近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
科研论文
(1) L. Zhang, Z. Wei, W. Ren, X. Zheng, K. Raymond Choo, N. Xiong, “SIP: An Efficient and Secure Information Propagation Scheme in E-health Networks,” IEEE Transactions on Network Science and Engineering, DOI 10.1109/TNSE.2021.3063174, 2021.
(2) L. Zhang, Y. Zhu, W. Ren, Y. Wang, K. Raymond Choo, N. Xiong, “An Energy Efficient Authentication Scheme based on Chebyshev Chaotic Map for Smart Grid Environments,”IEEE Internet of Things Journal, 2021, Accepted.
(3) L. Zhang, L. Zhao, S. Yin, C. Chi, R. Liu, Y. Zhang, “A lightweight authentication scheme with privacy protection for smart grid communications,” Future Generation Computer systems, vol. 100, pp. 770-778, 2019.
(4) L. Zhang, Y. Zhang, S. Tang, H. Luo, “Privacy Protection for E-health Systems by Means of Dynamic Authentication and Three-factor Key Agreement,” IEEE Transactions on Industrial Electronics, vol. 65, no. 3, pp. 2795-2805, 2018.
(5) L. Zhang, H. Luo, L. Zhao, Y. Zhang, “Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement,” Journal of Medical Systems, vol. 40, pp. 1-13, 2018.
(6) Y. Liu, S. Tang, R. Liu, L. Zhang, Z. Ma, “Secure and robust digital image watermarking scheme using logistic and RSA encryption,” Expert Systems with Applications, vol. 97, pp. 95-105, 2018.
(7) L. Zhang, S. Zhu, S. Tang, “Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme,” IEEE Journal of Biomedical and Health Informatics, vol. 21, no. 2, pp. 465-475, 2017. (IEEE Transactions on Information Technology in Biomedicine)
(8) L. Zhang, S. Tang, S. Zhu, “Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol,” Wireless Networks, vol. 23, no. 6, pp. 1901-1916, 2017.
(9) J. Peng, S. Tang, L. Zhang, Ran Liu, “Information retrieval of mass encrypted data over multimedia networking with n-Level vector model-based relevancy ranking,” Multimedia Tools and Applications, vol. 76, pp. 2569-2589, 2017.
(10) L. Zhang, S. Tang, S. Zhu, “A Lightweight Privacy Preserving Authenticated Key Agreement Protocol for SIP-based VoIP,” Peer-to-Peer Networking and Applications, vol. 9, no. 1, pp. 108-126, 2016.
(11) L. Zhang, S. Tang, S. Zhu, “An Energy Efficient Authenticated Key Agreement Protocol for SIP-based Green VoIP Networks,” Journal of Network and Computer Applications, vol. 59, pp.126-133, 2016.
(12) Y. Jiang, S. Tang, L. Zhang, M. Xiong, and Y. J. Yip, “Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 12, no. 4, 54, pp. 1-20, 2016.
(13) L. Zhang, S. Tang,Y. Jiang “Dynamic key updating with voice quality preserving for Voice over Internet Protocol based on steganography,” 3rd Annual International Conference on Wireless Communication and Sensor Network,Wuhan, Hubei, China,2016.12.10-2016.12.11
(14) L. Zhang, S. Zhu, “Robust ECC-based Authenticated Key Agreement Scheme with Privacy Protection for Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 39, no. 5, pp. 1-11, 2015.
(15) L. Zhang, S. Tang, J. Chen and S. Zhu, “Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography,” Wireless Personal Communications, vol. 81, no. 1, pp. 53-75, 2015.
(16) W. Zhang, S. Tang, L. Zhang, Z. Ma, J. Song, “Chaotic Stream Cipher-based Secure Data Communications over Intelligent Transportation Network,” International Journal of Antennas and Propagation, vol. 2015, pp. 1-10, 2015.
(17) L. Zhang, S. Tang, Z. Cai, “Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications,” IET Communications, vol. 8, no. 1, pp. 83-91, 2014.
(18) L. Zhang, S. Tang, Z. Cai, “Cryptanalysis and improvement of password authenticated key agreement for session initiation protocol using smart cards,” Security and Communication Networks, vol.7, pp. 2405-2411, 2014.
(19) L. Zhang, S. Tang, Z. Cai, “Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card,” International Journal of Communication Systems, vol. 27, no. 11, pp. 2691-2702, 2014.
(20) Tang ShanYu, Jiang YiJing, Zhang LiPing, Zhou ZhangBing, “Audio steganography with AES for real-time covert voice over internet protocol communications,” SCIENCE CHINA Information Sciences, vol. 57, no. 3, pp. 1-14, 2014.
(21) W. Zhang, Q. Chen, J. Li, L. Zhang, S. Tang, “Security improvement in ETC network using RC4-logistic chaotic encryption,” Intl. Conf. on Advances In Computer and Electronics Technology - ACET 2014, pp. 34-38, Hong Kong, 2014.8.26-8.27.
教学论文
2.章丽平,信息安全专业双语教学研究——以《数据库及安全》课程为例,软件导刊,2017,(3):193-195.
3.章丽平,面向创新能力培养的信息安全专业教学改革探讨,中国教育信息化,2017,(8):12-14.