热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
董晓蕾
2023-05-10 19:06
  • 董晓蕾
  • 董晓蕾 - 博导-华东师范大学-软件工程学院-个人资料

近期热点

资料介绍

个人简历


学术成果
国家973计划项目“基于海量数据的光电信息服务基础研究”(项目编号:2012CB723400)及973课题“云计算及云安全的基础理论研究”(项目编号:2012CB723401)负责人,国家发改委信息安全标准专项项目“灾备标准体系建设”(发改办高技[2012]1424号)负责人。主持国家自然科学基金项目多项,其中 “可证安全密码系统的若干理论与应用研究”(项目编号: 60673079)获得国家自然科学基金委特优完成项目。“数论和现代密码算法”获得2001年度教育部自然科学一等奖,“复杂密码系统的形式化安全理论与应用”获得2008年度教育部自然科学二等奖,“密码学新理论和若干共性基础问题研究” 获得2007年度上海市自然科学二等奖,“信息安全协议新方法研究”获得2015年度教育部自然科学二等奖,“密码算法若干关键问题研究”获得2016年度全国党政密码科学技术进步二等奖。曾分别获得2009年和2014年上海交通大学优秀教师一等奖和特等奖,主编的教材获得上海交通大学第十四届优秀教材特等奖。

研究领域


数论、密码学与网络安全""

近期论文


【1】 D. Li, Xiaolei Dong, Z. Cao, H. Wang: Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. SCIENCE CHINA Information Sciences 61(3): 032112:1-032112:9, 2018.
【2】 S. Chen, P. Zeng, K. R. Choo, Xiaolei Dong: Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols. Comput. J. 61(4): 545-560, 2018.
【3】 H. Wang, Xiaolei Dong, Z. Cao, D. Li: Secure and Efficient Attribute-Based Encryption with Keyword Search. Comput. J. 61(8): 1133-1142, 2018.
【4】 H. Zhang, Z. Cao, Xiaolei Dong, J. Shen: Proof of Multicopy via Proof of File Position in Cloud. Fundam. Inform. 157(1-2): 141-151, 2018.
【5】 J. Ning, Z. Cao, Xiaolei Dong, L. Wei: White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. IEEE Trans. Dependable Sec. Comput. 15(5): 883-897, 2018.
【6】 J. Ning, Z. Cao, Xiaolei Dong, K. Liang, H. Ma, L. Wei: Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Information Forensics and Security 13(1): 94-105, 2018.
【7】 M. Zheng, J. Zhou, Z. Cao, Xiaolei Dong: PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. ICICS 2018: 215-231.
【8】 Y. Liang, Z. Cao, Xiaolei Dong, J. Shen: Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. ICICS 2018: 377-392.
【9】 J. Zhou, Z. Cao, Xiaolei Dong, A. V. Vasilakos: Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine 55(1): 26-33, 2017.
【10】 X. Zhang, Xiaolei Dong, J. Wu, Z. Cao, C. Lyu: Fault Activity Aware Service Delivery in Wireless Sensor Networks for Smart Cities. Wireless Communications and Mobile Computing 2017 (2017)
【11】 X. Zhang, C. Chi, C. Lyu, Z. Fang, Xiaolei Dong, Q. Chen: Availability Based Multiservice Delivery for Wireless Sensor Networks in Adversarial Environments. SCC 2017: 180-187.
【12】 Xiaolei Dong, J. Zhou, and Z. Cao. Efficient Privacy-preserving Temporal and Spacial Data Aggregation for Smart Grid Communications, Concurrency and Computation: Practice and Experience, 28(4): 1145-1160, 2016.
【13】 J. Gong, Xiaolei Dong, Z. Cao and J. Chen. Almost-tight Identity Based Encryption against Selective Opening Attack. The Computer Journal, 59(11): 1669-1688, 2016.
【14】 D. Li, Xiaolei Dong, Z. Cao: Secure and privacy-preserving pattern matching in outsourced computing. Security and Communication Networks 9(16): 3444-3451, 2016.
【15】 J. Ning, Z. Cao, Xiaolei Dong and L. Wei. Traceable and Revocable CP-ABE with shorter ciphertexts. SCIENCE CHINA Information Sciences, 59(11): 119102:1-119102:3, 2016.
【16】 W. Jia, H. Zhu, S. Du, Xiaolei Dong, and Z. Cao. CPPA: Cloud Based Privacy Preserving Aggregation Architecture in Multi-Domain Wireless Networks. Security and Communication Networks, 9(13): 1905-1915, 2016.
【17】 J. Zhou, Z. Cao, Xiaolei Dong. Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. Peer-to-Peer Networking and Applications, 9(4): 774-794, 2016.
【18】 J. Gong, J. Chen, Xiaolei Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016(1): 133-163, 2016.
【19】 J. Gong, Xiaolei Dong, J. Chen, Z. Cao: Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. ASIACRYPT (2) 2016: 624-654
【20】 J. Zhou, Z. Cao, Xiaolei Dong: PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. ESORICS (1) 2016: 135-153.
【21】 J. Ning, Z. Cao, Xiaolei Dong, J. Gong, J. Chen: Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ESORICS (2) 2016: 551-569.
【22】 Xiaolei Dong. Advances of Privacy Preservation in Internet of Things. Journal of Computer Research and Development, 52(10): 2341-2352, 2015 (in Chinese)
【23】 J. Zhou, Xiaolei Dong, Z. Cao. Research progress of ciphertext access control and privacy protection. Bulletin of Chinese Association for Cryptologic Research (CACR), 4(6): 19-21, 26, 2015 (in Chinese).
【24】 X. Zhang, Xiaolei Dong, N. Xiong, J. Wu, and X. Li. Fault-aware Flow Control and Multi-path Routing in VANETs, Peer-to-Peer Networking and Applications, 8(6): 1090-1107, 2015.
【25】 J. Zhou, Xiaolei Dong, Z. Cao, and A. V. Vasilakos. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6): 1299-1314, 2015.
【26】 J. Ning, Xiaolei Dong, Z. Cao, L. Wei, and X. Lin. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Transactions on Information Forensics and Security, 10(6): 1274-1288, 2015.
【27】 J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. Security and Privacy in Cloud-assisted Wireless Wearable Communications: Challenges, Solutions and Future Directions. IEEE Wireless Communications, 22(2): 136-144, 2015.
【28】 J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. PPDM: Privacy – preserving Protocol for Dynamic Medical Text Mining and Image Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare Systems, IEEE Journal of Selected Topics in Signal Processing, 9(7): 1332-1344, 2015.
【29】 J. Zhou, X. Lin, Xiaolei Dong, and Z. Cao. PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System. IEEE Transactions on Parallel and Distributed Systems, 26(6): 1693-1703, 2015.
【30】 J. Zhou, Z. Cao, Xiaolei Dong, N. Xiong, and A. V. Vasilakos. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks, Information Sciences, 314: 255-276, 2015.
【31】 J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. TR-MABE: White-Box Traceable and Revocable Multi-authority Attribute-based Encryption and Its Applications to Multi-level Privacy-preserving e-Healthcare Cloud Computing Systems, IEEE INFOCOM 2015, Hong Kong, 26 April - 1 May, 2015. IEEE, 2398-2406, 2015.
【32】 J. Ning, Xiaolei Dong, Z. Cao, L. Wei. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS 2015(2): 270-289, 2015.
【33】 J. Zhou, Z. Cao, Xiaolei Dong, X. Lin. EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function. IEEE ICC 2015: 7444-7449, 2015.
【34】 L. Wei, H. Zhu, Z. Cao, Xiaolei Dong, W. Jia, Y. Chen, and A. V. Vasilakos. Security and privacy for storage and computation in cloud computing. Information Sciences, 258: 371-386, 2014.
【35】 W. Jia, H. Zhu, Z. Cao, Xiaolei Dong, and C. Xiao. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Systems Journal, 8(2): 598-607, 2014.
【36】 Z. Li, Xiaolei Dong, and Z. Cao. The equation x^r=a over finite fields, Journal of Cryptologic Research, 1(6): 602-616, 2014 (in Chinese).
【37】 C. Huang and Xiaolei Dong. A privacy preserving taxi hailing protocol in VANET, Journal of Natural Science of Heilongjiang University, 31(1), 6-12, 2014 (in Chinese).
【38】 J. Ning, Z. Cao, Xiaolei Dong, L. Wei, and X. Lin. Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS 2014 (2), Lecture Notes in Computer Science 8713, 55-72, 2014.
【39】 Xiaolei Dong, J. Zhou, K. Alharbi, X. Lin, and Z. Cao. An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid, IEEE Globecom 2014, Austin, Texas, USA, December 8-12, 2014. IEEE, 4720-4725, 2014.
【40】 H. Zhang, Z. Cao, Xiaolei Dong, and J. Shen. 4P_VES: a Collusion - Resistant Accountable Virtual Economy System, ICICS 2014, Hong Kong, December 16-17, 2014.
【41】 D. He, Z. Cao, Xiaolei Dong, and J. Shen. User Self-controllable Profile Matching for Privacy-preserving Mobile Social Networks, ICCS 2014, Macau, 19-21 Nov. 2014, IEEE, 248-252, 2014.
SCI国际期刊Security and Communication Networks (John Wiley)副编辑(Associate Editor )以及SCI国际期刊KSII Transactions on Internet and Information Systems编委。密码学和网络安全等方面著名国际会议的TPC member,包括:Globecom 2014、BODYNETS 2014、Pairing 2013等。

相关热点

扫码添加好友