贾春福
近期热点
资料介绍
研究领域
络与信息安全;可信计算与软件安全;恶意代码分析近期论文
1. Jingwei Li, Chunfu JIA, Zheli Liu, Zongqing Dong. Cycle-walking revisited: consistency, security and efficiency, Security and Communication Networks, online published, 20122. 刘昕, 贾春福, 胡志超, 刘国友, 王冬. 基于社会信任的恶意网页协防机制, 通信学报, Vol.33(10): 110-116, 20123. 刘昕, 贾春福, 胡志超, 刘国友, 王冬. 对抗P2P蠕虫的邻居选择机制, 天津大学学报, Vol.45(11): 1030-1038, 20124. 李敏, 贾春福, 李经纬, 刘哲理, 董宗庆. 变长编码字符型数据的保留格式加密, 吉林大学学报(工学版), Vol.42(5): 1257-1261, 20125. Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia and Zheli Liu. Fine-grained access control on outsourced searchable encrypted data, The 14th International Conference on Network and System Security(NSS 2012), November 21-23, 2012, Wuyishan, Fujian, China6. Jingwei Li, Chunfu, Jin Li and Xiaofeng Chen. Outsourcing encryption of attribute-based encryption with MapReduce, The 14th International Conference on Information and Communications Security (ICICS 2012), October 29-31, 2012, Hong Kong. Lecture Notes in Computer Science series volume 7618, 191-2017. Jingwei Li, Chunfu JIA, Jin Li, Zheli Liu. A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud, Proceedings of 4th IEEE International Conference on Intelligent Networking and Collaborative Systems(INCoS-2012), September 19-21, 2012, Bucharest, Romania8. Zhi Wang, Chunfu JIA, Min Liu, Xiaoxu Yu. Branch Obfuscation Using Code Mobility and Signals, Proceedings of the 7th IEEE International Workshop on Security,Trust, and Privacy for Software Applications (STPSA 2012), workshop of the IEEE Signature Conference on Computer Software & Applications (COMPSAC 2012), July 16-20, 2012, Izmir, Turkey9. 石乐义, 姜蓝蓝, 贾春福, 王晓蕊. 蜜罐诱骗防御机理的博弈理论分析, 电子与信息学报, Vol.34 (6): 1420-1424, 201210. 王志, 贾春福, 鲁凯. 基于环境敏感分析的恶意代码脱壳方法, 计算机学报, Vol.35(4): 693-702, 201211. 李经纬, 贾春福, 刘哲理, 李敏. 基于k-分割Feistel网络的FPE方案, 通信学报, Vol.33(4): 62-68, 201212. 刘哲理, 贾春福, 李经纬. 保留格式加密技术研究, 软件学报, Vol.23(1):152-170, 201213. Chunfu Jia, Zhi Wang, Kai Lu, Xinhai Liu, Xin Liu. Directed Hidden-Code Extractor for Environment-Sensitive Malwares, Physics Procedia, Volume 24, Part C, 2012, Pages 1621-162714. Chunfu Jia, Xin Liu, Zhichao Hu, Guoyou Liu and Zhi Wang. Defending P2P Networks against Malicious Worms Based on Benign Worms. Lecture Notes in Electrical Engineering, Volume 155, Advances in Electric and Electronics, 653-660, 201215. Chunfu Jia, Zheli Liu, Jingwei Li, Zongqing Dong and Xiaoying You. A New Integer FPE Scheme Based on Feistel Network. Lecture Notes in Electrical Engineering, Volume 155, Advances in Electric and Electronics, 637-644, 2012 相关热点