热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
陈晓峰
2023-05-14 17:15
  • 陈晓峰
  • 陈晓峰 - 教授 博士生导师-西安电子科技大学-通信工程学院-个人资料

近期热点

资料介绍

个人简历


教育经历
1994.09-2000.03:西北大学,数学系(基础数学专业,六年制本硕连读),获理学硕士学位。
2000.03-2003.03:西安电子科技大学,通信工程学院(密码学专业),获工学博士学位。
2003.04-2004.04:韩国,信息与通信大学国际信息安全研究中心,博士后研究。
工作经历
2004.05-2009.03:中山大学,副教授
2009.03-至今:西安电子科技大学,教授
2013.10-2014.01:美国弗吉尼亚理工大学,访问学者
荣誉奖励
国家万人计划科技创新领军人才
教育部“青年长江学者”
网络安全优秀教师奖(2018)
科技部“中青年科技创新领军人才”
教育部“新世纪优秀人才支持计划”
陕西省密码学专业教学团队带头人
西安电子科技大学华山青年学者/华山学者
西安电子科技大学优秀教师(2011);师德先进个人(2016)
陕西省青年科技奖(2016)
中国密码学会密码创新奖(2016)
陕西省高等学校科学技术奖一等奖(2018)
中国密码学会优秀博士学位论文指导教师(2017)
教育部自然科学奖励二等奖、陕西省科学技术奖励自然科学奖二等奖(2019)
课程教学
信息安全专题讨论(研究生)(2018);公钥密码学研究生(2018);应用密码学(2018)
应用密码学(2017);信息安全专题讨论(研究生)(2017)
离散数学(2016);信息安全专题讨论(研究生)(2016)
编码理论新进展(研究生)(2010-2016)
通信网安全与保密(2010-2015)
抽象代数;组合数学与数论;公钥密码学(研究生)(2008)
离散数学(2007);电子商务安全技术;组合数学与数论(2007)
线性代数;电子商务;公钥密码体制的可证明安全性(研究生)(2006)
电子商务;金融密码学(研究生)(2005)
现代密码学(2004)
招生要求欢迎优秀的博士(代数、数论、公钥密码学背景均可)做博士后合作研究
博士研究生:有学术理想;数学和外语基础好;思维活跃,做事有恒心;(学术路漫漫,读博需谨慎!)
硕士研究生:工程背景好,有较强的编程能力;性格开朗,有团队意识;喜欢运动(篮球最好)和音乐(架子鼓最好)。
研究项目
国家\

研究领域


公钥密码学、金融密码学
云计算与云安全
数据安全

近期论文


2016
XiaofengChen,JianfengWang,XinyiHuang,Proceedingsofthe11thACMonAsiaConferenceonComputerandCommunicationsSecurity,AsiaCCS2016,Xi'an,China,May30-June3,2016.ACM2016,ISBN978-1-4503-4233-9.
XiaofengChen,JinLi,JianWeng,JianfengMa,WenjingLou,VerifiableComputationoverLargeDatabasewithIncrementalUpdates.IEEEtransactionsonComputers,65(10):3184-3195,2016.
TaoJiang,XiaofengChen,JianfengMa,PublicIntegrityAuditingforSharedDynamicCloudDatawithGroupUserRevocation.IEEEtransactionsonComputers,65(8):2363-2373,2016.
JianfengWang,MeixiaMiao,YaqianGao,XiaofengChen,Enablingefficientapproximatenearestneighborsearchforoutsourceddatabaseincloudcomputing.SoftComput.20(11):4487-4495(2016)
PengChen,JunYe,XiaofengChen,Efficientrequest-basedcomparableencryptionschemebasedonslidingwindowmethod.SoftComput.20(11):4589-4596(2016)
JunYe,XiaofengChen,JianfengMa,Improvedalgorithmforsecureoutsourcingofmodularexponentiationswithhighcheckability.IJAHUC23(3/4):182-191(2016)
BaojiangCui,ZiyueWang,BingZhao,XiaofengChen,DesignandanalysisofsecuremechanismsbasedontripartitecredibilityforRFIDsystems.ComputerStandards&Interfaces44:110-116(2016).
LiangLiu,XiaofengChen,WenjingLou,Securethree-partycomputationalprotocolsfortrianglearea.Int.J.Inf.Sec.15(1):1-13(2016).
ZheliLiu,XiaofengChen,JunYang,ChunfuJia,IlsunYou,Neworderpreservingencryptionmodelforoutsourceddatabasesincloudenvironments.J.NetworkandComputerApplications59:198-207(2016).
YinghuiZhang,DongZheng,XiaofengChen,JinLi,HuiLi,Efficientattribute-baseddatasharinginmobileclouds.PervasiveandMobileComputing28:135-149(2016).
YinghuiZhang,JinLi,XiaofengChen,HuiLi,Anonymousattribute-basedproxyre-encryptionforaccesscontrolincloudcomputing.SecurityandCommunicationNetworks9(14):2397-2411(2016).
JianfengWang,XiaofengChen,EfficientandSecureStorageforOutsourcedData:ASurvey.DataScienceandEngineering1(3):178-188(2016).
ZheliLiu,DejiangLuo,JinLi,XiaofengChen,ChunfuJia,N-Mobishare:newprivacy-preservinglocation-sharingsystemformobileonlinesocialnetworks.Int.J.Comput.Math.93(2):384-400(2016).
TaoJiang,XiaofengChen,QianhongWu,JianfengMa,WillySusilo,WenjingLou,TowardsEfficientFullyRandomizedMessage-LockedEncryption.ACISP(1)2016:361-375.
YinghuiZhang,JinLi,DongZheng,XiaofengChen,HuiLi,AccountableLarge-UniverseAttribute-BasedEncryptionSupportingAnyMonotoneAccessStructures.ACISP(1)2016:509-524.
KamilKluczniak,JianfengWang,XiaofengChen,MiroslawKutylowski,Multi-deviceAnonymousAuthentication.NSS2016:21-36.
2015
XiaofengChen,JinLi,XinyiHuang,JianfengMa,WenjingLou,NewPubliclyVerifiableDatabaseswithEfficientUpdates.IEEETransactionsonDependableandSecureComputing,12(5):546-556,2015.
Xiaofeng,XinyiHuang,JinLi,JianfengMa,WenjingLou,NewAlgorithmsforSecureOutsourcingofLarge-scaleSystemsofLinearEquations.IEEETransactionsonInformationandForensicsSecurity,10(1),69-78,2015.
XiaofengChen,WillySusilo,JinLi,DuncanSWong,JianfengMa,ShaohuaTang,QiangTang,EfficientAlgorithmsforSecureOutsourcingofBilinearPairings,TheoreticalComputerScience,562:112-121,2015.
JianfengWang,XiaofengChen,XinyiHuang,IlsunYou,andYangXiang,VerifiableAuditingforOutsourcedDatabaseinCloudComputing,IEEETransactionsonComputers,64(11):3293-3303,2015.
JinLi,XiaofengChen,XinyiHuang,ShaohuaTang,andYangXiang,SecureDistributedDeduplicationSystemswithImprovedReliability.IEEETransactionsonComputers,64(12):3569-3579,2015.
JinLi,XiaoTan,XiaofengChen,DuncanWong,FatosXhafa.OPoR:EnablingProofofRetrievabilityinCloudComputingwithResource-ConstrainedDevices.IEEETransactionsonCloudComputing,3(2):195-205,2015.
JinLi,YanKitLi,XiaofengChen,PatrickP.C.Lee,WenjingLou:AHybridCloudApproachforSecureAuthorizedDeduplication,IEEETransactionsonParallelandDistributedSystems,26(5),1206-1216,2015.
JinLi,JingweiLi,XiaofengChen,ChunfuJiaandWenjingLou.Identity-basedEncryptionwithOutsourcedRevocationinCloudComputing.IEEETransactionsonComputers,64(2):425-437,2015.
TaoJiang,XiaofengChen,JinLi,DuncanS.Wong,JianfengMa,andJosephK.Liu,Towardssecureandreliablecloudstorageagainstdatare-outsourcing,FutureGenerationComputerSystems,Vol.52,2015,pp.86-94.
JinLi,XiaofengChen,JingweiLi,ChunfuJia,JianfengMa,WenjingLou,Newaccesscontrolsystemsbasedonoutsourcedattribute-basedencryption1.JournalofComputerSecurity,23(6):659-683(2015).
JinLi,XiaofengChen,FatosXhafa,LeonardBarolli,Securededuplicationstoragesystemssupportingkeywordsearch.J.Comput.Syst.Sci.81(8):1532-1541(2015).
JinLi,XiaofengChen,XinyiHuang:Newattribute-basedauthenticationanditsapplicationinanonymouscloudaccessservice.IJWGS11(1),125-141,2015.
MeixiaMiao,JianfengWang,HuiLi,XiaofengChen,Securemulti-server-aideddatadeduplicationincloudcomputing.PervasiveandMobileComputing24:129-137(2015).
HuiZhu,YingfangXue,XiaofengChen,QiangLi,HuiLi,V-MGSM:AMultilevelandGroupingSecurityVirtualizationModelforMobileInternetService.MobileInformationSystems2015:841292:1-841292:9(2015).
QiangTang,HuaMa,XiaofengChen,ExtendtheConceptofPublicKeyEncryptionwithDelegatedSearch.TheComputerJournal,58(4):724-734(2015).
YanshengFeng,HuaMa,XiaofengChen,EfficientandVerifiableOutsourcingSchemeofSequenceComparisons.IntelligentAutomation&SoftComputing,21(1):51-63(2015).
JinLi,ZheliLiu,XiaofengChen,FatosXhafa,XiaoTan,DuncanS.Wong,L-EncDB:Alightweightfr[ant]ameworkforprivacy-preservingdataqueriesincloudcomputing.Knowl.-BasedSyst.79:18-26(2015).
ShaohuaTang,BoLv,GuominChen,ZhiniangPeng,AdamaDiene,XiaofengChen,EfficienthardwareimplementationofPMI+forlow-resourcedevicesinmobilecloudcomputing.FutureGenerationComp.Syst.52:116-124(2015).
JianfengWang,XiaofengChen,JinLi,KamilKluczniak,MiroslawKutylowski,ANewSecureDataDeduplicationApproachSupportingUserTraceability.BWCCA2015:120-124.
JunYe,XiaofengChen,JianfengMa,AnImprovedAlgorithmforSecureOutsourcingofModularExponentiations.AINAWorkshops2015:73-76
PengChen,JunYe,XiaofengChen,ANewEfficientRequest-BasedComparableEncryptionScheme.AINAWorkshops2015:436-439.
QinZou,JianfengWang,XiaofengChen,SecureEncryptedImageSearchinMobileCloudComputing.BWCCA2015:572-575.
YujueWang,QianhongWu,BoQin,XiaofengChen,XinyiHuang,YunyaZhou,Group-orientedProofsofStorage.ASIACCS2015:73-84.
BaojiangCui,ZiyueWang,JunYang,XiaofengChen,DesignandAnalysisofanEnhancedSecureMechanismofLLRPinRFIDSystems.AINAWorkshops2015:17-21.
JunYe,MeixiaMiao,PengChen,XiaofengChen,Request-BasedComparableEncryptionSchemewithMultipleUsers.BWCCA2015:414-416.
XuYang,WeiWu,JosephK.Liu,XiaofengChen,LightweightAnonymousAuthenticationforAdHocGroup:ARingSignatureApproach.ProvSec2015:215-226.
TranVietXuanPhuong,GuominYang,WillySusilo,XiaofengChen,AttributeBasedBroadcastEncryptionwithShortCiphertextandDecryptionKey.ESORICS(2)2015:252-269.
2014
XiaofengChen,JinLi,JianfengMa,QiangTang,WenjingLou,NewAlgorithmsforSecureOutsourcingofModularExponentiations,IEEETransactionsonParallelandDistributedSystems,25(9),2386-2396,2014.
XiaofengChen,JinLi,XinyiHuang,JingweiLi,YangXiang,DuncanWong.SecureOutsourcedAttribute-basedSignatures.IEEETransactionsonParallelandDistributedSystems,25(12):3285-3294,2014.
XiaofengChen,FangguoZhang,WillySusilo,HaiboTian,JinLi,KwangjoKim,Identity-basedchameleonhashingandsignatureswithoutkeyexposure,InformationSciences,265:198-210,2014.
XiaofengChen,JinLi,JianWeng,JianfengMa,WenjingLou,VerifiableComputationoverLargeDatabasewithIncrementalUpdates,ESORICS2014,LNCS8712,148–162,Springer-Verlag,2014.
XiaofengChen,JinLi,JianfengMa,WenjingLou,DuncanS.Wong:Newandefficientconditionale-paymentsystemswithtransferability.FutureGenerationComp.Syst.37:252-258(2014).
JingweiLiu,ZonghuaZhang,XiaofengChen,KyungSupKwak:CertificatelessRemoteAnonymousAuthenticationSchemesforWirelessBodyAreaNetworks.IEEETrans.ParallelDistrib.Syst.25(2):332-342(2014).
JinLi,XiaofengChen,MingqiangLi,JingweiLi,PatrickP.C.Lee,WenjingLou:SecureDeduplicationwithEfficientandReliableConvergentKeyManagement.IEEETrans.ParallelDistrib.Syst.25(6):1615-1625(2014).
XinyiHuang,XiaofengChen,JinLi,YangXiang,LiXu:FurtherObservationsonSmart-Card-BasedPassword-AuthenticatedKeyAgreementinDistributedSystems.IEEETrans.ParallelDistrib.Syst.25(7):1767-1775(2014).
JinLi,XinyiHuang,JingweiLi,XiaofengChen,YangXiang,SecurelyOutsourcingAttribute-BasedEncryptionwithCheckability.IEEETrans.ParallelDistrib.Syst.25(8):2201-2210(2014).
HaiboTian,XiaofengChen,WillySusilo:Deniabilityandforwardsecrecyofone-roundauthenticatedkeyexchange.TheJournalofSupercomputing67(3):671-690(2014).
YinghuiZhang,XiaofengChen,JinLi,HuiLi,GenericconstructionforsecureandefficienthandoffauthenticationschemesinEAP-basedwirelessnetworks.ComputerNetworks75:192-211(2014).
FatosXhafa,XiaofengChen,XinyiHuang,VladiKolici,Advancesinsecureandintelligentdataprocessing.ConcurrencyandComputation:PracticeandExperience26(5):1021-1022(2014).
YinghuiZhang,XiaofengChen,JinLi,HuiLi,FenghuaLi,Attribute-BasedDataSharingwithFlexibleandDirectRevocationinCloudComputing.TIIS8(11):4028-4049(2014).
LeonardBarolli,FatosXhafa,XiaofengChen,MakotoIkeda,NinthInternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,BWCCA2014,Guangdong,China,November8-10,2014.IEEEComputerSociety2014,ISBN978-1-4799-4173-5.
LiXu,YuanHe,XiaofengChen,XinyiHuang,Ticket-basedhandoffauthenticationforwirelessmeshnetworks.ComputerNetworks73:185-194(2014).
HaixinNie,HuaMa,JianfengWang,XiaofengChen,VerifiableAlgorithmforSecureOutsourcingofSystemsofLinearEquationsintheCaseofNoSolution.BWCCA2014:572-577.
YaqianGao,MeixiaMiao,JianfengWang,XiaofengChen,SecureApproximateNearestNeighborSearchoverEncryptedData.BWCCA2014:578-583.
JingweiLi,JinLi,XiaofengChen,ZheliLiu,ChunfuJia:Privacy-preservingdatautilizationinhybridclouds.FutureGenerationComp.Syst.30:98-106(2014).
QiHan,YinghuiZhang,XiaofengChen,HuiLi,JiaxiangQuan:Efficientandrobustidentity-basedhandoffauthenticationforEAP-basedwirelessnetworks.ConcurrencyandComputation:PracticeandExperience26(8):1561-1573(2014).
JinLi,XiaofengChen,QiongHuang,DuncanS.Wong:Digitalprovenance:Enablingsecuredataforensicsincloudcomputing.FutureGenerationComp.Syst.37:259-266(2014).
YuanChen,XiaofengChen,HuiLi,MoreDCCA-securepublic-keyencryptionsfromKEM+DEMstylehybridparadigmsandsomeobservationsonthe'inner-outer'structure,IJGUC5(1):60-70(2014).
FatosXhafa,JianfengWang,XiaofengChen,JosephK.Liu,JinLi,PaulKrause,AnefficientPHRservicesystemsupportingfuzzykeywordsearchandfine-grainedaccesscontrol.SoftComput.18(9):1795-1802(2014).
LiangLiu,XiaofengChen,WenjingLou:ASecureThree-PartyComputationalProtocolforTriangleArea.ACISP2014:82-97.
ZheliLiu,JinLi,XiaofengChen,JunYang,ChunfuJia:TMDS:Thin-ModelDataSharingSchemeSupportingKeywordSearchinCloudStorage.ACISP2014:115-130.
HaixinNie,XiaofengChen,JinLi,JosolphLiu,WenjingLou:EfficientandVerifiableAlgorithmforSecureOutsourcingofLarge-scaleLinearProgramming.AINA2014:591-596.
JinLi,XiaofengChen,FatosXhafa,LeonardBarolli:SecureDeduplicationStorageSystemswithKeywordSearch.AINA2014:971-977.
TaoJiang,XiaofengChen,JinLi,JianfengMa:M-SRS:SecureandTrustworthyMobileServiceReviewSystemBasedonMobileCloudlet.ICT-EurAsia2014:612-621.
ZhenyuZhang,WujunZhang,JianfengWang,XiaofengChen:AnEffectiveCloud-BasedActiveDefenseSystemagainstMaliciousCodes.ICT-EurAsia2014:690-695.
TaoJiang,XiaofengChen,JinLi,DuncanS.Wong,JianfengMa,JosephK.Liu:TIMER:SecureandReliableCloudStorageagainstDataRe-outsourcing.ISPEC2014:346-358.
YinghuiZhang,DongZheng,XiaofengChen,JinLi,HuiLi,ComputationallyEfficientCiphertext-PolicyAttribute-BasedEncryptionwithConstant-SizeCiphertexts.ProvSec2014:259-273.
2013
JinLi,XiaofengChen,JingweiLi,ChunfuJia,JianfengMa,WenjingLou,Fine-GrainedAccessControlSystembasedonOutsourcedAttribute-basedEncryption,ESORICS2013,LNCS8134,592-609,Springer-Verlag,2013.
QiangTangandXiaofengChen,TowardsAsymmetricSearchableEncryptionwithMessageRecoveryandFlexibleSearchAuthorization,ASIACCS,253-264,2013.
YinghuiZhang,XiaofengChen,JinLi,DuncanS.WongandHuiLi,AnonymousAttribute-BasedEncryptionSupportingEfficientDecryptionTest,ASIACCS,511-516,2013.
JianfengWang,HuaMa,QiangTang,JinLi,HuiZhu,SiqiMa,andXiaofengChen,EfficientVerifiableFuzzyKeywordSearchOverEncryptedDatainCloudComputing,ComputerSciencesandInformationSystems,Vol.10,No.2,667-684,2013.
JinLi,XiaofengChen,EfficientMulti-userKeywordSearchOverEncryptedDatainCloudComputing,ComputingandInformatics,32(4),723-738,2013.
HaiboTian,FangguoZhang,XiaofengChen,andBaodianWei,Selectivelyunforgeablebutexistentiallyforgeablesignatureschemesandapplications,ScienceinChina:InformationSciences,Vol.56,No.1,107-200,2013.
XingxingXie,HuaMa,JinLi,XiaofengChen,AnEfficientCiphertext-PolicyAttribute-BasedAccessControltowardsRevocationinCloudComputing,J.UCS19(16):2349-2367,2013.
HaiboTian,XiaofengChen,FangguoZhang,andBaodianWei,ZhengtaoJiang,YiLiu,Anon-delegatablestrongdesignatedverifiersignatureinID-basedsettingformobileenvironment,MathematicalandComputerModelling,58(5-6),1289-1300,2013.
FeiYan,XiaofengChen,YinghuiZhang,EfficientOn-line/Off-lineSigncrypitonWithoutKeyExposure,InternationalJournalofGridandUtilityComputing,4(1),85-93,2013.
JinLi,XiaoTan,XiaofengChen,DuncanS.Wong,AnEfficientProofofRetrievabilitywithPublicAuditinginCloudComputing,INCoS2013:93-98
YinghuiZhang,XiaofengChen,JinLi,HuiLi,FenghuaLi,FDR-ABE:Attribute-BasedEncryptionwithFlexibleandDirectRevocation,INCoS2013:38-45
HuiZhu,SiyuChen,LexiangZhu,HuiLi,XiaofengChen,RangeTree:AFeatureSelectionAlgorithmforC4.5DecisionTree,INCoS2013:17-22
HuiZhu,YingfangXue,YunZhang,XiaofengChen,HuiLi,XimengLiu,V-MLR:AMultilevelSecurityModelforVirtualization,INCoS2013:9-16
ZheliLiu,JinLi,XiaofengChen,JingweiLi,ChunfuJia,NewPrivacy-PreservingLocationSharingSystemforMobileOnlineSocialNetworks,3PGCIC2013:214-218
JinLi,DongqingXie,XiaofengChen,Server-AidedHierarchicalIdentity-BasedEncryption,EIDWT2013:643-647
XingxingXie,HuaMa,JinLi,XiaofengChen,NewCiphertext-PolicyAttribute-BasedAccessControlwithEfficientRevocation,AsianConferenceonAvailability,ReliabilityandSecurity,LNCS7804,Springer,373–382,2013.
YinghuiZhang,XiaofengChen,HuiLi,Key-EvolvingHierarchicalID-BasedSigncryption,TheComputerJournal,56(10),1228-1248,2013.
HaiboTian,XiaofengChen,BaodianWei,YiLiu,SecurityAnalysisofaSuiteofDeniableAuthenticationProtocols,I.J.NetworkSecurity15(5):384-389(2013)
YanshengFeng,HuaMa,XiaofengChen,HuiZhu,SecureandVerifiableOutsourcingofSequenceComparisons,AsianConferenceonAvailability,ReliabilityandSecurity,LNCS7804,Springer,243–252,2013.
2012
XiaofengChen,JinLi,WillySusilo,EfficientFairConditionalPaymentsforOutsourcingComputations,IEEETransactionsonInformationForensicsandSecurity,7(6),1687-1694,2012.
XiaofengChen,JinLi,JianfengMa,QiangTang,WenjingLou,NewAlgorithmsforSecureOutsourcingofModularExponentiations,ESORICS2012,LNCS7459,541–556,Springer-Verlag,2012.
ChunhuiWu,XiaofengChen,DongyangLong,EfficientID-basedNon-MalleableTrapdoorCommitment,ComputersandElectricalEngineering,38(6),1647-1657,2012.
YuanjieZhao,XiaofengChen,HuaMa,QiangTang,HuiZhu,ANewTrapdoor-indistinguishablePublicKeyEncryptionwithKeywordSearch,JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,3(1/2),72-81,2012.
JianfengWang,XiaofengChen,HuaMa,QiangTang,JinLi,HuiZhu,AVerifiableFuzzyKeywordSearchOverEncryptedData,JournalofInternetServicesandInformationSecurity,2(1/2),49-58,2012.
JianfengWang,HuaMa,QiangTang,JinLi,HuiZhu,SiqiMa,andXiaofengChen,ANewEfficientVerifiableFuzzyKeywordSearchScheme,JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,4(3),61-71,2012.
HaiboTian,XiaofengChenandJinLi,AShortNon-delegatableStrongDesignatedVerifierSignature,ACISP2012,LNCS7372,247-260,Springer-Verlag,2012.
HaiboTian,XiaofengChen,FangguoZhang,BaodianWei,ZhengtaoJiang,YiLiu,AnEfficientIdentity-BasedStrongDesignatedVerifierSignaturewithoutDelegatability,IMIS2012,88-88,IEEE,2012.
JinLi,FangguoZhang,XiaofengChen,KwangjoKim,DuncanS.Wong,Genericsecurity-amplifyingmethodsofordinarydigitalsignatures,InformationSciences,Elsevier,Vol.201,128-139,2012.
JingweiLi,JinLi,XiaofengChen,ChunfuJiaandZheliLiu,EfficientKeywordSearchoverEncryptedDatawithFine-GrainedAccessControlinHybridCloud,NSS2012,LNCS7645,Springer,490-502,2012.
JingweiLi,ChunfuJia,JinLi,andXiaofengChen,OutsourcingEncryptionofAttribute-basedEncryptionwithMapReduce,The14thInterenationConferenceonInformationSecurity,LNCS7618,Springer,191–201,2012.
QiHan,YinghuiZhang,XiaofengChen,HuiLi,andJiaxiangQuan,EfficientandRobustIdentity-BasedHandoffAuthenticationinWirelessNetworks,NSS2012,LNCS7645,Springer,180–191,2012.
YinghuiZhang,XiaofengChen,HuiLi,andJinCao,SecureandEfficientIdentity-BasedHandoffAuthenticationSchemes,SecurityandCommunicationNetworks,5(10),1121-1130,JohnWiley&Sons,2012.
2011
XiaofengChen,WillySusilo,FangguoZhang,HaiboTian,JinLi,Identity-BasedTrapdoorMercurialCommitmentandApplications,TheoreticalComputerScience,412(39),5498-5512,2011.
XiaofengChen,FangguoZhang,HaiboTian,BaodianWei,KwangjoKim,DiscreteLogarithmBasedChameleonHashingandSignaturesWithoutKeyExposure,ComputersandElectricalEngineering,37(4),614-623,2011.
XiaofengChen,QianhongWu,FangguoZhang,HaiboTian,BaodianWei,ByoungcheonLee,HyunrokLee,KwangjoKim:Newreceipt-freevotingschemeusingdouble-trapdoorcommitment,InformationSciences,Elsevier,181(8),1493-1502,2011.
JinLi,QiongHuang,XiaofengChenandShermanS.Chow,Multi-AuthorityCiphertext-PolicyAttribute-BasedEncryptionwithAccountability,ASIACCS2011,386-390,2011.
HaiboTian,XiaofengChen,ZhengtaoJiang.Non-interactiveDeniableAuthenticationProtocols,acceptedby7thChinaInternationalConferenceonInformationSecurityandCryptology(InsCrypt2011),LNCS7537,Springer,142-159,2011.
HaiboTian,XiaofengChen,ZhengtaoJiang,YusongDu.Non-delegatableStrongDesignatedVerifierSignatureonEllipticCurves,acceptedby14thAnnualInternationalConferenceonInformationSecurityandCryptology(ICISC2011),Springer,LNCS7259,219–234,2012.
YangZhan,XiaofengChen,HaiboTian,YuminWang,Identity-basedKey-exposureFreeChameleonHashingBasedontheRSAAssumption,JournalofComputationalInformationSystems,7(2),350-358,2011.
YudingLiu,HangLi,andXiaofengChen,Identity-BasedTrapdoorMercurialCommitmentundertheRSAAssumption,Chinacrypt2011,206-214,2011.
2010
XiaofengChen,FangguoZhang,WillySusilo,HaiboTian,JinLi,KwangjoKim,Identity-BasedChameleonHashSchemeWithoutKeyExposure,15thAustralasianConferenceonInformationSecurityandPrivacy(ACISP2010),LNCS6168,Springer,200-215,2010.
XiaofengChen,FangguoZhang,HaiboTian,QianhongWu,YiMu,KwangjoKim,Three-roundAbuse-freeOptimisticContractSigningWithEverlastingSecrecy,14thFinancialCryptographyandDataSecurity(FC2010),LNCS6052,Springer,304-311,2010.
BaodianWei,FangguoZhang,andXiaofengChen,EfficientOnline/OfflineSigncryptionScheme,IntelligentAutomationandSoftComputing,16(3),449-459,2010.
XiaofengChen,HaiboTian,FangguoZhang,YongDing,CommentsandImprovementsonKey-exposureFreeChameleonHashingBasedonFactoring,Inscrypt2010,LNCS6584,Springer,415-426,2010.
JinLi,GansenZhao,XiaofengChen,DongqingXie,ChunmingRong,WenjunLi,LianzhangTang,Fine-GrainedDataAccessControlSystemswithUserAccountabilityinCloudComputing,IEEESecondInternationalConferenceonCloudComputingTechnologyandScience(CloudCom),89-96,2010.
2009
FangguoZhang,XiaofengChen,CryptanalysisandImprovementofanID-basedAd-hocAnonymousIdentificationSchemeatCT-RSA05,InformationProcessingLetters,109(15),846-849,2009.
XiaofengChen,GuominChen,FangguoZhang,BaodianWei,andYiMu,Identity-BasedUniversalDesignatedVerifierSignatureProof,InternationalJournalofNetworkSecurity,8(1),52–58,2009.
JiqiangLv,KuiRen,XiaofengChenandKwangjoKim,TheRingAuthenticatedEncryption:Howtoprovideacluewisely,InformationSciences,179(1-2),161-168,2009.
ChunhuiWu,XiaofengChen,ANewEfficientOn-line/Off-lineThresholdSignatureScheme,ChineseJournalofElectronics,18(2),321-324,2009.
BaodianWei,FangguoZhang,XiaofengChen,HaiboTian,SomePropertiesofAlgebraicStructuresofRSA-likeSystems,WorldCongressonSoftwareEngineering,440-445,IEEEComputerSociety,2009.
HaiboTian,XiaofengChen,andYongDing,AnalysisofTwoTypesDeniableAuthenticationProtocols,InternationalJournalofNetworkSecurity,9(3),242–246,2009.
FangguoZhang,XingwenZhaoandXiaofengChen,ID-BasedAdaptiveObliviousTransfer,The10thInternationalWorkshoponInformationSecurityApplications(WISA2009),LNCS5932,133-147,2009.
ChunhuiWu,XiaofengChen,DongyangLong,YiMu,andWillySusilo,ANewSecureDigital-CopyrightedContentDistributionScheme,JournalofComputationalInformationSystems,4(5),2343-2349,2009.
张方国,陈晓峰,基于身份的密码体制的研究综述,中国密码发展报告,1-31,2009。
陈国敏,陈晓峰,一个安全的广义指定验证者签名证明系统,《电子与信息学报》,31(2),489-492,2009。
2008
XiaofengChen,FangguoZhang,HaiboTian,BaodianWei,WillySusilo,YiMu,HyunrokLee,KwangjoKim,Efficientgenericon-line/off-line(threshold)signatureswithoutkeyexposure,InformationSciences,178(21),4192-4203,2008.
ChunhuiWu,YuqingXing,XiaofengChen,DongyangLong,HyunrokLee,andKwangjoKim,GenericOn-line/Off-lineAggregateSignatures,ICESS08,107-112,IEEEComputerSocietyPress,2008.
GuominChen,ChunhuiWu,WeiHan,XiaofengChen,HyunrokLee,andKwangjoKim,ANewReceipt-FreeVotingSchemeBasedonLinkableRingSignatureforDesignatedVerifiers,ICESS08,18-23,IEEEComputerSocietyPress,2008.
FangguoZhang,XiaofengChen,YiMu,andWillySusilo,ANewandEfficientSignatureonCommitmentValues,InternationalJournalofNetworkSecurity,7(1),101-106,2008.
BaodianWei,FangguoZhang,XiaofengChen,RingProxySignatures,JournalofElectronics,25(1),108-114,2008.
BaodianWei,FangguoZhangandXiaofengChen,ANewTypeofDesignatedConfirmerSignaturesforaGroupofIndividuals,InternationalJournalofNetworkSecurity,7(2),293-300,2008.
ShengliLiu,XiaofengChen,andFangguoZhang,OntheForgeabilityofWang-Tang-Li'sID-BasedRestrictivePartiallyBlindSignatureScheme,JournalofComputerScienceandTechnology,23(2),265-269,2008.
FangguoZhang,XiaofengChen,andBaodianWei,EfficientDesignatedConfirmerSignaturefromBilinearPairings,AsiaCCS,363-368,2008.
HaiboTian,XiaofengChen,FangguoZhang,BaodianWei,ADeniableAuthentationKeyAgreementProtocol,Chinacrypt,406-415,2008.
WeiHan,TaoHao,DongZheng,KefeiChen,andXiaofengChen,ATamper-EvidentVotingMachineResistanttoCovertChannels,ProvSecConference,LNCS5324,335–344,Springer-Verlag,2008.
2007
XiaofengChen,FangguoZhang,andShengliLiu,ID-basedRestrictivePartiallyBlindSignaturesandApplications,TheJournalofSystemsandSoftware,80(2),164–171,2007.
XiaofengChen,FangguoZhang,WillySusiloandYiMuEfficientGenericOn-line/Off-lineSignaturesWithoutKeyExposure,AppliedCryptographyandNetworkSecurity07,LNCS4521,18-30,Springer-Verlag,2007.
XiaofengChen,QianhongWu,FangguoZhang,BaodianWei,ByoungcheonLee,HyunrokLeeandKwangjoKim,NewReceipt-freeVotingSchemeUsingDouble-trapdoorCommitment,The8thInternationalWorkshoponInformationSecurityApplications,395-409,2007.
BaodianWei,XiaofengChen,FangguoZhang,andJiaLiu,TwoNewID-BasedProxyRingSignatureSchemes,JournalofComputationalInformationSystems,3(1),81-88,2007.
BaodianWei,FangguoZhang,XiaofengChen,ID-basedRingProxySignatures,InternationalSymposiumonInformationTheory07,1031-1035,IEEEComputerSociety,2007.
BaodianWei,FangguoZhang,XiaofengChen,Society-orientedDesignatedConfirmerSignatures,InternationalConferenceonNaturalComputation07,VolV,707-712,IEEEComputerSociety,2007.
ChunhuiWu,XiaofengChen,FangguoZhang,HyunrokLee,andKwangjoKim,RemarksonReceipt-freeAuction/VotingSchemesUsingCommitment,Chinacrypt07,272-282,SciencePress,2007.
JinLi,KwangjoKim,FangguoZhangandXiaofengChen,AggregateProxySignatureandVerifiablyEncryptedProxySignature,InternationalConferenceonProvableSecurity07,LNCS4784,208-217,Springer-Verlag,2007.
2006
XiaofengChen,FangguoZhang,ID-basedgroup-orientedsignaturesfrompairings,ChineseJournalofElectronics,15(1),12-16,2006.
XiaofengChen,FangguoZhang,andKwangjoKim,ANewID-BasedGroupSignatureSchemefromBilinearPairings,JournalofElectronics,23(6),892-900,2006.
XiaofengChen,FangguoZhang,YiMu,andWillySusilo,EfficientProvablySecureRestrictivePartiallyBlindSignaturesfromBilinearPairings,FinancialCryptographyandDataSecurity06,LNCS4107,251-265,Springer-Verlag,2006.
Fangguozhang,XiaofengChen,WillySusiloandYiMu,ANewSignatureSchemeWithoutRandomOraclesfromBilinearPairings,VietCrypt2006,LNCS4341,67-80,Springer-Verlag,2006.
JinLi,XiaofengChen,FangguoZhang,andYanmingWang,GeneralizationoftheSelective-IDSecurityModelforHIBSProtocols,InternationalConferenceonComputationalIntelligenceandSecurity06,LNAI4456,894-902,Springer-Verlag,2007.
JinLi,XiaofengChen,TszHonYuen,andYanmingWang,ProxyRingSignature:FormalDefinitions,EfficientConstructionandNewVariant,InternationalConferenceonComputationalIntelligenceandSecurity06,LNAI4456,545-555,Springer-Verlag,2007.
2005
QianhongWu,BoQin,ChangjieWang,XiaofengChenandYuminWang,t-Out-of-nString/BitObliviousTransfers:Revisited,InformationSecurityPracticeandExperienceConference2005,LNCS3439,410–421,Springer-Verlag,2005.
FangguoZhangandXiaofengChen,CryptanalysisofHuang–Changpartiallyblindsignaturescheme,TheJournalofSystemsandSoftware,76(3),323-325,2005.
FangguoZhang,XiaofengChenandBaodianWei,CryptanalysisonTwoBlindSignatureSchemes,CCICS’05,116-123,Xi’an,China,SciencePress,2005
XiaofengChen,FangguoZhang,andBaodianWei,Commentonthepublickeysubstitutionattacks,InternationalJournalofNetworkSecurity,1(3),168-172,2005
FangguoZhang,WillySusilo,YiMu,andXiaofengChen,Identity-basedUniversalDesignatedVerifierSignatures,TheFirstInternationalWorkshoponSecurityinUbiquitousComputingSystems(SecUbiq2005),LNCS3823,825–834,Springer-Verlag,2005.
XinyiHuang,YiMu,WillySusilo,FangguoZhangandXiaofengChen,AShortProxySignatureScheme:EfficientAuthenticationintheUbiquitousWorld,The2ndinternationalSymposiumonUbiquitousIntelligenceandSmartWorlds(UISW2005),LNCS3823,480–489,Springer-Verlag,2005.
XiaofengChen,FangguoZhang,andShengliLiu,ID-basedRestrictivePartiallyBlindSignatures,InternationalConferenceonComputationalIntelligenceandSecurity,PartII,LNAI3802,117-124,Springer-Verlag,2005.
2004
XiaofengChen,FangguoZhangandKwangjoKim,LimitedverifiersignaturefrombilinearPairings,AppliedCryptographyandNetworkSecurity04,LNCS3089,135-148,Springer-Verlag,2004.
XiaofengChen,FangguoZhangandKwangjoKim,ChameleonHashingwithoutKeyExposure,InformationSecurityConference04,LNCS3225,135-148,Springer-Verlag,2004.
XiaofengChen,FangguoZhangandKwangjoKim,NewID-basedthresholdsignatureschemefrombilinearpairings,Indocrypt04,LNCS3348,371-383,Springer-Verlag,2004.
XiaofengChenandFangguoZhang,ANovelID-basedSignatureSchemefromBilinearPairings,InternationalConferenceonComputerCommunications04,551-555,Beijing,2004.
XiaofengChen,FangguoZhangandYuminWang,ANewApproachtoPreventBlackmailinginE-Cash,Chinacrypt’04,272-282,Wuxi,SciencePress,2004
QianhongWu,ChangjieWang,XiaofengChenandYuminWang,PubliclyVerifiableAuctionswithMinimalLeakage,28thAnnualInternationalComputerSoftwareandApplicationsConference,384-389,Hongkong,IEEEComputerSocietyPress,2004
QianhongWu,XiaofengChen,ChangjieWangandYuminWang,Shared-keySignatureandItsApplicationtoAnonymousAuthenticationinAdHocGroup,InformationSecurityConference04,LNCS3225,330-341,Springer-Verlag,2004.
FangguoZhangandXiaofengChen,AttackonanID-basedAuthenticatedGroupKeyAgreementSchemefromPKC2004,InformationProcessingLetters.91(4),191-193,2004.
JiqiangLv,KuiRen,XiaofengChenandKwangjoKim,RingAuthenticatedEncryption:ANewTypeofAuthenticatedEncryption,SCIS04,1179-1184,Sendi,Japan,2004.
PingWang,XiaofengChenandKwangjoKim,OntheSecurityofZhang-Wu-Wang'sForward-SecureGroupSignatureSchemeinICICS'03,CISC2004,Korea.
陈晓峰,王继林,王育民,无强迫的最优合同签署方案,《电子学报》,32(3),404-407,2004。
陈晓峰,王继林,王育民,基于广义XTR体制的签名方案,《电子与信息学报》,26(4),562-567,2004。
陈晓峰,王育民,公钥密码体制研究及进展,《通信学报》,25(8),146-155,2004。
2003
XiaofengChen,ByoungcheonLeeandKwangjoKim,Receipt-freeelectronicauctionschemesusinghomomorphicencryption,ICISC’03,LNCS2971,259-273,Springer-Verlag,2003.
XiaofengChen,FeiFengandYuminWang,NewkeyimprovementsanditsapplicationforXTRsystem,TheInternationalConferenceonAdvancedInformationNetworkingandApplications,Xi’an,IEEEComputerSocietyPress,561-564,2003.
Chenxiaofeng,Wangjilin,Wangyumin,FairElectronicCashBasedonFingerprinting,Chinese3rdinformationandcommunicationsecurityconference,Wuhan,SciencePress,2003.
WangChangjie,ChenXiaofengandWangYumin,AnAgent-basedMultiroundsOnlineAuctionProtocolwithSealedBids,TheInternationalConferenceonAdvancedInformationNetworkingandApplications,Xi’an,IEEEComputerSocietyPress,194-197,2003.
JianhongZhang,XiaofengChenandYuminWang,Securityanalysisoftheimprovedgroupsignature,Proceedingof2003IEEEInformationTheoryWorkshop,171-174,France,2003.
YanXie,FangguoZhang,XiaofengChenandKwangjoKim,ID-basedDistributed`MagicInk'Signature,ICICS'03,LNCS2836,249-259,Springer-Verlag,2003.
陈晓峰,王育民,张文鹏,一个类似于Dedekind和的四次均值公式,《西北大学学报》,33(2),129-132,2003。
陈晓峰,王育民,电子拍卖研究现状与进展,《通信学报》,23(12),73-81,2003。
陈晓峰,高虎明,王育民,基于XTR体制的盲签名方案,《电子与信息学报》,25(6),851-854,2003。
陈晓峰,王育民,基于匿名通讯信道的安全电子投票方案,《电子学报》,31(3),390-393,2003。
陈晓峰,王继林,王育民,基于不完全信任模型的无收据的电子投票,《计算机学报》,26(5),557-561,2003。
陈晓峰,伍前红,王育民,基于多方安全计算的密钥协商,《西安电子科技大学学报》

相关热点

扫码添加好友