近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Minhui Xue, Limin Yang, Keith W. Ross, Haifeng Qian: Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study. Peer-to-Peer Networking and Applications 10(2): 357-367 (2017) SCI
Jieqiong Hou, Haifeng Qian: Collaboratively filtering malware infections: a tensor decomposition approach. ACM TUR-C 2017: 28:1-28:7
Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian: Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. WASA 2017: 210-219
Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian: Thwarting location privacy protection in location-based social discovery services. Security and Communication Networks 9(11): 1496-1508 (2016) SCI
Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian: New application of partitioning methodology: identity-based dual receiver encryption. Security and Communication Networks 9(18): 5789-5802 (2016) SCI
Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming Dong: Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud. IEEE Trans. Information Forensics and Security 11(11): 2572-2583 (2016) SCI
Deli Qiao, Haifeng Qian, Geoffrey Ye Li: Broadbeam for Massive MIMO Systems. IEEE Trans. Signal Processing 64(9): 2365-2374 (2016) SCI
Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou: Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. ACISP (1) 2016: 293-309
Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao: Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. AsiaCCS 2016: 269-279
Deli Qiao, Haifeng Qian, Geoffrey Ye Li: On the design of broadbeam for massive MIMO systems. ICNC 2016: 1-5
Minhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian: You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users. Internet Measurement Conference 2016: 25-31
Haifeng Qian, Hui Wan, Mark N. Wegman, Luis A. Lastras, Ruchir Puri: A Proximity Measure using Blink Model. CoRR abs/1612.07365 (2016)
Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou: Signcryption KEM/tag-KEM, revisited. Security and Communication Networks 8(17): 3067-3082 (2015) SCI
Deli Qiao, Haifeng Qian, Geoffrey Ye Li: Broadbeam design for massive MIMO systems with uniform rectangular array. GlobalSIP 2015: 878-882
Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian: I know where you are: Thwarting privacy protection in location-based social discovery services. INFOCOM Workshops 2015: 179-184
Rongrong Wang, Minhui Xue, Kelvin Liu, Haifeng Qian: Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks. WASA 2015: 561-570
Deli Qiao, Haifeng Qian, Geoffrey Ye Li: Broadbeam for Massive MIMO Systems. CoRR abs/1503.06882 (2015)
Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Kefei Chen: PWG: Progressive Weight-Growth Algorithm for LDPC Codes. IEICE Transactions 97-A(2): 685-689 (2014) SCI
Xiangxue Li, Haifeng Qian, Yuan Zhou: Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption. Inf. Sci. 276: 290-294 (2014) SCI
Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang: Robust password changing and DoS resilience for human-centric password authentication. Security and Communication Networks 7(10): 1552-1559 (2014) SCI
Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng: POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. ACM Conference on Computer and Communications Security 2014: 1457-1459 EI
Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng: POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. ACM Conference on Computer and Communications Security 2014: 1460-1462 EI
Xiangxue Li, Haifeng Qian, Jian Weng, Yu Yu: Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical and Computer Modelling 57(3-4): 503-511 (2013) SCI
Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng: Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. ACNS 2013: 186-201
Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou: Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. ICICS 2013: 167-184
Xiangxue Li, Haifeng Qian, Yuan Zhou: Pitfalls in identity based encryption using an elliptic curve combined public key. Appl. Math. Lett. 25(8): 1111-1113 (2012) SCI
Haifeng Qian, Xiangxue Li, Xinli Huang: Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model. Informatica, Lith. Acad. Sci. 23(3): 443-460 (2012) SCI
Yuan Zhou, Haifeng Qian: Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs. Security and Communication Networks 5(7): 764-775 (2012) SCI
Haifeng Qian, Junqing Gong, Yuan Zhou: Anonymous password-based key exchange with low resources consumption and better user-friendliness. Security and Communication Networks 5(12): 1379-1393 (2012) SCI
Zongyang Zhang, Zhenfu Cao, Haifeng Qian: Chosen-ciphertext attack secure public key encryption with auxiliary inputs. Security and Communication Networks 5(12): 1404-1411 (2012) SCI
Yu Yu, Xiangxue Li, Haifeng Qian: Two-source extractors for leaky sources. ITW 2012: 452-456
Haifeng Qian, Shouhuai Xu,Non-interactive multisignatures in the plain public-key model with efficient verification, Inf. Process. Lett., 111(2), 82-89, 2010 SCI
Jun He, Haifeng Qian*, Yuan Zhou, and Zhibin Li, Cryptanalysis and Improvement of a Block Cipher Based on Multiple Chaotic Systems, Mathematical Problems in Engineering, vol. 2010, 14 pages, 2010 SCI
Yuan Zhou, Haifeng Qian*, Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model. ADHOC-NOW 2011,Berlin, 2011.10. 164-176
Haifeng Qian, Shouhuai Xu: Non-interactive editable signatures for assured data provenance. CODASPY 2011, San Antonio, 2011.02. 145-156
Yuan Zhou, Haifeng Qian*, Xiangxue Li: Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. ISC 2011, Xi’an, 2011.10. 341-354
Junqing Gong, Haifeng Qian*, Yuan Zhou: Fully-Secure and Practical Sanitizable Signatures. Inscrypt 2010, Shanghai, 2010.09. 300-317
Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi S. Sandhu: Trustworthy Information: Concepts and Mechanisms. WAIM 2010, Jiuzaigou, 2010.07. 398-404
Li X. X., Zheng Q. J., Qian H. F., Zheng D., Li J. H., Toward Optimizing Cauchy Matrix for Cauchy Reed-Solomon Code, IEEE COMMUNICATIONS LETTERS, 13 (8): 603-605. (2009) , SCI
Xiaolei Dong, Haifeng Qian, Zhenfu Cao: Provably secure RSA-type signature based on conic curve. Wireless Communications and Mobile Computing 9(2): 217-225 (2009) SCI
Zecheng Wang, Haifeng Qian, Zhibin Li: Adaptively Secure Threshold Signature Scheme in the Standard Model. Informatica, Lith. Acad. Sci. 20(4): 591-612 (2009) SCI
Haifeng Qian, Yuan Zhou, Zhibin Li, Zecheng Wang, Bing Zhang: Efficient public key encryption with smallest ciphertext expansion from factoring. Des. Codes Cryptography 49(1-3): 233-249 (2008) SCI
Haifeng Qian, Zhibin Li, Zhijie Chen and Shiman Yang, A Practical Optimal Padding for Signature Schemes, M.Abe (Ed.): CT-RSA 2007, LNCS 4377, pp. 112-128, 2007. EI
Zecheng Wang, Haifeng Qian, Zhibin Li. Hybrid Proxy Multisignature: A New Type Multiparty Signature,Information Sciences, 2007.12, Vol 177(24): 5638-5650 (2007). SCI
Licheng Wang, Zhenfu Cao, Xiangxue Li and Haifeng Qian. Simulatability and security of certificateless threshold signatures. Information Sciences, Volume 177, Issue 6, Pages 1382-1394 (2007). SCI
Haifeng Qian, Zhenfu Cao, Qingshui Xue. A new threshold proxy signature scheme from bilinear pairings, Science in China Ser. E, 34(6):711-720, 2004; Science in China Ser. F, 47(5):612-622, 2004. SCI.
Haifeng Qian, ZhenFu Cao and Haiyong Bao. Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms, Applied Mathematics and Computation, Volume 166, Issue 3, 26 July 2005, Pages 501-505. SCI
Haifeng Qian, ZhenFu Cao and Haiyong Bao. Security of Pon-Lu-Jeng's Meta-He digital signature schemes, Applied Mathematics and Computation, Volume 170, Issue 1, 1 November 2005, Pages 724-730. SCI
Qian Haifeng, Cao Zhenfu and Xue Qingshui. Efficient Pairing-Based Threshold proxy Signature Scheme with Known Signers, Informatica, 2005, Vol.16, No. 2, 261-274. SCI
Haifeng Qian and Zhenfu Cao, A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme, International Workshop on Information Assurance in Distributed Systems (IADS 2005), LNCS, Publisher: Springer-Verlag GmbH, Volume 3759, 2005, pages 323-331. SCI
Qingshui Xue, Zhenfu Cao and Haifeng Qian, A generalized proxy signature scheme based on the RSA cryptosystem, PDCAT'04, LNCS 3320, 8-10 December, 2004, Singapore, pp. 662-665. SCI
Hai-Yong Bao, Zhen-Fu Cao and Hai-Feng Qian. On the security of a group signcryption scheme from distributed signcryption scheme, CANS'2005, LNCS volume 3810, Springer-Verlag Berlin Heidelberg, pages 26-34. 2005. SCI
Lichen Wang, Zhenfu Cao, Xiangxue Li and Haifeng Qian. Certificateless Threshold Signature Schemes, CIS'2005, Part II, LNAI 3802, Springer-Verlag, pages 104-109. 2005. SCI