaleLinearProgramming.AINA2014:591-596. JinLi,XiaofengChen,FatosXhafa,LeonardBarolli:SecureDeduplicationStorageSystemswithKeywordSearch.AINA2014:971-977. TaoJiang,XiaofengChen,JinLi,JianfengMa:M-SRS:SecureandTrustworthyMobileServiceReviewSystemBasedonMobileCloudlet.ICT-EurAsia2014:612-621. ZhenyuZhang,WujunZhang,JianfengWang,XiaofengChen:AnEffectiveCloud-BasedActiveDefenseSystemagainstMaliciousCodes.ICT-EurAsia2014:690-695. TaoJiang,XiaofengChen,JinLi,DuncanS.Wong,JianfengMa,JosephK.Liu:TIMER:SecureandReliableCloudStorageagainstDataRe-outsourcing.ISPEC2014:346-358. YinghuiZhang,DongZheng,XiaofengChen,JinLi,HuiLi,ComputationallyEfficientCiphertext-PolicyAttribute-BasedEncryptionwithConstant-SizeCiphertexts.ProvSec2014:259-273. 2013 JinLi,XiaofengChen,JingweiLi,ChunfuJia,JianfengMa,WenjingLou,Fine-GrainedAccessControlSystembasedonOutsourcedAttribute-basedEncryption,ESORICS2013,LNCS8134,592-609,Springer-Verlag,2013. QiangTangandXiaofengChen,TowardsAsymmetricSearchableEncryptionwithMessageRecoveryandFlexibleSearchAuthorization,ASIACCS,253-264,2013. YinghuiZhang,XiaofengChen,JinLi,DuncanS.WongandHuiLi,AnonymousAttribute-BasedEncryptionSupportingEfficientDecryptionTest,ASIACCS,511-516,2013. JianfengWang,HuaMa,QiangTang,JinLi,HuiZhu,SiqiMa,andXiaofengChen,EfficientVerifiableFuzzyKeywordSearchOverEncryptedDatainCloudComputing,ComputerSciencesandInformationSystems,Vol.10,No.2,667-684,2013. JinLi,XiaofengChen,EfficientMulti-userKeywordSearchOverEncryptedDatainCloudComputing,ComputingandInformatics,32(4),723-738,2013. HaiboTian,FangguoZhang,XiaofengChen,andBaodianWei,Selectivelyunforgeablebutexistentiallyforgeablesignatureschemesandapplications,ScienceinChina:InformationSciences,Vol.56,No.1,107-200,2013. XingxingXie,HuaMa,JinLi,XiaofengChen,AnEfficientCiphertext-PolicyAttribute-BasedAccessControltowardsRevocationinCloudComputing,J.UCS19(16):2349-2367,2013. HaiboTian,XiaofengChen,FangguoZhang,andBaodianWei,ZhengtaoJiang,YiLiu,Anon-delegatablestrongdesignatedverifiersignatureinID-basedsettingformobileenvironment,MathematicalandComputerModelling,58(5-6),1289-1300,2013. FeiYan,XiaofengChen,YinghuiZhang,EfficientOn-line/Off-lineSigncrypitonWithoutKeyExposure,InternationalJournalofGridandUtilityComputing,4(1),85-93,2013. JinLi,XiaoTan,XiaofengChen,DuncanS.Wong,AnEfficientProofofRetrievabilitywithPublicAuditinginCloudComputing,INCoS2013:93-98 YinghuiZhang,XiaofengChen,JinLi,HuiLi,FenghuaLi,FDR-ABE:Attribute-BasedEncryptionwithFlexibleandDirectRevocation,INCoS2013:38-45 HuiZhu,SiyuChen,LexiangZhu,HuiLi,XiaofengChen,RangeTree:AFeatureSelectionAlgorithmforC4.5DecisionTree,INCoS2013:17-22 HuiZhu,YingfangXue,YunZhang,XiaofengChen,HuiLi,XimengLiu,V-MLR:AMultilevelSecurityModelforVirtualization,INCoS2013:9-16 ZheliLiu,JinLi,XiaofengChen,JingweiLi,ChunfuJia,NewPrivacy-PreservingLocationSharingSystemforMobileOnlineSocialNetworks,3PGCIC2013:214-218 JinLi,DongqingXie,XiaofengChen,Server-AidedHierarchicalIdentity-BasedEncryption,EIDWT2013:643-647 XingxingXie,HuaMa,JinLi,XiaofengChen,NewCiphertext-PolicyAttribute-BasedAccessControlwithEfficientRevocation,AsianConferenceonAvailability,ReliabilityandSecurity,LNCS7804,Springer,373–382,2013. YinghuiZhang,XiaofengChen,HuiLi,Key-EvolvingHierarchicalID-BasedSigncryption,TheComputerJournal,56(10),1228-1248,2013. HaiboTian,XiaofengChen,BaodianWei,YiLiu,SecurityAnalysisofaSuiteofDeniableAuthenticationProtocols,I.J.NetworkSecurity15(5):384-389(2013) YanshengFeng,HuaMa,XiaofengChen,HuiZhu,SecureandVerifiableOutsourcingofSequenceComparisons,AsianConferenceonAvailability,ReliabilityandSecurity,LNCS7804,Springer,243–252,2013. 2012 XiaofengChen,JinLi,WillySusilo,EfficientFairConditionalPaymentsforOutsourcingComputations,IEEETransactionsonInformationForensicsandSecurity,7(6),1687-1694,2012. XiaofengChen,JinLi,JianfengMa,QiangTang,WenjingLou,NewAlgorithmsforSecureOutsourcingofModularExponentiations,ESORICS2012,LNCS7459,541–556,Springer-Verlag,2012. ChunhuiWu,XiaofengChen,DongyangLong,EfficientID-basedNon-MalleableTrapdoorCommitment,ComputersandElectricalEngineering,38(6),1647-1657,2012. YuanjieZhao,XiaofengChen,HuaMa,QiangTang,HuiZhu,ANewTrapdoor-indistinguishablePublicKeyEncryptionwithKeywordSearch,JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,3(1/2),72-81,2012. JianfengWang,XiaofengChen,HuaMa,QiangTang,JinLi,HuiZhu,AVerifiableFuzzyKeywordSearchOverEncryptedData,JournalofInternetServicesandInformationSecurity,2(1/2),49-58,2012. JianfengWang,HuaMa,QiangTang,JinLi,HuiZhu,SiqiMa,andXiaofengChen,ANewEfficientVerifiableFuzzyKeywordSearchScheme,JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,4(3),61-71,2012. HaiboTian,XiaofengChenandJinLi,AShortNon-delegatableStrongDesignatedVerifierSignature,ACISP2012,LNCS7372,247-260,Springer-Verlag,2012. HaiboTian,XiaofengChen,FangguoZhang,BaodianWei,ZhengtaoJiang,YiLiu,AnEfficientIdentity-BasedStrongDesignatedVerifierSignaturewithoutDelegatability,IMIS2012,88-88,IEEE,2012. JinLi,FangguoZhang,XiaofengChen,KwangjoKim,DuncanS.Wong,Genericsecurity-amplifyingmethodsofordinarydigitalsignatures,InformationSciences,Elsevier,Vol.201,128-139,2012. JingweiLi,JinLi,XiaofengChen,ChunfuJiaandZheliLiu,EfficientKeywordSearchoverEncryptedDatawithFine-GrainedAccessControlinHybridCloud,NSS2012,LNCS7645,Springer,490-502,2012. JingweiLi,ChunfuJia,JinLi,andXiaofengChen,OutsourcingEncryptionofAttribute-basedEncryptionwithMapReduce,The14thInterenationConferenceonInformationSecurity,LNCS7618,Springer,191–201,2012. QiHan,YinghuiZhang,XiaofengChen,HuiLi,andJiaxiangQuan,EfficientandRobustIdentity-BasedHandoffAuthenticationinWirelessNetworks,NSS2012,LNCS7645,Springer,180–191,2012. YinghuiZhang,XiaofengChen,HuiLi,andJinCao,SecureandEfficientIdentity-BasedHandoffAuthenticationSchemes,SecurityandCommunicationNetworks,5(10),1121-1130,JohnWiley&Sons,2012. 2011 XiaofengChen,WillySusilo,FangguoZhang,HaiboTian,JinLi,Identity-BasedTrapdoorMercurialCommitmentandApplications,TheoreticalComputerScience,412(39),5498-5512,2011. XiaofengChen,FangguoZhang,HaiboTian,BaodianWei,KwangjoKim,DiscreteLogarithmBasedChameleonHashingandSignaturesWithoutKeyExposure,ComputersandElectricalEngineering,37(4),614-623,2011. XiaofengChen,QianhongWu,FangguoZhang,HaiboTian,BaodianWei,ByoungcheonLee,HyunrokLee,KwangjoKim:Newreceipt-freevotingschemeusingdouble-trapdoorcommitment,InformationSciences,Elsevier,181(8),1493-1502,2011. JinLi,QiongHuang,XiaofengChenandShermanS.Chow,Multi-AuthorityCiphertext-PolicyAttribute-BasedEncryptionwithAccountability,ASIACCS2011,386-390,2011. HaiboTian,XiaofengChen,ZhengtaoJiang.Non-interactiveDeniableAuthenticationProtocols,acceptedby7thChinaInternationalConferenceonInformationSecurityandCryptology(InsCrypt2011),LNCS7537,Springer,142-159,2011. HaiboTian,XiaofengChen,ZhengtaoJiang,YusongDu.Non-delegatableStrongDesignatedVerifierSignatureonEllipticCurves,acceptedby14thAnnualInternationalConferenceonInformationSecurityandCryptology(ICISC2011),Springer,LNCS7259,219–234,2012. YangZhan,XiaofengChen,HaiboTian,YuminWang,Identity-basedKey-exposureFreeChameleonHashingBasedontheRSAAssumption,JournalofComputationalInformationSystems,7(2),350-358,2011. YudingLiu,HangLi,andXiaofengChen,Identity-BasedTrapdoorMercurialCommitmentundertheRSAAssumption,Chinacrypt2011,206-214,2011. 2010 XiaofengChen,FangguoZhang,WillySusilo,HaiboTian,JinLi,KwangjoKim,Identity-BasedChameleonHashSchemeWithoutKeyExposure,15thAustralasianConferenceonInformationSecurityandPrivacy(ACISP2010),LNCS6168,Springer,200-215,2010. XiaofengChen,FangguoZhang,HaiboTian,QianhongWu,YiMu,KwangjoKim,Three-roundAbuse-freeOptimisticContractSigningWithEverlastingSecrecy,14thFinancialCryptographyandDataSecurity(FC2010),LNCS6052,Springer,304-311,2010. BaodianWei,FangguoZhang,andXiaofengChen,EfficientOnline/OfflineSigncryptionScheme,IntelligentAutomationandSoftComputing,16(3),449-459,2010. XiaofengChen,HaiboTian,FangguoZhang,YongDing,CommentsandImprovementsonKey-exposureFreeChameleonHashingBasedonFactoring,Inscrypt2010,LNCS6584,Springer,415-426,2010. JinLi,GansenZhao,XiaofengChen,DongqingXie,ChunmingRong,WenjunLi,LianzhangTang,Fine-GrainedDataAccessControlSystemswithUserAccountabilityinCloudComputing,IEEESecondInternationalConferenceonCloudComputingTechnologyandScience(CloudCom),89-96,2010. 2009 FangguoZhang,XiaofengChen,CryptanalysisandImprovementofanID-basedAd-hocAnonymousIdentificationSchemeatCT-RSA05,InformationProcessingLetters,109(15),846-849,2009. XiaofengChen,GuominChen,FangguoZhang,BaodianWei,andYiMu,Identity-BasedUniversalDesignatedVerifierSignatureProof,InternationalJournalofNetworkSecurity,8(1),52–58,2009. JiqiangLv,KuiRen,XiaofengChenandKwangjoKim,TheRingAuthenticatedEncryption:Howtoprovideacluewisely,InformationSciences,179(1-2),161-168,2009. ChunhuiWu,XiaofengChen,ANewEfficientOn-line/Off-lineThresholdSignatureScheme,ChineseJournalofElectronics,18(2),321-324,2009. BaodianWei,FangguoZhang,XiaofengChen,HaiboTian,SomePropertiesofAlgebraicStructuresofRSA-likeSystems,WorldCongressonSoftwareEngineering,440-445,IEEEComputerSociety,2009. HaiboTian,XiaofengChen,andYongDing,AnalysisofTwoTypesDeniableAuthenticationProtocols,InternationalJournalofNetworkSecurity,9(3),242–246,2009. FangguoZhang,XingwenZhaoandXiaofengChen,ID-BasedAdaptiveObliviousTransfer,The10thInternationalWorkshoponInformationSecurityApplications(WISA2009),LNCS5932,133-147,2009. ChunhuiWu,XiaofengChen,DongyangLong,YiMu,andWillySusilo,ANewSecureDigital-CopyrightedContentDistributionScheme,JournalofComputationalInformationSystems,4(5),2343-2349,2009. 张方国,陈晓峰,基于身份的密码体制的研究综述,中国密码发展报告,1-31,2009。 陈国敏,陈晓峰,一个安全的广义指定验证者签名证明系统,《电子与信息学报》,31(2),489-492,2009。 2008 XiaofengChen,FangguoZhang,HaiboTian,BaodianWei,WillySusilo,YiMu,HyunrokLee,KwangjoKim,Efficientgenericon-line/off-line(threshold)signatureswithoutkeyexposure,InformationSciences,178(21),4192-4203,2008. ChunhuiWu,YuqingXing,XiaofengChen,DongyangLong,HyunrokLee,andKwangjoKim,GenericOn-line/Off-lineAggregateSignatures,ICESS08,107-112,IEEEComputerSocietyPress,2008. GuominChen,ChunhuiWu,WeiHan,XiaofengChen,HyunrokLee,andKwangjoKim,ANewReceipt-FreeVotingSchemeBasedonLinkableRingSignatureforDesignatedVerifiers,ICESS08,18-23,IEEEComputerSocietyPress,2008. FangguoZhang,XiaofengChen,YiMu,andWillySusilo,ANewandEfficientSignatureonCommitmentValues,InternationalJournalofNetworkSecurity,7(1),101-106,2008. BaodianWei,FangguoZhang,XiaofengChen,RingProxySignatures,JournalofElectronics,25(1),108-114,2008. BaodianWei,FangguoZhangandXiaofengChen,ANewTypeofDesignatedConfirmerSignaturesforaGroupofIndividuals,InternationalJournalofNetworkSecurity,7(2),293-300,2008. ShengliLiu,XiaofengChen,andFangguoZhang,OntheForgeabilityofWang-Tang-Li'sID-BasedRestrictivePartiallyBlindSignatureScheme,JournalofComputerScienceandTechnology,23(2),265-269,2008. FangguoZhang,XiaofengChen,andBaodianWei,EfficientDesignatedConfirmerSignaturefromBilinearPairings,AsiaCCS,363-368,2008. HaiboTian,XiaofengChen,FangguoZhang,BaodianWei,ADeniableAuthentationKeyAgreementProtocol,Chinacrypt,406-415,2008. WeiHan,TaoHao,DongZheng,KefeiChen,andXiaofengChen,ATamper-EvidentVotingMachineResistanttoCovertChannels,ProvSecConference,LNCS5324,335–344,Springer-Verlag,2008. 2007 XiaofengChen,FangguoZhang,andShengliLiu,ID-basedRestrictivePartiallyBlindSignaturesandApplications,TheJournalofSystemsandSoftware,80(2),164–171,2007. XiaofengChen,FangguoZhang,WillySusiloandYiMuEfficientGenericOn-line/Off-lineSignaturesWithoutKeyExposure,AppliedCryptographyandNetworkSecurity07,LNCS4521,18-30,Springer-Verlag,2007. XiaofengChen,QianhongWu,FangguoZhang,BaodianWei,ByoungcheonLee,HyunrokLeeandKwangjoKim,NewReceipt-freeVotingSchemeUsingDouble-trapdoorCommitment,The8thInternationalWorkshoponInformationSecurityApplications,395-409,2007. BaodianWei,XiaofengChen,FangguoZhang,andJiaLiu,TwoNewID-BasedProxyRingSignatureSchemes,JournalofComputationalInformationSystems,3(1),81-88,2007. BaodianWei,FangguoZhang,XiaofengChen,ID-basedRingProxySignatures,InternationalSymposiumonInformationTheory07,1031-1035,IEEEComputerSociety,2007. BaodianWei,FangguoZhang,XiaofengChen,Society-orientedDesignatedConfirmerSignatures,InternationalConferenceonNaturalComputation07,VolV,707-712,IEEEComputerSociety,2007. ChunhuiWu,XiaofengChen,FangguoZhang,HyunrokLee,andKwangjoKim,RemarksonReceipt-freeAuction/VotingSchemesUsingCommitment,Chinacrypt07,272-282,SciencePress,2007. JinLi,KwangjoKim,FangguoZhangandXiaofengChen,AggregateProxySignatureandVerifiablyEncryptedProxySignature,InternationalConferenceonProvableSecurity07,LNCS4784,208-217,Springer-Verlag,2007. 2006 XiaofengChen,FangguoZhang,ID-basedgroup-orientedsignaturesfrompairings,ChineseJournalofElectronics,15(1),12-16,2006. XiaofengChen,FangguoZhang,andKwangjoKim,ANewID-BasedGroupSignatureSchemefromBilinearPairings,JournalofElectronics,23(6),892-900,2006. XiaofengChen,FangguoZhang,YiMu,andWillySusilo,EfficientProvablySecureRestrictivePartiallyBlindSignaturesfromBilinearPairings,FinancialCryptographyandDataSecurity06,LNCS4107,251-265,Springer-Verlag,2006. Fangguozhang,XiaofengChen,WillySusiloandYiMu,ANewSignatureSchemeWithoutRandomOraclesfromBilinearPairings,VietCrypt2006,LNCS4341,67-80,Springer-Verlag,2006. JinLi,XiaofengChen,FangguoZhang,andYanmingWang,GeneralizationoftheSelective-IDSecurityModelforHIBSProtocols,InternationalConferenceonComputationalIntelligenceandSecurity06,LNAI4456,894-902,Springer-Verlag,2007. JinLi,XiaofengChen,TszHonYuen,andYanmingWang,ProxyRingSignature:FormalDefinitions,EfficientConstructionandNewVariant,InternationalConferenceonComputationalIntelligenceandSecurity06,LNAI4456,545-555,Springer-Verlag,2007. 2005 QianhongWu,BoQin,ChangjieWang,XiaofengChenandYuminWang,t-Out-of-nString/BitObliviousTransfers:Revisited,InformationSecurityPracticeandExperienceConference2005,LNCS3439,410–421,Springer-Verlag,2005. FangguoZhangandXiaofengChen,CryptanalysisofHuang–Changpartiallyblindsignaturescheme,TheJournalofSystemsandSoftware,76(3),323-325,2005. FangguoZhang,XiaofengChenandBaodianWei,CryptanalysisonTwoBlindSignatureSchemes,CCICS’05,116-123,Xi’an,China,SciencePress,2005 XiaofengChen,FangguoZhang,andBaodianWei,Commentonthepublickeysubstitutionattacks,InternationalJournalofNetworkSecurity,1(3),168-172,2005 FangguoZhang,WillySusilo,YiMu,andXiaofengChen,Identity-basedUniversalDesignatedVerifierSignatures,TheFirstInternationalWorkshoponSecurityinUbiquitousComputingSystems(SecUbiq2005),LNCS3823,825–834,Springer-Verlag,2005. XinyiHuang,YiMu,WillySusilo,FangguoZhangandXiaofengChen,AShortProxySignatureScheme:EfficientAuthenticationintheUbiquitousWorld,The2ndinternationalSymposiumonUbiquitousIntelligenceandSmartWorlds(UISW2005),LNCS3823,480–489,Springer-Verlag,2005. XiaofengChen,FangguoZhang,andShengliLiu,ID-basedRestrictivePartiallyBlindSignatures,InternationalConferenceonComputationalIntelligenceandSecurity,PartII,LNAI3802,117-124,Springer-Verlag,2005. 2004 XiaofengChen,FangguoZhangandKwangjoKim,LimitedverifiersignaturefrombilinearPairings,AppliedCryptographyandNetworkSecurity04,LNCS3089,135-148,Springer-Verlag,2004. XiaofengChen,FangguoZhangandKwangjoKim,ChameleonHashingwithoutKeyExposure,InformationSecurityConference04,LNCS3225,135-148,Springer-Verlag,2004. XiaofengChen,FangguoZhangandKwangjoKim,NewID-basedthresholdsignatureschemefrombilinearpairings,Indocrypt04,LNCS3348,371-383,Springer-Verlag,2004. XiaofengChenandFangguoZhang,ANovelID-basedSignatureSchemefromBilinearPairings,InternationalConferenceonComputerCommunications04,551-555,Beijing,2004. XiaofengChen,FangguoZhangandYuminWang,ANewApproachtoPreventBlackmailinginE-Cash,Chinacrypt’04,272-282,Wuxi,SciencePress,2004 QianhongWu,ChangjieWang,XiaofengChenandYuminWang,PubliclyVerifiableAuctionswithMinimalLeakage,28thAnnualInternationalComputerSoftwareandApplicationsConference,384-389,Hongkong,IEEEComputerSocietyPress,2004 QianhongWu,XiaofengChen,ChangjieWangandYuminWang,Shared-keySignatureandItsApplicationtoAnonymousAuthenticationinAdHocGroup,InformationSecurityConference04,LNCS3225,330-341,Springer-Verlag,2004. FangguoZhangandXiaofengChen,AttackonanID-basedAuthenticatedGroupKeyAgreementSchemefromPKC2004,InformationProcessingLetters.91(4),191-193,2004. JiqiangLv,KuiRen,XiaofengChenandKwangjoKim,RingAuthenticatedEncryption:ANewTypeofAuthenticatedEncryption,SCIS04,1179-1184,Sendi,Japan,2004. PingWang,XiaofengChenandKwangjoKim,OntheSecurityofZhang-Wu-Wang'sForward-SecureGroupSignatureSchemeinICICS'03,CISC2004,Korea. 陈晓峰,王继林,王育民,无强迫的最优合同签署方案,《电子学报》,32(3),404-407,2004。 陈晓峰,王继林,王育民,基于广义XTR体制的签名方案,《电子与信息学报》,26(4),562-567,2004。 陈晓峰,王育民,公钥密码体制研究及进展,《通信学报》,25(8),146-155,2004。 2003 XiaofengChen,ByoungcheonLeeandKwangjoKim,Receipt-freeelectronicauctionschemesusinghomomorphicencryption,ICISC’03,LNCS2971,259-273,Springer-Verlag,2003. XiaofengChen,FeiFengandYuminWang,NewkeyimprovementsanditsapplicationforXTRsystem,TheInternationalConferenceonAdvancedInformationNetworkingandApplications,Xi’an,IEEEComputerSocietyPress,561-564,2003. Chenxiaofeng,Wangjilin,Wangyumin,FairElectronicCashBasedonFingerprinting,Chinese3rdinformationandcommunicationsecurityconference,Wuhan,SciencePress,2003. WangChangjie,ChenXiaofengandWangYumin,AnAgent-basedMultiroundsOnlineAuctionProtocolwithSealedBids,TheInternationalConferenceonAdvancedInformationNetworkingandApplications,Xi’an,IEEEComputerSocietyPress,194-197,2003. JianhongZhang,XiaofengChenandYuminWang,Securityanalysisoftheimprovedgroupsignature,Proceedingof2003IEEEInformationTheoryWorkshop,171-174,France,2003. YanXie,FangguoZhang,XiaofengChenandKwangjoKim,ID-basedDistributed`MagicInk'Signature,ICICS'03,LNCS2836,249-259,Springer-Verlag,2003. 陈晓峰,王育民,张文鹏,一个类似于Dedekind和的四次均值公式,《西北大学学报》,33(2),129-132,2003。 陈晓峰,王育民,电子拍卖研究现状与进展,《通信学报》,23(12),73-81,2003。 陈晓峰,高虎明,王育民,基于XTR体制的盲签名方案,《电子与信息学报》,25(6),851-854,2003。 陈晓峰,王育民,基于匿名通讯信道的安全电子投票方案,《电子学报》,31(3),390-393,2003。 陈晓峰,王继林,王育民,基于不完全信任模型的无收据的电子投票,《计算机学报》,26(5),557-561,2003。 陈晓峰,伍前红,王育民,基于多方安全计算的密钥协商,《西安电子科技大学学报》

推荐链接
down
wechat
bug