文章来源: | 发布时间:2016-03-10 | 【字号: 小 中 大 】 |
序号 | 论文类型 | 论文名称 | 刊物名称 | 论文所在期刊的卷、期、页 | 论文收录类型 | 论文作者 |
1 | 国外重要刊物 | The Complexity and Randomness of Linear Multi-Secret Sharing Schemes with Non-Threshold Structures | Acta Mathematicae Applicate Sinica | 2014.1 | SCI收录 | Chunming Tang*, Shuguang Dai |
2 | 国外重要刊物 | A Novel Hybrid Incentive Mechanism for Node Cooperation in Mobile Cyber-Physical Systems [J]. |
International Journal of Parallel, Emergent and Distributed Systems | 2014, 29(3): 316-336. | EI收录 | Xiaofei Wang, Ying Cai* and Zhuo Li |
3 | 国外重要刊物 | Securely verifiable outsourcing schemes of matrix calculation[J] | International Journal of High Performance Computing and Networking | , Vol. 8, No. 2, (2015):93-101. | EI收录 | Can Xiang, Chunming Tang* |
4 | 国外重要刊物 | Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix[J] | Journal of Cloud Computing | 2015, 4(1): 1-6 | EI收录 | Xin Hu, Chunming Tang* |
5 | 国内重要刊物 | Stego key searching for LSB steganography on JPEG decompressed image | Sci China Inf Sci | DOI: 10.1007/s11432-015-5367-x,Publication Date (Web): 15 June 2015 | SCI收录 | 刘九芬,田雨果,韩涛,刘文斌,罗向阳. |
6 | 国外重要刊物 | Novel Image Encryption based on Quantum Walks | Scientific Reports | 5(1),7784 (2015) | SCI收录 | Yu-Guang Yang, Qing-Xiang Pan, Si-Jia Sun, Peng Xu |
7 | 国外重要刊物 | Non-expansible XOR-based visual cryptography scheme with meaningful shares [J] | Signal processing | 2015, 108: 604-621 | SCI收录 | Duanhao Ou, Wei Sun*, Xiaotian Wu |
8 | 国外重要刊物 | Privacy-preserving face recognition with outsourced computation [J | Soft computing. | DOI 10.1007/s00500-015-1759-5. | SCI收录 | Can Xiang, Chunming Tang*, Yunlu Cai, Qiuxia Xu. |
9 | 国外重要刊物 | Privacy Aware Attribute-Based PHR Sharing with User Accountability in Cloud Computing | The Journal of Supercomputing | 2014, 7(5): 1607-1619 | SCI收录 | Fatos Xhafa*, Jianglang Feng, Yinghui Zhang, Xiaofeng Chen, and Jin Li |
10 | 国外重要刊物 | A new publicly verifiable data possession on remote storage[J] | The Journal of Supercomputing | 2015: 1-15. | SCI收录 | Chunming Tang*, Xiaojun Zhang |
11 | 国外重要刊物 | Trusted Cooperative Spectrum Sensing Scheme Based on D-S Evidence Theory |
2015 International Conference on Information and Communications Technologies (ICT2015),Xi'an | , pp.263-267, April, 2015. | EI收录 | Jingyu Feng*, Meiying Wang, Guangyue Lu and Jinlong Li |
12 | 国外重要刊物 | Several classes of polynomials with low differential uniformity over finite fields of odd characteristic | AAECC | Doi: 10.1007/s00200-015-0272-5. | SCI收录 | Guangkui Xu, Xiwang Cao*, Shanding Xu |
13 | 国外重要刊物 | New model and construction of ABE: achieving key resilient-leakage and attribute direct-revocation | ACISP'14, LNCS 8544, | pp. 192–208, 2014. | EI收录 | Mingwu Zhang |
14 | 国外重要刊物 | On the Exact Multicast Delay in Mobile Ad Hoc Networks with f -cast Relay | Ad Hoc Networks | 33(2015)1-86 | SCI收录 | Bin Yang, Ying Cai, Yin Chen and Xiaohong Jiang |
15 | 国外重要刊物 | More constructions of approximately mutually unbiased bases, | Bulletin of Aust. Soc. | doi:10.1017/S0004972715000994, | SCI收录 | Xiwang Cao*, Wun-Seng Chou |
16 | 国内重要刊物 | An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things |
China Communications | 11(6), pp.129–139, 2014. (SCI:000338916200015,第十八届全国青年通信学会年会优秀论文) | SCI收录 | W. Li, Z. Tao, D. Gu, L. Sun, B. Qu, Z. Liu, Y. Liu, |
17 | 国外重要刊物 | Achieving Efficient and Privacy-preserving Multi-feature Search for Mobile Sensing | Computer Communications | 2015, vol. 65, pp. 35-42. | SCI收录 | Hongwei Li*, Yi Yang, Haomiao Yang, and Mi Wen |
18 | 国外重要刊物 | Public key encryption with delegated equality test in a multi-user setting | Computer Journal, | 986-1002 (2015) | SCI收录 | Sha Ma, Mingwu Zhang, Qiong Huang and Bo Yang |
19 | 国外重要刊物 | Generic Construction for Secure and Efficient Handoff Authentication Schemes in EAP-based Wireless Networks | Computer Networks | 2014, 75: 192-211 | SCI收录 | Yinghui Zhang*, Xiaofeng Chen, Jin Li, and Hui Li |
20 | 国外重要刊物 | An Error-Tolerant Keyword Search Scheme Based on Public-Key Encryption in Secure Cloud Computing | Concurrency and Computation: Practice and Experience | online: 7 JUL 2015 | EI收录 | Yang Bo, Mingwu Zhang, Jun-Qiang Du |
21 | 国外重要刊物 | Constructing new APN functions and bent functions over finite fields of odd characteristic via the switching method | Crypto. Commun. | Doi: 10.1007/s12095-0145-6 | SCI收录 | Guangkui Xu, Xiwang Cao*, Shanding Xu |
22 | 国外重要刊物 | Optimal p-ary cyclic codes with minimum distance four from monomials | Crypto. Commun. | Doi: 10.1007/s12095-0159-0 | SCI收录 | Guangkui Xu, Xiwang Cao*,Shanding Xu |
23 | 国外重要刊物 | LSB steganographic payload location for JPEG-decompressed images | Digital Signal Processing, | 38:66-76, 2015 | SCI收录 | 刘九芬,田雨果,韩涛,杨春芳,刘文斌 |
24 | 国外重要刊物 | Provably Secure and Efficient Leakage-Resilient Certificateless Signcryption Scheme without Bilinear Paring | Discrete Applied Mathematics | doi:10.1016/j.dam.2015.10.018 | SCI收录 | Zhou Yanwei, Yang Bo, Zhang Wenzheng |
25 | 国外重要刊物 | Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack | EUROCRYPT 2014 | 77-92 | EI收录 | Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao |
26 | 国外重要刊物 | Improved security of a dynamic remote data possession checking protocol for cloud storage. | Expert Syst. | Appl. 41(17): 7789-7796 (2014). | SCI收录 | Yong Yu, Jianbing Ni*, Man Ho Au, Hongyu Liu, Hua Wang, Chunxiang Xu |
27 | 国外重要刊物 | Two classes of permutation polynomials having the form (x2m+x+δ)s+x. | Finite Fields and Their Applications | 31: 12-24 (2015) | 其他收录 | Ziran Tu, Xiangyong Zeng, Yupeng Jiang |
28 | 国外重要刊物 | Tor Helleseth: Permutation polynomials of the form (xpm-x+δ)s+L(x) over the finite field Fp2m of odd characteristic | Finite Fields and Their Applications | 34: 20-35 (2015) | 其他收录 | Ziran Tu, Xiangyong Zeng, Chunlei Li |
29 | 国外重要刊物 | Yi Mu: Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks | Frontiers of Computer Science | 8(3): 456-468 (2014) | SCI收录 | Mingwu Zhang |
30 | 国外重要刊物 | Remote data possession checking with enhanced security for cloud storage | Future Generation Computer System, | vol 52, 77-85, 2015. | SCI收录 | Yong Yu*, Yafang Zhang, Jianbing Ni, Man Ho Au, Lanxiang Chen, Hongyu Liu |
31 | 国外重要刊物 | A Novel Attack to Spatial Cloaking Schemes in Location-Based Services | Future Generation Computer Systems, | 49:125-132, 2015. | SCI收录 | B. Niu*, Xiaoyan Zhu, Qinghua Li, Jie Chen and Hui Li |
32 | 国外重要刊物 | Biwen Chen and Hua Shen. Program obfuscator for privacy-carrying unidirectional one-hop re-encryption | ICA3PP 2015 | LNCS 9532, pp.1-10, (2015) | EI收录 | Mingwu Zhang |
33 | 国外重要刊物 | Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-hoc Networks | IEEE Transactions on Dependable and Secure Computing |
2015. (SCI, 录用) | SCI收录 | W. Li, W. Zhang, D. Gu, Y. Cao, Z. Tao, Z. Zhou, Y. Liu, Z. Liu, |
34 | 国外重要刊物 | Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited | IEEE Trans. on Information Forensics and Security, | Vol.10, No.12, Dec., 2015. | SCI收录 | 郭林杰,倪江群(通信作者),苏文康,唐承佩,施云青 |
35 | 国外重要刊物 | A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid, Accepted for publication in IEEE Transactions on Smart Grid | IEEE Transactions on .Year: 2015 | Volume: PP, Issue: 99,Pages: 1 - 1, DOI: 10.1109/TSG.2015.2412091,IEEE Early Access Articles |
SCI收录 | Yanmin Gong, Ying Cai, Yuanxiong Guo , Yuguang Fang* |
36 | 国外重要刊物 | Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | IEEE Transactions on Computers | Issue Date: 5555-01 | SCI收录 | Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farras, and Jesus A. Manjon. |
37 | 国外重要刊物 | Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email | IEEE Transactions on Computers. | Issue Date: 5555-01 | SCI收录 | Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, Hai Jin |
38 | 国外重要刊物 | Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response | IEEE Transactions on Computers. | Issue Date: 2015-03 | SCI收录 | Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer |
39 | 国外重要刊物 | Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data | IEEE Transactions on Dependable and Secure Computing | 2015, DOI:10.1109/TDSC.2015.2406704 | SCI收录 | Hongwei Li*, Yi Yang, Tom H. Luan, Xiaohui Liang, Liang Zhou, and Xuemin (Sherman) Shen |
40 | 国外重要刊物 | Extended Capabilities for XOR-Based Visual Cryptography [J] | IEEE Transactions on Information Forensics and Security | 2014, 9(10): 1592-1605. | EI收录 | Xiaotian Wu, Wei Sun* |
41 | 国外重要刊物 | On the Size of Source Space in a Secure MAC | IEEE Transactions on Information Forensics and Security | , Vol. 10, No. 9, pages 2007-2015, Sept. 2015. | EI收录 | Shaoquan Jiang, |
42 | 国外重要刊物 | Privacy-Preserving Authenticated Key-Exchange Over Internet | IEEE Transactions on Information Forensics and Security | 9(1): 125-140 (2014) | SCI收录 | Andrew Chi-Chih Yao, Yunlei Zhao |
43 | 国外重要刊物 | On the Optimality of Keyless Authentication in a Noisy Model | IEEE Transactions on Information Forensics and Security, | Vol. 10, No. 6, pp. 1250-1261, June 2015 | EI收录 | Shaoquan Jiang, |
44 | 国外重要刊物 | Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search | IEEE Transactions on Information Forensics and Security, | Vol. 10, no. 9, pp. 1993-2006, 2015 | EI收录 | Peng Xu, Qianhong Wu, Willy Susilo, Josep Domingo-Ferrer, Wei Wang and Hai Jin |
45 | 国外重要刊物 | TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids | IEEE Transactions on Information Forensics and Security, | vol. 10, no. 11, pp. 2340-2351, 2015. | EI收录 | Huaqun Wang, Bo Qin, Qianhong Wu, Li Xu, Josep Domingo-Ferrer |
46 | 国外重要刊物 | Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications | IEEE Transactions on Information Forensics and Security. | Vol. 10, no. 11, pp. 2352-2364, 2015 | EI收录 | Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Zheming Dong. |
47 | 国外重要刊物 | Constructions of Bent-Negabent Functions and their relation to the completed Maiorana-McFarland Class. | IEEE Transactions on Information Theory | 61(3), (2015) , pp.1496–1506 | SCI收录 | Fengrong Zhang, Yongzhuang Wei, and Enes Pasalic* |
48 | 国外重要刊物 | An Incentive-Compatible Routing Protocol for Two-hop Delay Tolerant Networks. Vehicular Technology |
IEEE Transactions on Year: 2015 |
Volume: PP, Issue: 99 Pages: 1- , DOI: 10.1109 /TVT. 2015.2454291 IEEE Early Access Articles |
SCI收录 | Ying Cai*, Yanfang Fan, Ding Wen |
49 | 国外重要刊物 | Packet Delivery Ratio/Cost in MANETs with Erasure Coding and Packet Replication. Vehicular Technology |
IEEE Transactions on. 2015 | Volume:64, Issue:5,Pages: 2062-2070, DOI: 10.1109/TVT.2014.23 62355 |
SCI收录 | Bin Yang, Yin Chen, Ying Cai and Xiaohong Jiang |
50 | 国外重要刊物 | Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP | IEEE Wireless Communications | 2015, vol.22, no.4, pp. 74 - 80 | SCI收录 | Hongwei Li, Dongxiao Liu, Yuanshun Dai and Tom H. Luan, |
51 | 国外重要刊物 | A new construction of block codes from algebraic curves | IEEE. Trans. on Inform. Theory, | vol. 61, no. 8, pp. 4239-4242, Aug. 2015. | SCI收录 | L. F. Jin |
52 | 国外重要刊物 | Decoding of dual-containing codes from Hermitian tower and applications | IEEE. Trans. on Inform. Theory, | vol. 61, no. 11, pp. 5843-5847, 2015. | SCI收录 | L. F. Jin and H. B |
53 | 国外重要刊物 | Improved Impossible Differerntial Attack on Reduced Version of Camellia with FL/F-1 FuLnctions | IET Information Security | 2015.(SCI, 录用) | SCI收录 | Y. Liu, A. Yang, Z. Liu, W. Li, Q. Wang, L. Song, D. Gu |
54 | 国内重要刊物 | Security Weakness of Two Identity-Based Multiple Key Agreement Protocols | In Proc. of ICT 2014, Nanjing, China | 2014: 395-399. (EI: 20143518116604) | EI收录 | Q. F. Cheng*, J. H. Zhao, S. Q. Lu. |
55 | 国外重要刊物 | Achieving Authorized and Ranked Multi-keyword Search over Encrypted Cloud Data | in Proceedings of ICC, London, UK, | pp.7450 - 7455, 2015. | 其他收录 | Hongwei Li*, Dongxiao Liu, Kun Jia and Xiaodong Lin |
56 | 国外重要刊物 | The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions | in Proceedings of the 12th Theory of Cryptography Conference (TCC 2015), | LNCS 9014, pp. 7-35. | EI收录 | Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. |
57 | 国外重要刊物 | Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards | In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) | LNCS 9326, pp. 468-480 | EI收录 | Junrong Liu, Yu Yu*, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie. |
58 | 国外重要刊物 | (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond | in Proceedings of the 35th Annual International Conference on Cryptology (CRYPTO 2015), | LNCS 9216, pp. 209-229 | EI收录 | Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng |
59 | 国外重要刊物 | On security against the server in designated tester public key encryption with keyword search | Information Processing Letters, | 115(2015):957-961. | SCI收录 | Zhiyi Shao, Bo Yang |
60 | 国外重要刊物 | Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding | Information Sciences | 277,445-457(2014) | SCI收录 | Yu-Guang Yang, Xin Jia, Si-Jia Sun, Pan Qing-Xiang. |
61 | 国外重要刊物 | Security Analysis of the Piccolo Lightweight Cipher in the Internet of Things | Information–An International Interdisciplinary Journal, | 2015. (SCI, 录用) | SCI收录 | W. Li, X. Xia, D. Gu, Z. Liu, Y. Liu, C. Zhao |
62 | 国外重要刊物 | Participant Attack on Three-party Quantum key Agreement with Two-photon Entanglement | Int J Theor Phys | 2015, DOI: 10.1007/s10773-015-2632-0 (SCI 检索) | SCI收录 | Zhenchao ZHU, AiQun HU and AnMin FU |
63 | 国外重要刊物 | Cryptanalysis and Improvement of the Controlled Quantum Secure Direct Communication by Using Four Particle Cluster States | Int J Theor Phys | 2014, 53(5): 1495 -1501(SCI 检索) | SCI收录 | Zhenchao ZHU, AiQun HU and AnMin FU |
64 | 国外重要刊物 | Improved WOW adaptive image steganography method | International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2015. | SCI收录 | Xin Liao, Guoyong Chen, Qi Li | |
65 | 国外重要刊物 | Cryptanalysis and Improvement of an Efficient Authenticated Key Exchange Protocol with Tight Security Reduction | International Journal of Communication Systems | 2014, DOI: 10.1002/dac.2899. (SCI检索) | SCI收录 | S. Q. Lu, J. H. Zhao, Q. F. Cheng* |
66 | 国外重要刊物 | Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services | International Journal of Communication Systems, Wiley, | DOI:10.1002/dac2817 | SCI收录 | Mingwu Zhang, Yong Xia, Ou Ruan, Kirill Morozov |
67 | 国外重要刊物 | Yongzhuang Wei, Wenbin Yin, Fengrong Zhang, Enes Pasalic* | International Journal of Computer Mathematics | (DOI10.1080/00207160.2014.988148 | SCI收录 | Yongzhuang Wei, Wenbin Yin, Fengrong Zhang, Enes Pasalic* |
68 | 国外重要刊物 | The electronic cash system based on non-interactive zero-knowledge proofs[J] | International Journal of Computer Mathematics | ,2014, DOI: 10.1080/00207160.2014.933816 | SCI收录 | Fucai Zhou, Yuxi Li, Qingshi Zhou, Jingwei Miao , Jian Xu |
69 | 国外重要刊物 | Wenfen Liu, On Permutation Polynomials of the Form 2^{1+2^k}+L(x). | International Journal of Computer Mathematics, | pp. 1-8, Aug., 17, 2015 | SCI收录 | Xin Gong, Guangpu Gao* |
70 | 国外重要刊物 | Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing | International Journal of Computer Science Issues | 2015, 12(3): 10-15 | 其他收录 | Yinghui Zhang* |
71 | 国外重要刊物 | Subliminal-free Variant of Schnorr Signature with Provable Security | International Journal of Electronics and Information Engineering | 2015, 2(2): 59-68 | 其他收录 | Yinghui Zhang*, Hui Li, Xiaoqing Li, and Hui Zhu |
72 | 国外重要刊物 | Constructing New Piecewise Differentially 4-Uniform Permutations from Known APN Functions |
International Journal of Foundations of Computer Science | Vol. 26, No. 5 (2015) 599–609, DOI: 10.1142/S0129054115500331 | SCI收录 | Guangkui Xu, Xiwang Cao* |
73 | 国外重要刊物 | Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity | International Journal of Foundations of Computer Science | Vol. 26, No. 5 (2015) 537–556 DOI: 10.1142/S0129054115500306 | SCI收录 | Xiwang Cao*, Lei Hu, |
74 | 国外重要刊物 | Attribute–based signature schemes with accountability[J | International Journal of Information and Communication Technology | 2015, 7(2-3): 141-158. (EI) | EI收录 | Yan Ren, Chunming Tang*, Guilin Wang, et a |
75 | 国外重要刊物 | Practical Chosen Ciphertext Secure Hierarchical Identity-Based Broadcast Encryption. | International Journal of Information Security | pp 1-16, 24 April 2015 | SCI收录 | Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin |
76 | 国外重要刊物 | An Improved Automatic Search Method for Differential Trails in TEA Cipher | International Journal of Network Security | Vol. 18, No. 4, 2016, pp. 644-649 | EI收录 | Kaihao Chen, Xiaoming Tang, Peng Xu*, Man Guo, Guangpeng Song, Weidong Qiu, Zheng Gong |
77 | 国外重要刊物 | Tang. Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round | International Journal of Network Security, | 2015, 17(6): 678-682. (EI检索) | EI收录 | Q. F. Cheng*, C. M. Tang |
78 | 国外重要刊物 | Improved Fully Homomorphic Encryption over the Integers with Shorter Public Keys[J] | International Journal of Security and Its Applications, | Vol.8, No.6, (2014): 365-374. | EI收录 | Can Xiang, Chunming Tang* |
79 | 国外重要刊物 | Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol | International Journal of Theoretical Physics | 54(3), 910-916(2015) | SCI收录 | Yu-Guang Yang, Si-Jia Sun, Yan Wang |
80 | 国外重要刊物 | Trojan-horse attacks on quantum key distribution with classical Bob | International Journal of Theoretical Physics | 14(2), 681-686 (2015) | SCI收录 | Yu-Guang Yang, Si-Jia Sun, Qian-Qian Zhao |
81 | 国外重要刊物 | Quantum bit commitment with application in quantum zero-knowledge proof | ISAAC 2015 | EI收录 | Jun Yan*, Jian Weng, Dongdai Lin, Yujuan Quan | |
82 | 国外重要刊物 | Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures | ISPEC 2014 | : 359-372 | EI收录 | Yong Yu*, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia: |
83 | 国外重要刊物 | ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage | ISPEC'14 | LNCS 8434, pp. 481–495, 2014. | EI收录 | Mingwu Zhang |
84 | 国外重要刊物 | Differential Fault Analysis on the MD5 Compression Function |
Journal of Computers | 8(11), pp. 2888–2894, 2013.(EI: 20134616980998) |
EI收录 | W. Li, Z. Tao, D. Gu, Y. Li, Z. Liu, Y. Liu |
85 | 国外重要刊物 | Further results on permutation polynomials of the form over | Journal of Algebra and Its Applications | Vol. 15, No. 6 (2016) ,DOI: 10.1142/S0219498816500985 | SCI收录 | Guangkui Xu, Xiwang Cao*, Shanding X |
86 | 国外重要刊物 | Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server[J] | Journal of Ambient Intelligence and Humanized Computing | (2015) 6: 131–139 | SCI收录 | Can Xiang, Chunming Tang* |
87 | 国外重要刊物 | Construction of Multiplicative Monotone Span Program | Journal of Computational Information Systems. | 2014年11月 | EI收录 | Yuenai Chen, Chunming Tang* |
88 | 国外重要刊物 | Key Policy Attribute Based Proxy Re-encryption and RCCA Secure Scheme | Journal of Internet Services and Information Security | 2014, 4(2): 70-82 | 其他收录 | Keying Li*, Jianfeng Wang, Yinghui Zhang, and Hua Ma |
89 | 国外重要刊物 | Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels | Journal of Visual Communication and Image Representation | 28(4), pp. 21-27, 2015 | SCI收录 | Xin Liao*, Changwen Shu |
90 | 国外重要刊物 | User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion [J] | Journal of Visual Communication and Image Representation, | 2015, 29: 46-60 | 其他收录 | Duanhao Ou, Lili Ye, Wei Sun* |
91 | 国外重要刊物 | A Privacy Preserving Handover Authentication Scheme for WiMAX- WiFi Networks | KSII Transactions on Internet and Information Systems | vol.8,no.9,pp.3250-3265,September 2014. (SCI 检索) | SCI收录 | Anmin Fu *, Gongxuan Zhang, Yan Yu, Zhenchao Zhu |
92 | 国外重要刊物 | Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things | KSII Transactions on Internet and Information Systems | 9(2), pp. 793–810, 2015. (SCI) | SCI收录 | W. Li, W. Zhang, D. Gu, Z. Tao, Z. Zhou, Y. Liu, Z. Liu |
93 | 国外重要刊物 | Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. | KSII Transactions on Internet and Information Systems | 2014, 8(11): 4028-4049 | SCI收录 | Yinghui Zhang*, Xiaofeng Chen, Jin Li, Hui Li, and Fenghua Li |
94 | 国外重要刊物 | Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing | KSII Transactions on Internet and Information Systems | vol.9, no.4, pp.1321-1335, 2015 | SCI收录 | Jingyu Feng, Guangyue Lu* and Hong Chang |
95 | 国外重要刊物 | High payload image steganography with minimum distortion based on absolute moment block truncation coding [J] | Multimedia Tools and Applications | 2014,74(21): 9117-9137 | SCI收录 | Duanhao Ou, Wei Sun*. |
96 | 国外重要刊物 | Quantum-assisted encryption for digital audio signals | Optik | 126,3221-3226(2015) | SCI收录 | Yu-Guang Yang, Ju Tian, Si-Jia Sun, Peng Xu. |
97 | 国外重要刊物 | Reductions between private information retrieval and oblivious transfer at the quantum level. | Optik | 126,3206-3209(2015) | SCI收录 | Yu-Guang Yang, Si-Jia Sun, Qing-Xiang Pan, Peng Xu. |
98 | 国外重要刊物 | Quantum oblivious transfer based on unambiguous set discrimination. | Optik | 126,3838-3843(2015) | SCI收录 | Yu-Guang Yang, Si-Jia Sun, Qing-Xiang Pan, Peng Xu |
99 | 国外重要刊物 | Secure quantum private query with real-time security check | Optik | 125, 5538-5541 (2014) | SCI收录 | Yu-Guang Yang, Si-Jia Sun, Ju Tian, Peng Xu. |
100 | 国外重要刊物 | Quantum oblivious transfer with an untrusted third party. | Optik | 125,5409-5413(2014) | SCI收录 | Yu-Guang Yang, Peng Xu, Ju Tian, Hua Zhang. |
101 | 国外重要刊物 | Attribute-Based Data Sharing in Mobile Clouds | Pervasive and Mobile Computing. Online Publication | doi:10.1016/j.pmcj.2015.06.009. | SCI收录 | Yinghui Zhang*, Dong Zheng, Xiaofeng Chen, Jin Li, and Hui Li |
102 | 国内重要刊物 | SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems | Proc. WASA'15, Qufu, Shandong, China | August 10-12, 2015 | EI收录 | C. Lai*, R. Lu, and D. Zheng |
103 | 国外重要刊物 | "UGHA: Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks |
Proc. IEEE ICC'15, London, UK | June 8-12, 2015 | EI收录 | J. Cao*, Hui Li, MaodeMa, Fenghua Li |
104 | 国外重要刊物 | Towards Power Consumption-Delay Tradeoff by Workload Allocation in Cloud-Fog Computing | Proc. IEEE ICC'15, London, UK, | June 8-12, 2015 | EI收录 | R. Deng*, R. Lu, C. Lai, and T. H. Luan |
105 | 国外重要刊物 | GAHAP: A Group-based Anonymity Handover Authentication Protocol for MTC in LTE-A Networks | Proc. IEEE ICC'15, London, UK, | June 8-12, 2015 | EI收录 | J. Cao*, Hui Li, Maode Ma |
106 | 国外重要刊物 | Enhancing Privacy through Caching in Location-Based Services | Proc. IEEE INFOCOM 2015 | EI收录 | B. Niu*, Qinghua Li, Xiaoyan Zhu, Guohong Cao and Hui Li | |
107 | 国外重要刊物 | Achieving Secure Friend Discovery in Social Strength-Aware PMSNs |
Proc. IEEE MILCOM 2015 | EI收录 | B. Niu*, Yuanyuan He, Fenghua Li and Hui Li | |
108 | 国外重要刊物 | A New Encryption-Then-Compression Algorithm Using the Rate-Distortion Optimization | Proc. of IWDW 2015, | Oct., 2015 | EI收录 | 胡翔磊,倪江群(通信作者),潘润标 |
109 | 国外重要刊物 | Detecting Video Forgery By Estimating Extrinsic Camera Parameters | Proc. of SPIE MIPPR 2015. | Nov., 2015 | EI收录 | 欧俊海,倪江群(通信作者) |
110 | 国外重要刊物 | Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement | Quantum Inf Process | 2015, 14(11):4245–4254. (SCI 检索) | SCI收录 | Zhenchao ZHU, AiQun HU and AnMin FU |
111 | 国外重要刊物 | Private database queries using one quantum state | Quantum Information Processing | 14(3), 1017-1024(2015) | SCI收录 | Yu-Guang Yang, Ming-Ou Zhang, Rui Yang |
112 | 国外重要刊物 | Relativistic quantum private database queries | Quantum Information Processing | 14(4),1443-1450 (2015) | SCI收录 | Si-Jia Sun, Yu-Guang Yang, Ming-Ou Zhang |
113 | 国外重要刊物 | Quantum oblivious transfer with relaxed constraints on the receiver | Quantum Information Processing | 14,3031–3040(2015) | SCI收录 | Yu-Guang Yang, Rui Yang, He Lei,Wei-Min Shi, Yi-Hua Zhou |
114 | 国外重要刊物 | Analysis and improvement of the watermark strategy for quantum images based on quantum wavelet transform. | Quantum Information Processing | 13,1931-1936(2014) | SCI收录 | Yu-Guang Yang, Peng Xu, Ju Tian, Hua Zhang |
115 | 国外重要刊物 | Formal Analysis of the Real-time Multimedia Network Protocol ZRTP | Recent Advances in Electrical & Electronic Engineering | 2015, 8(1): 12-17. (EI: 20152400931645) | EI收录 | S. Q. Lu, W. B. Wang, Q. F. Cheng* |
116 | 国外重要刊物 | GBAAM: group-based access authentication for MTC in LTE networks | Security and Communication Networks, | 8 (17): 3282–3299, 2015 | SCI收录 | J. Cao*, M. Ma, H. Li, |
117 | 国外重要刊物 | Construction of resilient Boolean functions with highly nonlinearity and good algebraic immunity | Security and Communication Networks | vol.8, pp. 2909–2916, 2015. | SCI收录 | Lu-Yang Li, Wei-Guo Zhang* |
118 | 国外重要刊物 | High-capacity Reversible Data Hiding in Encrypted Images by Prediction Error [J] | Signal Processing | 2014, 104: 387-400 | SCI收录 | Xiaotian Wu, Wei Sun* |
119 | 国外重要刊物 | Secure medical information sharing in cloud computing | Technology and Health Care | 2015, 23(2015):s133-s137. | SCI收录 | Zhiyi Shao, Bo Yang, Wenzheng Zhang, Yi Zhao, Zhenqiang Wu and Meixia Miao |
120 | 国外重要刊物 | Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. | The 8th International Conference on Provable Security (ProvSec’14) | LNCS 8782, 2014, pp. 259-273 | EI收录 | Yinghui Zhang*, Dong Zheng, Xiaofeng Chen, Jin Li, and Hui Li |
121 | 国外重要刊物 | Kirill Morozov: LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces | The Journal of Supercomputing | 70(3): 1405-1432 (2014) | SCI收录 | Mingwu Zhang, Chunzhi Wang |
122 | 国外重要刊物 | The higher-order meet-in-the-middle attack and its application to the Camellia block cipher | Theoretical Computer Science | 527, (2014), pp.102–122 | SCI收录 | Jiqiang Lu*,Yongzhuang Wei, Jongsung Kimd, Enes Pasalice |
123 | 国外重要刊物 | Practical (Fully) Distributed Signatures Provably Secure in the Standard Model. | Theoretical Computer Science | vol. 595, pp.143-158, 2015. | EI收录 | Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu, Yong Ding |
124 | 国外重要刊物 | Nframe: A Privacy-preserving with Non-frameability Handover Authentication Protocol Based on (t,n) Secret Sharing for LTE/LTE-A Networks | Wireless Networks, | under the second review. (SCI 检索源刊) | SCI收录 | Anmin Fu*, Ningyuan Qin, Yongli Wang, Qianmu Li, Gongxuan Zhang, |
125 | 国内重要刊物 | 基于随机路径点移动模型的 MANET 容量及延迟分析 [J] | 北京科技大学学报 | 2014,v36, n10, p1400-1410 | EI收录 | 王晓菲, 蔡英*, 范艳芳 |
126 | 国内重要刊物 | 基于协作的社交位置隐私保护方案 | 北京信息科技 大学学报 |
2015,30(5):61-66 | 其他收录 | 汤飞,蔡英*,范艳芳,夏红科 |
127 | 国内重要刊物 | 一种高效的移动数据卸载方案 | 北京信息科技大 学学报 | 2015,30(4):80-84. | 其他收录 | 倪明云,蔡英*,夏红科,范艳芳 |
128 | 国内重要刊物 | 具有隐私保护的云存储访问控制方案 | 电子科技 | 2015, 28(6): 61-63. | 其他收录 | 张应辉*, 郑东, 马华 |
129 | 国内重要刊物 | 一类周期为素数倍数的跳频序列族 | 电子学报, | Vol. 43,No. 10, 2015, 1932-1935. | 其他收录 | 徐善顶,曹喜望,许广魁 |
130 | 国内重要刊物 | 基于属性的指定证实人签名方案 | 广州大学学报 | 2014年6月 | 其他收录 | 任燕,唐春明* |
131 | 国内重要刊物 | 针对空域明文LSB隐写的消息提取方法. | 华中科学技术大学学报(自然科学版) | 43(5):73-78, 2015 | EI收录 | 刘九芬,王俊超,韩涛 |
132 | 国内重要刊物 | 针对LBlock算法的踪迹驱动Cache攻击 | 计算机工程 | 41(5), pp.153–158, ( 2015). | 其他收录 | 朱嘉良,韦永壮* |
133 | 国内重要刊物 | 无线局域网中基于身份签名的接入认证方案 | 计算机工程 | 2014,40(12):108-113. | 其他收录 | 王志蓬,林慕清,季东杰,徐剑* |
134 | 国内重要刊物 | 异构无线网络中基于自更新哈希链的不可否认 性计费协议 | 计算机科学 | vol. 42, no. 3, pp. 111-116,2015 年 3 月 | 其他收录 | 陈守国,付安民*,秦宁元 |
135 | 国内重要刊物 | LTE/LTE-A 网络中基于盲签名的具有条件隐私 保护的切换认证协议 | 计算机科学 | vol. 42, no. 8, pp. 145-151,2015 年 8 月 | 其他收录 | 秦宁元,付安民*,陈守国 |
136 | 国内重要刊物 | 隐私保护的推理机策略函数加密及应用 | 计算机学报, | 38(4): 897-908, (2015) | EI收录 | 张明武, 杨波, 王春枝, Tsuyoshi Takagi. |
137 | 国内重要刊物 | 可证安全的移动互联网络匿名漫游协议 | 计算机学报. | 4.2015, 38(4):733-748. | EI收录 | 周彦伟, 杨波, 张文政 |
138 | 国内重要刊物 | 云端多管理者群组共享数据中具有隐私 保护的公开审计方案 | 计算机研究与发展 | vol. 52, no. 10, pp. 2353-2362,2015。(EI 检索) | EI收录 | 付安民*,秦宁元,宋建业,苏铓 |
139 | 国内重要刊物 | 支持协作的强制访问控制模型[J] | 计算机研究与发展 | 2015, 52(10): 2411-2421 |
其他收录 | 范艳芳,蔡英 |
140 | 国内重要刊物 | 11轮3D分组密码算法的中间相遇攻击 | 计算机应用 | 35( 3), pp.700–703, ( 2015). | 其他收录 | 李灵琛,韦永壮*, 朱嘉良 |
141 | 国内重要刊物 | DAFE-AC: 支持动态授权和文件评价的访问控制机制 | 计算机应用 | 2015, 35(4): 964-967 | 其他收录 | 张悦*, 郑东, 张应辉 |
142 | 国内重要刊物 | 可否认的基于属性的指定证实人签名方案 | 计算机应用研究 | 2014年1月. | 其他收录 | 任燕,唐春明 |
143 | 国内重要刊物 | 安全协议形式化工具分析比较研究 | 密码学报 | 2014, 1(6): 568-577 | 其他收录 | 陆思奇, 程庆丰*, 赵进华 |
144 | 国内重要刊物 | 三次旋转对称Bent函数的构造 | 密码学报 | 2015, 2(4): 372-380. | 其他收录 | 高光普*, 程庆丰, 王磊 |
145 | 国内重要刊物 | 密文长度恒定且属性直接可撤销的基于属性的加密 | 密码学报 | 2014, 1(5): 465-480 | 其他收录 | 张应辉*, 郑东, 李进, 李晖 |
146 | 国内重要刊物 | 三次旋转对称bent函数的构造 | 密码学报 | vol. 2. No. 4, pp. 372-380, 2015. | 其他收录 | 高光普*, 程庆丰, 王磊 |
147 | 国内重要刊物 | 物联网移动节点直接匿名漫游认证协议 | 软件学报 | 3.2015, 26(9): 2436−2450. | 其他收录 | 周彦伟, 杨波 |
148 | 国内重要刊物 | 使用ECC的身份混合签密方案 | 软件学报 | 2015, 26(12): 1-9. | 其他收录 | 俞惠芳, 杨波 |
149 | 国内重要刊物 | UVDA: 自动化融合异构安全漏洞库框架的设计与实现[J] | 通信学报 | 2015, 36(10): 235-244 | EI收录 | 温涛, 张玉清, 刘奇旭 |
150 | 国内重要刊物 | 新型组织隐藏的认证密钥交换协议 | 通信学报 | 第36卷第九期,82-90,2015.9 | EI收录 | 温雅敏,龚征* |
151 | 国内重要刊物 | 多样化的可控匿名通信系统 | 通信学报. | 5.2015, 36(6):2015138. | 其他收录 | 周彦伟, 吴振强, 杨波 |
152 | 国内重要刊物 | 认证加密算法SCREAM及iSCREAM的新伪造攻击 | 网络与信息安全学报 | 其他收录 | 田玉丹,韦永壮* | |
153 | 国内重要刊物 | 混合签密综述. | 西安邮电大学学报 | 2015, 20(3): 1-10 | 其他收录 | 俞惠芳, 杨波, 张文政 |
154 | 国内重要刊物 | 云计算环境下的安全 | 西安邮电大学学报 | 2015,20(4):1-9. | 其他收录 | 邵志毅,杨波,张文政 |
155 | 国内重要刊物 | “基于 AVISPA 的快速切换认证协议 FHAM 的安 全建模与检测 | 信息网络安全 | 2014,05:21-25 | 其他收录 | 秦宁元,付安民*,陈守国 |
156 | 国内重要刊物 | 计算量和密文长度恒定的基于属性的加密 | 中国密码学会2014年会 (ChinaCrypt’14) | 2014, 244-252 | 其他收录 | 张应辉*, 郑东, 陈晓峰, 李进, 李晖 |
157 | 国外重要刊物 | Mutual dependency of features in multi-biometric systems | Electronics Letters | 1.Jiankun Hu 2.Song Wang 3.陈驰 | ||
158 | 国内重要刊物 | 基于相似查询树的快速密文检索方法 | 通信学报 | 1.陈驰 2.朱晓杰 3.申培松 | ||
159 | 国外重要刊物 | On affine sub-families of Grain-like structures | Jouranl of Cryptology | 1.姜宇鹏 2.林东岱 | ||
160 | 国外重要刊物 | A Note On Generating Coset Representatives of $PGL-2(q)$ in $PGL_2(q∧2)$ | Information Processing Letters | 2015 | EI收录 | 1.庄金城 2.程岐 |
161 | 国外重要刊物 | 简易物联网关键技术与挑战 | Jouranl of Cryptologic Research | 2015年,卷:2,期:1,页:40-53 | CSCD收录 | 武传坤 |
162 | 国内重要刊物 | 基于纠错码的RFID认证协议 | 计算机应用研究 | 2015年,卷:153,页:41-47 | EI收录 | 1.赵欢 2.武传坤 |
163 | 国内重要刊物 | 基于透明加解密的密文云存储系统的设计与实现 | 计算机应用 | 1.薛锐 2.陈驰 3.邹洪 4.陈力 | ||
164 | 国内重要刊物 | RFID快速隐私保护认证协议 | 软件学报 | 翟黎 | ||
165 | 国内重要刊物 | A modified product code with high payload in steganography | 电子学报 | 1.张凌宇 2.赵险峰 3.关晴骁 | ||
166 | 国内重要刊物 | 海云安全体系架构 | 中国科学:信息科学 | 2015年,卷:45,期:6,页:796~816 | 其他收录 | 1.章睿 2.薛锐 3.林东岱 |
167 | 国外重要刊物 | Results on Highly Nonlinear Boolean Functions with Provably Good Immunity to Fast Algebraic Attacks | Information Sciences | 3 | 1.刘美成 2.林东岱 | |
168 | 国内重要刊物 | Solving Discrete Logarithm Problem in p-Groups on Elliptic Curves over F_{p^n} by Lifting | 电子学报 | 1.朱玉清 2.庄金城 3.林东岱 | ||
169 | 国内重要刊物 | 模2^k加法的差分性质分析 | 密码学报 | 2015年,卷:2,期:2页:122-138 | CSCD收录 | 1.翟黎 2.武传坤 |
170 | 国内重要刊物 | Improved Domain Extender for the Ideal Cipher | 密码与通信 | 2015年卷:7期:4页:509~533 | SCI收录 | 1.郭淳 2.林东岱 |
171 | 国内重要刊物 | 可验证技术研究进展 | 中国科学:信息科学 | 2015年,卷:45,期:11,页:1370~1388 | 其他收录 | 1.薛锐 2.吴迎 3.刘牧华 4.张良峰 5.章睿 |
172 | 国内重要刊物 | 物联网感知层安全检测技术研究 | 通信学报 | 1.白鲲鹏 2.皮兰 3.武传坤 4.刘海峰 5.赵章界 | ||
173 | 国内重要刊物 | Image composite authentication using a single shadow observation | 中国科学:信息科学 | 1.操晓春 2.赵汉东 3.王川 4.张炜 | ||
174 | 国内重要刊物 | Active Link Selection for Efficient Semi-supervised Community Detection | 科学报道 | 1.杨亮 2.金弟 3.王啸 4.操晓春 | ||
175 | 国内重要刊物 | Total Variation Regularized RPCA for lrregularly Moving Object Detection under Dynamic Background | 电气和电子工程师协会控制论学报 | 1.操晓春 2.杨亮 3.郭晓杰 | ||
176 | 国外重要刊物 | 布尔环上基于线性代数的Groebner基符号处理函数实现问题/On Implementing the Symbolic Preprocessing Funtion over Boolean Polynomial Rings in Groebner Basis Algorithms Using Linear Algebra | Journal of Systems Science and Complexity | 1.孙瑶 2.黄震宇 3.林东岱 4.王定康 | ||
177 | 国内重要刊物 | A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization | 电气和电子工程师协会控制论学报 | 1.杨亮 2.操晓春 3.金弟 4.王啸 5.孟丹 | ||
178 | 国内重要刊物 | Motion Vector-based Video Steganography with Preserved Local Optimality | 多媒体工具与应用 | 2015 | EI收录 | 1.张弘 2.曹纭 3.赵险峰 |
179 | 国外重要刊物 | An Efcient Privacy-Preserving Ranked Keyword Search Method | IEEE期刊 | 1.陈驰 2.朱晓杰 3.申培松 4.Jiankun Hu 5.Song Guo 6.Zahir Tari 7.Albert Y.Zomaya | ||
180 | 国外重要刊物 | The KDM-CCA Security of the Kurosawa-Desmedt Scheme | IEICE Transactions on fundamentals of electronics communications and computer sciences | 2015年,卷:E98A,期:4,页:1032~1037 | SCI收录 | 1.常金勇 2.薛锐 3.张安玲 |
181 | 国内重要刊物 | PFA:Privacy-aware Federal Authentication Scheme for WLAN-MONET Environment | 电子学报英文版 | 1.吴槟 2.咸鹤群 3.芦翔 4.阮书涵 | ||
182 | 国外重要刊物 | Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption | IEEE Transactions on Information Forensics&Secruity | 2015年 卷:10 期:10页:2119~2130 | SCI收录 | 1.林素青 2.张锐 3.马晖 4.王明生 |
183 | 国内重要刊物 | 基于白盒密码的DCAS终端安全芯片方案 | 计算机研究与发展 | 1.许涛 2.武传坤 3.张卫明 | ||
184 | 国外重要刊物 | On the Primary Constructions of Vectorial Boolean Bent Functions | IEEE信息理论 | 1.徐玉威 2.武传坤 | ||
185 | 国外重要刊物 | Comments on ``Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption'' | IEEE取证和安全信息 | 1.马晖 2.张锐 3.袁巍 | ||
186 | 国内重要刊物 | Separating Invertible Key Derivations from Non-invertible Ones: Sequential Indifferentiability of 3-Round Even-Mansour | 设计、编码与密码学 | 2015年 | SCI收录 | 1.郭淳 2.林东岱 |
187 | 国内重要刊物 | Three new infinite families of bent functions | 中国科学:信息科学 | 1.王立波 2.吴保峰 3.刘卓军 4.林东岱 | ||
188 | 国内重要刊物 | Transferred Human Parsing with Video Context | 多媒体研究杂志 | 1.刘偲 2.梁晓丹 3.刘洛麒 4.林倞 5.吕科 6.操晓春 7.颜水成 | ||
189 | 国内重要刊物 | 一种FAT32文件系统中文件恢复方法 | 网络新媒体技术文 | 1.顾广宇 2.张淑娟 3.王雪飞 4.蔡翔 5.袁巍 | ||
190 | 国外重要刊物 | An Integer Programming Based Bound for Locally Repairable Codes | IEEE Transactions on Information Theory | 1.王安宇 2.张志芳 | ||
191 | 国内重要刊物 | 一种FAT32文件系统中文件恢复方法 | The computer Journal | 1.顾广宇 2.张淑娟 3.王雪飞 4.蔡翔 5.袁巍 | ||
192 | 国外重要刊物 | Adaptively Unified Semi-Supervised Dictionary Learning with Active Points | IET Information Security | 2015 | EI收录 | 1.王晓波 2.郭晓杰 3.李子青 |
193 | 国外重要刊物 | Bits hardness of the CDH Problem and related DH schemes over prime fields | Security and Communication Networks | 1.王明强 2.吴铤 3.庄金城 | ||
194 | 国内重要刊物 | An AES-Like Cipher and Its White-Box Implementation | The computer Journal | 1.白鲲鹏 2.武传坤 | ||
195 | 国外重要刊物 | A Secure White-Box AES Implementation | IET Information Security | 1.白鲲鹏 2.武传坤 | ||
196 | 国外重要刊物 | A Secure White-Box SM4 Implementation | Security and Communication Networks | 1.白鲲鹏 2.武传坤 | ||
197 | 国内重要刊物 | On $s$-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers | 中国科学:信息科学 | 1.姜宇鹏 2.郑群雄 3.林东岱 | ||
198 | 国内重要刊物 | 基于相似查询树的快速密文检索方法 | 软件学报 | 1.陈驰 2.朱晓杰 3.申培松 | ||
199 | 国内重要刊物 | Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in cloud computing | 电气电子工程师学会可信安全计算期刊 | 1.马晖 2.张锐 3.万志国 4.卢尧 5.林素青 | ||
200 | 国内重要刊物 | Forensics of Hidden Information Processed by Two Steganography Tools | 计算机科学 | 1.李金才 2.易小伟 3.赵险峰 | ||
201 | 国内重要刊物 | RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms | 中国科学 | 2015年,卷:58,期:122102(15),页:1-15 | SCI收录 | 1.张文涛 2.包珍珍 3.林东岱4.Vincent Rijmen 5.Yang BoHan 6.Ingrid Verbauwhede |
202 | 国内重要刊物 | On affine sub-families of Grain-like structures | 设计、编码与密码学 | 1.姜宇鹏 2.林东岱 | ||
203 | 国外重要刊物 | On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation | 第12届国际密码学会密码学理论会议 | 2015年:110~133页 | EI收录 | 1.郭淳 2.林东岱 |
204 | 国外重要刊物 | PS bent functions constructed from finite pre-quasifield spreads | 2015IEEE信息论国际研讨会 | 1.吴保峰 2.林东岱 | ||
205 | 国外重要刊物 | Output Feature Augmented Lasso | 2014ICDM国际数据挖掘大会 | 1.张长青 2.韩亚洪 3.郭晓杰 4.操晓春 | ||
206 | 国外重要刊物 | Constructing Boolean Functions With (Potentially) Optimal Algebraic Immunity Based on Multiplicative Decompositions of Finite Fields | 2015IEEE信息论国际研讨会 | 2015,pages:491~495 | EI收录 | 1.吴保峰 2.郑嘉 3.林东岱 |
207 | 国外重要刊物 | New classes of quadratic semi-bent functions in polynomial forms with coefficients in extension fields | 2015IEEE信息论国际研讨会 | 1.吴保峰 2.林东岱 | ||
208 | 国外重要刊物 | On The Dual of Generalized Boolean Bent Functions over Z4 | 2015IEEE信息论国际研讨会 | 2015,pages:506~510 | EI收录 | 1.吴保峰 2.林东岱 |
209 | 国外重要刊物 | Improved N-gram Approach for Cross-site Scripting Detection in Online Social Network | 2015年IEEE科学与信息技术联合会议 | 1.王蕊 2.贾晓启 3.李沁蕾 4.张道娟 | ||
210 | 国外重要刊物 | An Adaptive Detecting Strategy against Motion Vector-Based Steganography | 多媒体与博览国际会议 | 2015,pages:1-6 | EI收录 | 1.王培培 2.曹纭 3.赵险峰 4.于海波 |
211 | 国外重要刊物 | HCSF: a hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search | 第10届IEEE工业电子和应用国际会议 | 2015年:290~295 | EI收录 | 1.朱晓杰 2.陈驰 3.田雪 4.Jiankun Hu |
212 | 国外重要刊物 | Searching Cubes for Testing Boolean Functions and Its Application to Trivium | The 2015 IEEE International Symposium on Information Theory | 2015年:496~500页 | EI收录 | 1.刘美成 2.林东岱 |
213 | 国外重要刊物 | CONSTRUCTION OF CUBIC ROTATION SYMMETRIC BENT FUNCTIONS IN POWER-OF-TWO VARIABLES | The 2015 IEEE International Symposium on Information Theory | 2015年:486~490页 | EI收录 | 1.王天择 2.刘美成 3.赵尚伟 4.林东岱 |
214 | 国外重要刊物 | Statistically Undetectable Video Steganography Based on Optimized Motion Estimation Perturbation | 第三届ACM信息隐藏暨多媒体安全会议 | 1.曹纭 2.张弘 3.赵险峰 4.于海波 | ||
215 | 国外重要刊物 | A Fast Implementation of MPC-KSA Side-Channel Distinguisher | IEEE计算机通信与网络国际学术会议 | 2015年:1~7页 | EI收录 | 1.郑超 2.周永彬 3.郑英显 |
216 | 国外重要刊物 | A TCM-Based Remote Anonymous Attestation Protocol for Power Information System | 第三届能源、电力与环境工程国际会议 | 1.陈锐忠 2.魏理豪 3.邹洪 4.翟梅洁 | ||
217 | 国外重要刊物 | Security Classification-Based Access of Power Information System | 第三届能源、电力与环境工程国际会议 | 1.赵延帅 2.钱扬 3.陈锐忠 4.马红霞 | ||
218 | 国外重要刊物 | Motion Vector Reversion-Based Steganalysis Revisited | 信号和信息处理国际会议中国峰会 | 1.王培培 2.曹纭 3.赵险峰 4.吴槟 | ||
219 | 国外重要刊物 | Generalized Tensor Total Variation Minimization for Visual Data Recovery | 计算机视觉与模式识别国际会议 | 2015 | EI收录 | 1.郭晓杰 2.马毅 |
220 | 国外重要刊物 | Robust Subspace Segmentation by Simultaneously Learning Data Representations and Their Affinity Matrix | 人工智能国际联合大会 | 2015年:3547-3553 | EI收录 | 郭晓杰 |
221 | 国外重要刊物 | Online Robust Low Rank Matrix Recovery | 人工智能国际联合大会 | 2015年:3540-3546 | EI收录 | 郭晓杰 |
222 | 国外重要刊物 | Factor base Discrete logarithms in Kummer Extensions | 2015亚密会 | 1.肖佃艳 3.程岐 | ||
223 | 国外重要刊物 | Esting Differential-Linear Distinguishers and Application to CTC2 | 2015年信息安全实践与经验国际会议 | 2015年:220~234页 | EI收录 | 1.郭淳 2.张海龙 3.林东岱 |
224 | 国外重要刊物 | Leakage Prevention Method for Structured Data Based on Hierarchical Classification | 2015年计算机科学与智能通信国际会议 | 1.唐亮亮 2.林泽鑫 3.陈锐忠 4.马红霞 | ||
225 | 国外重要刊物 | A data recovery method for NTFS files system | 2015第二届计算机工程与信息技术国际学术研讨会 | 1.顾广宇 2.张淑娟 3.王雪飞 4.蔡香 5.丁锟 6.苏帅 | ||
226 | 国外重要刊物 | A data recovery method for FAT32 files system | 2015第二届计算机工程与信息技术国际学术研讨会 | 1.顾广宇 2.张淑娟 3.王雪飞 4.蔡香 5.苏帅 6.丁锟 | ||
227 | 国外重要刊物 | A Practical Method to Determine Achievable Rates for Secure Steganography | 第17届高性能计算与通信国际会议 | 1.张凌宇 2.陈雕 3.曹纭 4.赵险峰 | ||
228 | 国外重要刊物 | Dynamic Game Access Control based on Trust | 第14届可信、安全与隐私计算通信国际会议 | 2015年 | EI收录 | 马书南 |
229 | 国外重要刊物 | A Similarity Evaluation Algorithm and Its Application in Multi-Keyword Search on Encrypted Cloud Data | IEEE MCC | 2015年:1218~1223 | EI收录 | 1.申培松 2.陈驰 3.田雪 |
230 | 国外重要刊物 | Efficient Keyword Search for Public-Key Setting | 军事通信国际会议 | 2015年:1236~1241 | EI收录 | 1.章睿 2.薛锐 |
231 | 国外重要刊物 | A Note on Generating Coset Representatives of $PGL_2(q)$ in $PGL_2(q^2)$ | 信息安全与密码学国际会议2015 | 1.庄金城 2.程岐 | ||
232 | 国外重要刊物 | Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control | 第九届网络与系统安全国际会议 | 2015,pages:254-267 | EI收录 | 1.马晖 2.张锐 |
233 | 国外重要刊物 | Video Steganalysis Based on Intra Prediction Mode Calibration | 数字取证和水印国际研讨会2015 | 2015,pages:25-31 | EI收录 | 1.赵砚彬 2.张弘 3.曹纭 4.王培培 5.赵险峰 |
234 | 国外重要刊物 | A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers | 21届密码学、信息安全理论与应用年会 | 2015年:389~410页 | EI收录 | 1.郭淳 2.林东岱 |
235 | 国外重要刊物 | A New Construction of Tagged Visual Cryptography Scheme | 数字取证和水印国际研讨会2015 | 1.任亚唯 2.刘峰 3.林东岱 4.冯荣权 5.王文 | ||
236 | 国外重要刊物 | An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion | 数字取证和水印国际研讨会2015 | 1.王文 2.刘峰 3.闫伟齐 4.沈刚 5.郭腾 | ||
237 | 国外重要刊物 | A Lightweight Code-based Authentication Protocol for RFID Systems | 第六届信息安全应用与技术国际会议 | 1.刘卓华 2.张伟 3.武传坤 | ||
238 | 国外重要刊物 | A data recovery method for NTFS files system | 2015信息安全应用与技术国际会议 | 1.彭泽武 2.冯歆尧 3.唐亮亮 4.翟梅洁 | ||
239 | 国外重要刊物 | Leakage Prevention Method for Unstructured Data Based on Classification | 2015信息安全应用与技术国际会议 | 1.李皓 2.彭泽武 3.冯歆尧 4.马红霞 | ||
240 | 国外重要刊物 | The Design and Implementation of Data Security Management and Control Platform | 2015信息安全应用与技术国际会议 | 1.邹洪 2.钱扬 3.赵廷帅 4.丁锟 | ||
241 | 国外重要刊物 | The Method and System Implementation of Unstructured Data Tracking and Forensics | 2015信息安全应用与技术国际会议 | 1.顾广宇 2.张淑娟 3.王雪飞 4.蔡翔 5.陈盛 | ||
242 | 国外重要刊物 | Factor Base Discrete logarithms in Kummer Extensions | RSA会议2016 | 1.肖佃艳 2.庄金成 3.程岐 | ||
243 | 国外重要刊物 | 一种FAT32文件系统中文件恢复方法 | 中国声学学会第十一届青年学术会议 | 1.顾广宇 2.张淑娟 3.王雪飞 4.蔡翔 5.袁巍 | ||
244 | 国外重要刊物 | Adaptively Unified Semi-Supervised Dictionary Learning with Active Points | 计算机视觉国际大会 | 2015 | EI收录 | 1.王晓波 2.郭晓杰 3.李子青 |
245 | 国内重要刊物 | Bits hardness of the CDH Problem and related DH schemes over prime fields | 公钥密码会议 | 1.王明强 2.吴铤 3.庄金城 | ||
246 | 国外重要刊物 | Higher-Order Masking Schemes for SIMON | 2015国际信息与通信安全会议 | 2015年 | EI收录 | 1.唐杰辉 2.周永彬 3.张海龙 4.邱爽 |
247 | 国外重要刊物 | An Approach for Mitigating the Vulnerabilities in Practical SSO systems | 第11届中国国际信息安全与密码学国际会议 | 2015年 | EI收录 | 1.李孟豪 2.杨亮 3.袁子牧 4.薛锐 5.章睿 |
248 | 国外重要刊物 | A New cryptographic Analysis of 4-bit S-Boxes | 第11届中国国际信息安全与密码学国际会议 | 2015年 | EI收录 | 1.程玲 2.张文涛 3.向泽军 |
249 | 国外重要刊物 | Bitsliced Implementations of the PRINCE,LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers | 第17届信息与通信安全国际会议 | 2015年 | EI收录 | 1.包珍珍 2.张文涛 3.罗鹏 4.林东岱 |
250 | 国外重要刊物 | Event Analogy Based Privacy Preservation in Visual Surveillance | 第七届太平洋地区图像和视频技术研讨会 | 1.闫伟齐 2.刘峰 | ||
251 | 国外重要刊物 | Verifiable Proxy Re-encryption from Indistinguishability obfuscation | 第17届信息与通信安全国际会议 | 2015年 | EI收录 | 1.刘牧华 2.吴迎 3.常金勇 4.薛锐 5.郭威 |
252 | 国外重要刊物 | Forensics of Hidden Information Processed by Two Steganography Tools | 第5届全国计算机取证技术研讨会 | 1.李金才 2.易小伟 3.赵险峰 | ||
253 | 国外重要刊物 | A Solution of Code Authentication on Android | 第17届信息与通信安全国际会议 | 1.张雪 2.张锐 | ||
254 | 国内重要刊物 | 基于相似查询树的快速密文检索方法 | 软件学报--香山专题研讨会 | 1.陈驰 2.朱晓杰 3.申培松 | ||
255 | 国外重要刊物 | Accelerating the DCTR features extraction for JPEG steganalysis based on CUDA | 2016IS&T电子成像技术国际会议 | 1.夏超 2.关晴骁 3.赵险峰 4.邓永 | ||
256 | 国内重要刊物 | 特征3有限域上椭圆曲线的Co-Z Montgomery算法 | 计算机学报 | 已接收 | EI收录 | 于伟、李宝、王鲲鹏、李维晅、田松 |
257 | 国外重要刊物 | Constructing permutations and complete permutations over finite fields via subfield-valued polynomials | Finite Fields and Their Applications | Volume 31, 162-177 | SCI收录 | Zhengbang Zha, Lei Hu, Xiwang Cao |
258 | 国外重要刊物 | The weight distributions of two classes of binary cyclic codes. | Finite Fields and Their Applications | Volume 34, 192-207 | SCI收录 | Xiaoqiang Wang, Dabin Zheng, Lei Hu, Xiangyong Zeng |
259 | 国外重要刊物 | A secure delegation scheme of large polynomial computation in multi-party cloud | Int. J. of Grid and Utility Computing | 6 | EI收录 | 郭姝/徐海霞 |
260 | 国外重要刊物 | The weight distribution of a family of p-ary cyclic codes | Designs, Codes and Cryptography | Volume 75, 263-275 | SCI收录 | Dabin Zheng, Xiaoqiang Wang, Xiangyong Zeng, Lei Hu |
261 | 国外重要刊物 | Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks | Designs, Codes and Cryptography | Volume 76, 279-305 | SCI收录 | Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan: |
262 | 国内重要刊物 | Boolean functions with four-valued Walsh spectra | Journal of Systems Science and Complexity | Volume 28, 743-754 | SCI收录 | Zhiqiang Sun, Lei Hu |
263 | 国外重要刊物 | Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications | IEEE Transactions on Information Theory | Volume 61, 1491-1495 | SCI收录 | Zhengbang Zha, Lei Hu |
264 | 国外重要刊物 | HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches | IEEE Transactions on Knowledge and Data Engineering | volume:27 issue:8 page:2109-2202 | EI收录 | Thimma, Manogna、Liu, Fang、林璟锵、罗勃 |
265 | 国外重要刊物 | Improved MILP Modeling for Automatic Security Evaluation and Application to FOX | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | Volume 98-A, 72-80 | SCI收录 | Kexin Qiao, Lei Hu, Siwei Sun, Xiaoshuang Ma, Haibin Kan |
266 | 国外重要刊物 | RIKE+: Using revocable identities to support key escrow in public key infrastructures with flexibility | IET Information Security | volume:9 issue:2 page:136-147 | EI收录 | 林璟锵、朱文涛、王琼霄、张楠、荆继武、高能 |
267 | 国外重要刊物 | Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes |
Int. J. Information and Computer Security | 7 | EI收录 | 徐海霞/李宝/梅其祥 |
268 | 国外重要刊物 | Ciphertext-auditable identity-based encryption | International Journal of Network Security | 17 | EI收录 | Lin, Changlu; Li, Yong; Lv, Kewei; Chang, Chin-Chen |
269 | 国内重要刊物 | DSP平台上基于PUF的两种真随机数产生方法研究 |
信息网络安全 | 186-190 | 其他收录 | 李飞,刘宗斌,章庆隆,林璟锵 |
270 | 国内重要刊物 | Android数据安全存储平台的设计与实现 | 信息网络安全 | 113-118 | 其他收录 | 田伟,高能,王平建,张令臣 |
271 | 国内重要刊物 | 在桌面虚拟化系统中实施国产密码算法 | 中国科学院大学学报 | volume:32 issue:5 page:701-707 | 其他收录 | 林雪燕、林璟锵、管乐、王雷 |
272 | 国内重要刊物 | 基于AD的私有云存储访问控制实现方案 | 中国科学院大学学报 | Volume:32 Issue:5page:676-681 | 其他收录 | 李从午,潘无穷,林璟锵 |
273 | 国内重要刊物 | 关于区间上离散对数问题的改进算法 | 密码学报 | 录用 | 其他收录 | 王瑶,吕克伟 |
274 | 国外重要刊物 | A quantum algorithm for approximating the influences of Boolean functions and its applications | Quantum Information Processing | 11 | SCI收录 | 李红伟、杨理 |
275 | 国外重要刊物 | Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services | ACSAC2015 | 其他收录 | Chen Cao,Neng Gao,Peng Liu,Ji Xiang | |
276 | 国外重要刊物 | TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices | the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) | 其他收录 | He Sun, Kun Sun , Yuewu Wang , and Jiwu Jing |
|
277 | 国外重要刊物 | Reliable and Trustworthy Memory Acquisition on Smartphones | Transaction on Forensics and Security | 其他收录 | He Sun, Kun Sun ; Yuewu Wang ; Jiwu Jing | |
278 | 国外重要刊物 | TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens | the 22nd ACM Conference on Computer and Communications Security (CCS) | 其他收录 | He Sun, Kun Sun , Yuewu Wang , and Jiwu Jing |
|
279 | 国外重要刊物 | vbox: Proactively establishing secure channels between wireless devices without prior knowledge | 20th European Symposium on Research in Computer Security | 其他收录 | 王伟,林璟锵,王展,王泽,夏鲁宁 | |
280 | 国外重要刊物 | WAVE: Secure wireless pairing exploiting human body movements | the 8th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things | 其他收录 | 王伟,王展 ,朱文涛,王磊 | |
281 | 国外重要刊物 | MobiPluto:File System Friendly Deniable Storage for Mobile Devices | Annual Computer Security Applications Conference | 其他收录 | 常冰,王展,陈波,张锋巍 | |
282 | 国内重要刊物 | 无线环境下的密钥管理技术的发展现状及趋势 | 全国电子认证技术交流大会 | 其他收录 | 贾兆宏,杨玲 | |
283 | 国外重要刊物 | Extracting Robust Keys from NAND Flash Physical Unclonable Functions | IFIP International Information Security Conference | 其他收录 | 贾世杰、夏鲁宁、王展、林璟锵、张国柱、嵇亚飞 | |
284 | 国外重要刊物 | An Efficiency Optimization Scheme for the On-the-fly Statistical Randomness Test | IEEE International Conference on Cyber Security and Cloud Computing | 其他收录 | 陈天宇、马原、林璟锵、王展、荆继武 | |
285 | 国外重要刊物 | Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication | International Conference on Information and Communications Security | 其他收录 | 嵇亚飞、夏鲁宁、林璟锵、周健、张国柱、贾世杰 | |
286 | 国外重要刊物 | Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory | 36th IEEE Symposium on Security and Privacy | 其他收录 | 管乐、林璟锵、罗勃、荆继武、汪婧 | |
287 | 国外重要刊物 | A complete classification of quantum public-key encryption protocols | SPIE Security+Defence 2015 | 其他收录 | 吴辰苗、杨理 | |
288 | 国外重要刊物 | Quantum differential cryptanalysis to the block ciphers | The 6th International Conference on Applications and Technologies in Information Security | 其他收录 | 李红伟、杨理 | |
289 | 国外重要刊物 | Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption: | ACISP2015 | 其他收录 | Tingting Zhang, Hongda Li, Guifang Huang | |
290 | 国外重要刊物 | Fully Leakage-Resilient Non-Malleable Identification Schemes in the Bounded-Retrieval Model | IWSEC2015 | 其他收录 | Tingting Zhang, Hongda Li | |
291 | 国外重要刊物 | KDM-CCA security from RKA secure authenticated encryption | International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2015 | 其他收录 | 路献辉,李宝,贾仃仃 | |
292 | 国外重要刊物 | Cryptanalysis of reduced-round whirlwind | Australasian Conference on Information Security and Privacy, ACISP 2015 | 其他收录 | 马冰珂、李宝,郝荣林,李晓千 | |
293 | 国外重要刊物 | Hashing into Jacobi Quartic Curves | Information Security Conference | 其他收录 | 于伟,王鲲鹏,李宝,何晓阳,田松 | |
294 | 国外重要刊物 | Leveled Strongly Unforgeable Identity Based Fully Homomorphic Signatures | Information Security Conference | 其他收录 | 王付群、王鲲鹏、李宝、高媛媛 | |
295 | 国外重要刊物 | Lossy Projective Hashing and Its Applications | International Conference on Cryptology in India | 其他收录 | 薛海洋,刘亚敏,路献辉,李宝 | |
296 | 国外重要刊物 | An Efficient Leveled Identity-Based FHE | International Conference on Network and System Security | 其他收录 | 王付群、王鲲鹏、李宝 | |
297 | 国外重要刊物 | New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates | Information workshop on Security | 其他收录 | 于伟, Kim Kwang Ho, Jo Myong Song | |
298 | 国外重要刊物 | Identity-Based Lossy Encryption from Learning with Errors | Information workshop on Security | 其他收录 | 贺婧楠、李宝、路献辉、贾仃仃、薛海洋、孙小超 | |
299 | 国外重要刊物 | Improved Efficiency of MP12 | Information workshop on Security | 其他收录 | 方赴洋、李宝、路献辉、孙小超 | |
300 | 国外重要刊物 | Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions | Information workshop on Security | 其他收录 | 马冰珂、李宝、郝荣林、李晓千 | |
301 | 国外重要刊物 | LWE-Based FHE with Better Parameters | Information workshop on Security | 其他收录 | 王付群、王鲲鹏、李宝 | |
302 | 国外重要刊物 | Fully homomorphic encryption with auxiliary inputs | Conference on Information Security and Cryptology | 其他收录 | 王付群、王鲲鹏 | |
303 | 国外重要刊物 | A Note on Diem's Proof | Conference on Information Security and Cryptology | 其他收录 | 田松,王鲲鹏,李宝,于伟 | |
304 | 国外重要刊物 | CCA Secure Public Key Encryption Scheme based on LWE without Gaussian Sampling | Conference on Information Security and Cryptology | 其他收录 | 孙小超、李宝、路献辉、方赴洋 | |
305 | 国外重要刊物 | Hashing into Generalized Huff Curves | Conference on Information Security and Cryptology | 其他收录 | 何晓阳,于伟,王鲲鹏 | |
306 | 国外重要刊物 | Models of Curves from GHS Attack in Odd Characteristic | The 11th International Conference on Information Security Practice and Experience | 其他收录 | 田松,于伟,李宝,王鲲鹏 | |
307 | 国外重要刊物 | Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves | The 11th International Conference on Information Security Practice and Experience | 其他收录 | 田松,于伟,李宝,王鲲鹏 | |
308 | 国外重要刊物 | Cramer-shoup like chosen ciphertext security from LPN | The 11th International Conference on Information Security Practice and Experience | 其他收录 | 孙小超、李宝、路献辉 | |
309 | 国内重要刊物 | An Efficient Implementation on Storage and Lookup for Flow Table of OpenFlow |
中国科学 | 45卷15期 1280-1288 | 其他收录 | E YuePeng, CHEN Zhi, GE JingGuo & WU YuLei |
310 | 国外重要刊物 | Performance investigation of virtual network and physical network based on advanced testbed networks | IUCC 2015 | 暂无 | EI收录 | Tong Li, Xiaodan Zhang,Zongzhen Liu,Jingguo Ge, Zhongjiang Yao, Yuepeng E, Yulei Wu, Lei Zhang |
311 | 国外重要刊物 | Performance improvement for source mobility in named data networking based on global–local FIB updates | Peer-to-Peer Networking and Applications | Volumes 8, Issues 32, pp 1-11 | SCI收录 | Jingguo Ge, Shaojie Wang, Yulei Wu, Haina Tang, Yuepeng E |
312 | 国外重要刊物 | Achieving Secure Friend Discovery in Social Strength-Aware PMSNs | Proceedings of the 34th IEEE Military Communications Conference (MILCOM) | 2015, Page(s): 962-968 | EI收录 | Ben Niu, Yuanyuan He, Fenghua Li and Hui Li |
313 | 国外重要刊物 | Achieving lightweight and secure access control in Multi-authority cloud (Best Paper Award) | Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM) | 2015, Page(s): 459-466 | EI收录 | Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu and Fangfang Shan |
314 | 国外重要刊物 | UGHA: uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks | IEEE International Conference on Communications (ICC) | 2015, Page(s): 7246-7251 | EI收录 | Jin Cao, Hui Li, Maode Ma and Fenghua Li |
315 | 国外重要刊物 | Privacy-preserving strategies in service quality aware location-based services | IEEE International Conference on Communications (ICC) | 2015, Page(s): 7328-7334 | EI收录 | Weihao Li, Ben Niu, Hui Li and Fenghua Li |
316 | 国内重要刊物 | 面向多维数字媒体的访问控制机制 | 通信学报 | 36(11): 52-60 | EI收录 | 单芳芳, 李凤华, 谢绒娜, 熊金波, 王彦超 |
317 | 国内重要刊物 | 一种基于代理的移动互联网隐私保护机制 | 通信学报 | 36(11): 25-32 | EI收录 | 耿魁, 李凤华, 李维皓, 李晖, 牛犇 |
318 | 国内重要刊物 | 支持多关键词的可搜索公钥加密方案 | 西安电子科技大学学报 | 42(5) | EI收录 | 李昊星, 李风华, 宋承根, 苏铓, 刘歆 |
319 | 国内重要刊物 | 一种基于免疫计算的安全授权系统模型(An Immunology-Based Security System Model for Authorization) | 2015 6th International Conference on Advanced Computer Control | 2015.7.11-7.12 | EI收录 | 刘桐 王雅哲 |
320 | 国内重要刊物 | 智能云电视公共安全服务平台建设(Building public security service platform for Smart cloud TV) | 中国科学:信息科学 | 45(10): 1289-1309 | EI收录 | 王雅哲 徐震 王瑜 晏敏 张妍 刘桐 |
321 | 国外重要刊物 | Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data | 10th International Workshop on Security (IWSEC 2015) | LNCS 9241, pp. 316–334 | EI收录 | 刘桐 王雅哲 |
322 | 国外重要刊物 | VFA: A Variable-Factor Authentication Framework for Mobile Users | Journal of Communications | Vol. 10, No. 6, June 2015 | EI收录 | Kai Chen, Weifeng Chen, Zhen Xu and Yazhe Wang |
323 | 国内重要刊物 | A Dominating-set-based and Popularity-driven Caching Scheme in Edge CCN | 34th IEEE -- International Performance Computing and Communications Conference (IPCCC) | EI收录 | Weiyuan Li, Yang Li, Wei Wang, Yonghui Xin, Tao Lin | |
324 | 国外重要刊物 | iCacheOS: In-RAN Caches Orchestration Strategy through Content Joint Wireless and Backhaul Routing in Small-Cell Networks | IEEE Globecom 2015 | 2015.10,pp.1200-1206 | EI收录 | Li Hongjia, Hu Dan, Ci Song |
325 | 国外重要刊物 | Joint Wireless and Backhaul Load Balancing in Cooperative Caches enabled Small-Cell Networks | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) | 2015.8,pp.2079-2084 | EI收录 | Li Hongjia, Wang Zejue, Hu Dan |
326 | 国外重要刊物 | High-Resolution Cell Breathing for Improving Energy Efficiency of Ultra-Dense HetNets | IEEE Wireless Communications and Networking Conference (WCNC) | 2015.3, pp.1476-1481 | EI收录 | Li Hongjia, Hu Dan, Ci Song |
327 | 国内重要刊物 | Collaborative EPC and RAN Caching Algorithms for LTE Mobile Networks | IEEE Globecom | 2015 | EI收录 | Shoushou Ren, Tao Lin, Wei An, Yang Li, Yu Zhang and Zhen Xu |
328 | 国外重要刊物 | OSDT: A Scalable Application-Level Scheduling Scheme for TCP Incast Problem | IEEE International Conference on Communications | Year: 2015 Pages: 325 - 331 | EI收录 | Shuli Zhang, Yan Zhang, Yifang Qin, Yanni Han, Zhijun Zhao, Song Ci |
329 | 国外重要刊物 | A Partial-decentralized Coflow Scheduling Scheme in Data Center Networks | IEEE Conference on Local Computer Networks | 2015 | EI收录 | Shuli Zhang, Yan Zhang, Ding Tang, Zhen Xu, Jingguo Ge, Zhijun Zhao |
330 | 国外重要刊物 | Transmit Power Aware Cross-Layer Optimization for LTE Uplink Video Streaming | IEEE International Conference on Communications | Year: 2015 | EI收录 | Pinghua Zhao, Yanwei Liu, Jinxia Liu, Ruixiao Yao, Song Ci, Antonios Argyriou |
331 | 国内重要刊物 | A Cost-Effective Scheme Supporting Adaptive Service Migration in Cloud Data Center | Frontiers of Computer Science | 9卷6期: 875-886 | SCI收录 | Bing Yu, Yanni Han, Hanning Yuan, Xu Zhou, Zhen Xu |
332 | 国外重要刊物 | An Efficient Resource Embedding Algorithm in Software Defined Virtualized Data Center | GlobeCom 2015 | 2015 | EI收录 | Xuemin Wen, Yanni Han, Hanning Yuan, Xu Zhou and Zhen Xu |
333 | 国外重要刊物 | TCP-FNC: A Novel TCP with Network Coding for Wireless Networks | ICC 2015 | EI收录 | Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhijun Zhao and Song Ci | |
334 | 国外重要刊物 | Improving TCP Performance in Data Center Networks with Adaptive Complementary Coding |
LCN 2015 | EI收录 | Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhen Xu and Jingguo Ge | |
335 | 国外重要刊物 | 面向盲DDoS的基于POF移动目标防御方法 | 10th International Conference on Security and Privacy in Communication Networks(ICCCN2015) | 暂无 | EI收录 | 马多贺、徐震、林东岱、宋晨、刘鹏、李萌 |
附件: |
©中国科学院信息工程研究所信息安全国家重点实验室 备案序号:京ICP备12047326-1号 电话:010-82546611 传真:010-82546564 地址:北京市海淀区闵庄路甲89号 100093 |