您的当前位置:首页科研成果论文专著
2015年论文列表
文章来源: 发布时间:2016-03-10 【字号:
序号 论文类型 论文名称 刊物名称 论文所在期刊的卷、期、页 论文收录类型 论文作者
1 国外重要刊物 The Complexity and Randomness of Linear Multi-Secret Sharing Schemes with Non-Threshold Structures  Acta Mathematicae Applicate Sinica 2014.1 SCI收录  Chunming Tang*, Shuguang Dai
2 国外重要刊物 A Novel Hybrid Incentive Mechanism for Node
Cooperation  in  Mobile  Cyber-Physical  Systems  [J].
 International  Journal  of  Parallel, Emergent and Distributed Systems  2014, 29(3): 316-336. EI收录 Xiaofei Wang, Ying Cai* and Zhuo Li
3 国外重要刊物 Securely verifiable outsourcing schemes of matrix calculation[J]  International Journal of High Performance Computing and Networking , Vol. 8, No. 2, (2015):93-101. EI收录  Can Xiang, Chunming Tang*
4 国外重要刊物  Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix[J]  Journal of Cloud Computing 2015, 4(1): 1-6 EI收录 Xin Hu, Chunming Tang*
5 国内重要刊物 Stego key searching for LSB steganography on JPEG decompressed image  Sci China Inf Sci  DOI: 10.1007/s11432-015-5367-x,Publication Date (Web): 15 June 2015 SCI收录 刘九芬,田雨果,韩涛,刘文斌,罗向阳.
6 国外重要刊物 Novel Image Encryption based on Quantum Walks  Scientific Reports 5(1),7784 (2015) SCI收录 Yu-Guang Yang, Qing-Xiang Pan, Si-Jia Sun, Peng Xu
7 国外重要刊物 Non-expansible XOR-based visual cryptography scheme with meaningful shares [J]  Signal processing 2015, 108: 604-621 SCI收录 Duanhao Ou, Wei Sun*, Xiaotian Wu
8 国外重要刊物 Privacy-preserving face recognition with outsourced computation [J  Soft computing.  DOI 10.1007/s00500-015-1759-5.  SCI收录 Can Xiang, Chunming Tang*, Yunlu Cai, Qiuxia Xu. 
9 国外重要刊物 Privacy Aware Attribute-Based PHR Sharing with User Accountability in Cloud Computing  The Journal of Supercomputing 2014, 7(5): 1607-1619 SCI收录 Fatos Xhafa*, Jianglang Feng, Yinghui Zhang, Xiaofeng Chen, and Jin Li
10 国外重要刊物 A new publicly verifiable data possession on remote storage[J]  The Journal of Supercomputing 2015: 1-15. SCI收录 Chunming Tang*, Xiaojun Zhang
11 国外重要刊物  Trusted Cooperative
Spectrum Sensing Scheme Based on D-S Evidence Theory
2015 International Conference on Information and Communications Technologies (ICT2015),Xi'an , pp.263-267, April, 2015.  EI收录  Jingyu Feng*, Meiying Wang, Guangyue Lu and Jinlong Li
12 国外重要刊物 Several classes of polynomials with low differential uniformity over finite fields of odd characteristic AAECC Doi: 10.1007/s00200-015-0272-5. SCI收录 Guangkui Xu, Xiwang Cao*, Shanding Xu
13 国外重要刊物 New model and construction of ABE: achieving key resilient-leakage and attribute direct-revocation ACISP'14, LNCS 8544,  pp. 192–208, 2014.  EI收录 Mingwu Zhang
14 国外重要刊物 On the Exact Multicast Delay in Mobile Ad Hoc Networks with f -cast Relay Ad Hoc Networks 33(2015)1-86 SCI收录 Bin Yang, Ying Cai, Yin Chen and Xiaohong Jiang
15 国外重要刊物 More constructions of approximately mutually unbiased bases, Bulletin of Aust. Soc.  doi:10.1017/S0004972715000994, SCI收录 Xiwang Cao*, Wun-Seng Chou
16 国内重要刊物  An Effective Differential

Fault Analysis on the Serpent Cryptosystem in the Internet of Things
China Communications 11(6), pp.129–139, 2014. (SCI:000338916200015,第十八届全国青年通信学会年会优秀论文) SCI收录 W. Li, Z. Tao, D. Gu, L. Sun, B. Qu, Z. Liu, Y. Liu,
17 国外重要刊物 Achieving Efficient and Privacy-preserving Multi-feature Search for Mobile Sensing Computer Communications  2015, vol. 65, pp. 35-42. SCI收录 Hongwei Li*, Yi Yang, Haomiao Yang, and Mi Wen
18 国外重要刊物  Public key encryption with delegated equality test in a multi-user setting Computer Journal,  986-1002 (2015) SCI收录 Sha Ma, Mingwu Zhang, Qiong Huang and Bo Yang
19 国外重要刊物 Generic Construction for Secure and Efficient Handoff Authentication Schemes in EAP-based Wireless Networks Computer Networks  2014, 75: 192-211 SCI收录 Yinghui Zhang*, Xiaofeng Chen, Jin Li, and Hui Li
20 国外重要刊物 An Error-Tolerant Keyword Search Scheme Based on Public-Key Encryption in Secure Cloud Computing Concurrency and Computation: Practice and Experience online: 7 JUL 2015 EI收录 Yang Bo, Mingwu Zhang, Jun-Qiang Du
21 国外重要刊物 Constructing new APN functions and bent functions over finite fields of odd characteristic via the switching method Crypto. Commun.  Doi: 10.1007/s12095-0145-6  SCI收录  Guangkui Xu, Xiwang Cao*, Shanding Xu
22 国外重要刊物  Optimal p-ary cyclic codes with minimum distance four from monomials Crypto. Commun.  Doi: 10.1007/s12095-0159-0 SCI收录 Guangkui Xu, Xiwang Cao*,Shanding Xu
23 国外重要刊物  LSB steganographic payload location for JPEG-decompressed images Digital Signal Processing,  38:66-76, 2015 SCI收录 刘九芬,田雨果,韩涛,杨春芳,刘文斌
24 国外重要刊物  Provably Secure and Efficient Leakage-Resilient Certificateless Signcryption Scheme without Bilinear Paring Discrete Applied Mathematics doi:10.1016/j.dam.2015.10.018 SCI收录 Zhou Yanwei, Yang Bo, Zhang Wenzheng
25 国外重要刊物 Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack EUROCRYPT 2014 77-92 EI收录 Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
26 国外重要刊物 Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst.  Appl. 41(17): 7789-7796 (2014). SCI收录 Yong Yu, Jianbing Ni*, Man Ho Au, Hongyu Liu, Hua Wang, Chunxiang Xu
27 国外重要刊物 Two classes of permutation polynomials having the form (x2m+x+δ)s+x. Finite Fields and Their Applications  31: 12-24 (2015) 其他收录 Ziran Tu, Xiangyong Zeng, Yupeng Jiang
28 国外重要刊物 Tor Helleseth: Permutation polynomials of the form (xpm-x+δ)s+L(x) over the finite field Fp2m of odd characteristic Finite Fields and Their Applications  34: 20-35 (2015) 其他收录 Ziran Tu, Xiangyong Zeng, Chunlei Li
29 国外重要刊物 Yi Mu: Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks Frontiers of Computer Science  8(3): 456-468 (2014) SCI收录 Mingwu Zhang
30 国外重要刊物 Remote data possession checking with enhanced security for cloud storage Future Generation Computer System,  vol 52, 77-85, 2015.  SCI收录 Yong Yu*, Yafang Zhang, Jianbing Ni, Man Ho Au, Lanxiang Chen, Hongyu Liu
31 国外重要刊物 A Novel Attack to Spatial Cloaking Schemes in Location-Based Services Future Generation Computer Systems,  49:125-132, 2015.  SCI收录 B. Niu*, Xiaoyan Zhu, Qinghua Li, Jie Chen and Hui Li
32 国外重要刊物 Biwen Chen and Hua Shen. Program obfuscator for privacy-carrying unidirectional one-hop re-encryption ICA3PP 2015  LNCS 9532, pp.1-10, (2015) EI收录 Mingwu Zhang
33 国外重要刊物 Impossible Differential  Fault  Analysis  on  the  LED  Lightweight  Cryptosystem  in  the Vehicular  Ad-hoc  Networks IEEE  Transactions  on  Dependable  and  Secure
Computing
2015. (SCI, 录用) SCI收录 W. Li, W. Zhang, D. Gu, Y. Cao, Z. Tao, Z. Zhou, Y. Liu, Z. Liu,
34 国外重要刊物 Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited IEEE Trans. on Information Forensics and Security,  Vol.10, No.12, Dec., 2015. SCI收录 郭林杰,倪江群(通信作者),苏文康,唐承佩,施云青
35 国外重要刊物 A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid, Accepted for publication in IEEE Transactions on Smart Grid IEEE Transactions on .Year: 2015 Volume: PP, Issue:
99,Pages: 1 - 1, DOI: 10.1109/TSG.2015.2412091,IEEE Early Access Articles 
SCI收录 Yanmin Gong, Ying Cai, Yuanxiong Guo , Yuguang Fang*
36 国外重要刊物 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts IEEE Transactions on Computers Issue Date: 5555-01 SCI收录 Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farras, and Jesus A. Manjon.
37 国外重要刊物 Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email IEEE Transactions on Computers.  Issue Date: 5555-01 SCI收录 Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang, Hai Jin
38 国外重要刊物 Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response IEEE Transactions on Computers.  Issue Date: 2015-03 SCI收录 Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
39 国外重要刊物 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data IEEE Transactions on Dependable and Secure Computing  2015, DOI:10.1109/TDSC.2015.2406704 SCI收录 Hongwei Li*, Yi Yang, Tom H. Luan, Xiaohui Liang, Liang Zhou, and Xuemin (Sherman) Shen
40 国外重要刊物 Extended Capabilities for XOR-Based Visual Cryptography [J] IEEE Transactions on Information Forensics and Security 2014, 9(10): 1592-1605.  EI收录 Xiaotian Wu, Wei Sun*
41 国外重要刊物 On the Size of Source Space in a Secure MAC IEEE Transactions on Information Forensics and Security , Vol. 10, No. 9, pages 2007-2015, Sept. 2015. EI收录  Shaoquan Jiang,
42 国外重要刊物 Privacy-Preserving Authenticated Key-Exchange Over Internet IEEE Transactions on Information Forensics and Security  9(1): 125-140 (2014) SCI收录 Andrew Chi-Chih Yao, Yunlei Zhao
43 国外重要刊物 On the Optimality of Keyless Authentication in a Noisy Model IEEE Transactions on Information Forensics and Security, Vol. 10, No. 6, pp. 1250-1261, June 2015 EI收录 Shaoquan Jiang,
44 国外重要刊物 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search IEEE Transactions on Information Forensics and Security, Vol. 10, no. 9, pp. 1993-2006, 2015 EI收录 Peng Xu, Qianhong Wu, Willy Susilo, Josep Domingo-Ferrer, Wei Wang and Hai Jin
45 国外重要刊物 TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2340-2351, 2015. EI收录 Huaqun Wang, Bo Qin, Qianhong Wu, Li Xu, Josep Domingo-Ferrer
46 国外重要刊物 Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications IEEE Transactions on Information Forensics and Security.  Vol. 10, no. 11, pp. 2352-2364, 2015 EI收录 Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Zheming Dong. 
47 国外重要刊物 Constructions of   Bent-Negabent Functions and their relation to the completed Maiorana-McFarland Class. IEEE Transactions on Information Theory  61(3), (2015) , pp.1496–1506 SCI收录 Fengrong Zhang, Yongzhuang Wei, and Enes Pasalic*
48 国外重要刊物 An Incentive-Compatible Routing Protocol for
Two-hop Delay Tolerant Networks. Vehicular Technology
IEEE Transactions on Year:
2015
Volume: PP, Issue: 99 Pages: 1- , DOI: 10.1109 /TVT. 2015.2454291 IEEE Early
Access Articles
SCI收录 Ying Cai*, Yanfang Fan, Ding Wen
49 国外重要刊物 Packet Delivery Ratio/Cost in
MANETs  with  Erasure  Coding  and  Packet  Replication.  Vehicular  Technology
IEEE Transactions on. 2015 Volume:64, Issue:5,Pages: 2062-2070, DOI: 10.1109/TVT.2014.23
62355
SCI收录 Bin Yang, Yin Chen, Ying Cai  and  Xiaohong Jiang
50 国外重要刊物 Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP IEEE Wireless Communications  2015, vol.22, no.4, pp. 74 - 80 SCI收录 Hongwei Li, Dongxiao Liu, Yuanshun Dai and Tom H. Luan,
51 国外重要刊物 A new construction of block codes from algebraic curves IEEE. Trans. on Inform. Theory,  vol. 61, no. 8, pp. 4239-4242, Aug. 2015. SCI收录  L. F. Jin
52 国外重要刊物  Decoding of dual-containing codes from Hermitian tower and applications IEEE. Trans. on Inform. Theory,  vol. 61, no. 11, pp. 5843-5847, 2015. SCI收录 L. F. Jin and H. B
53 国外重要刊物 Improved Impossible Differerntial Attack on Reduced Version of Camellia with FL/F-1 FuLnctions IET Information Security 2015.(SCI,  录用) SCI收录 Y. Liu, A. Yang, Z. Liu,  W. Li, Q. Wang, L. Song, D. Gu
54 国内重要刊物 Security Weakness of Two Identity-Based Multiple Key Agreement Protocols In Proc. of ICT 2014, Nanjing, China 2014: 395-399. (EI: 20143518116604) EI收录 Q. F. Cheng*, J. H. Zhao, S. Q. Lu.
55 国外重要刊物 Achieving Authorized and Ranked Multi-keyword Search over Encrypted Cloud Data in Proceedings of ICC, London, UK,  pp.7450 - 7455, 2015. 其他收录 Hongwei Li*, Dongxiao Liu, Kun Jia and Xiaodong Lin
56 国外重要刊物 The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions in Proceedings of the 12th Theory of Cryptography Conference (TCC 2015),  LNCS 9014, pp. 7-35.  EI收录 Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng.
57 国外重要刊物 Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015)  LNCS 9326, pp. 468-480 EI收录 Junrong Liu, Yu Yu*, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie.
58 国外重要刊物 (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond in Proceedings of the 35th Annual International Conference on Cryptology (CRYPTO 2015),  LNCS 9216, pp. 209-229 EI收录 Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
59 国外重要刊物 On security against the server in designated tester public key encryption with keyword search Information Processing Letters, 115(2015):957-961. SCI收录 Zhiyi Shao, Bo Yang
60 国外重要刊物 Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding Information Sciences 277,445-457(2014) SCI收录 Yu-Guang Yang, Xin Jia, Si-Jia Sun, Pan Qing-Xiang.
61 国外重要刊物 Security Analysis of the Piccolo Lightweight Cipher in the Internet of Things Information–An International Interdisciplinary Journal,  2015. (SCI,  录用) SCI收录 W. Li, X. Xia, D. Gu, Z. Liu, Y. Liu, C. Zhao
62 国外重要刊物 Participant Attack on Three-party Quantum key Agreement with Two-photon Entanglement Int J Theor Phys 2015, DOI: 10.1007/s10773-015-2632-0 (SCI 检索) SCI收录 Zhenchao ZHU, AiQun HU and AnMin FU
63 国外重要刊物 Cryptanalysis and Improvement of the Controlled Quantum Secure Direct Communication by Using Four Particle Cluster States Int J Theor Phys 2014, 53(5): 1495 -1501(SCI 检索) SCI收录 Zhenchao ZHU, AiQun HU and AnMin FU
64 国外重要刊物 Improved WOW adaptive image steganography method International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2015.   SCI收录 Xin Liao, Guoyong Chen, Qi Li
65 国外重要刊物 Cryptanalysis and Improvement of an Efficient Authenticated Key Exchange Protocol with Tight Security Reduction International Journal of Communication Systems  2014, DOI: 10.1002/dac.2899. (SCI检索) SCI收录 S. Q. Lu, J. H. Zhao, Q. F. Cheng*
66 国外重要刊物 Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services International Journal of Communication Systems, Wiley,  DOI:10.1002/dac2817 SCI收录 Mingwu Zhang, Yong Xia, Ou Ruan, Kirill Morozov
67 国外重要刊物 Yongzhuang Wei, Wenbin Yin, Fengrong Zhang, Enes Pasalic* International Journal of Computer Mathematics (DOI10.1080/00207160.2014.988148 SCI收录 Yongzhuang Wei, Wenbin Yin, Fengrong Zhang, Enes Pasalic*
68 国外重要刊物  The electronic cash system based on non-interactive zero-knowledge proofs[J] International Journal of Computer Mathematics ,2014, DOI: 10.1080/00207160.2014.933816 SCI收录 Fucai Zhou, Yuxi Li, Qingshi Zhou, Jingwei Miao , Jian Xu
69 国外重要刊物  Wenfen Liu, On Permutation Polynomials of the Form 2^{1+2^k}+L(x). International Journal of Computer Mathematics,  pp. 1-8, Aug., 17, 2015 SCI收录 Xin Gong, Guangpu Gao*
70 国外重要刊物 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing International Journal of Computer Science Issues 2015, 12(3): 10-15 其他收录 Yinghui Zhang*
71 国外重要刊物 Subliminal-free Variant of Schnorr Signature with Provable Security International Journal of Electronics and Information Engineering 2015, 2(2): 59-68 其他收录 Yinghui Zhang*, Hui Li, Xiaoqing Li, and Hui Zhu
72 国外重要刊物 Constructing New Piecewise Differentially 4-Uniform
Permutations from Known APN Functions
International Journal of Foundations of Computer Science Vol. 26, No. 5 (2015) 599–609, DOI: 10.1142/S0129054115500331  SCI收录 Guangkui Xu, Xiwang Cao*
73 国外重要刊物 Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity International Journal of Foundations of Computer Science  Vol. 26, No. 5 (2015) 537–556 DOI: 10.1142/S0129054115500306 SCI收录 Xiwang Cao*, Lei Hu,
74 国外重要刊物 Attribute–based signature schemes with accountability[J International Journal of Information and Communication Technology 2015, 7(2-3): 141-158. (EI) EI收录 Yan Ren, Chunming Tang*, Guilin Wang, et a
75 国外重要刊物 Practical Chosen Ciphertext Secure Hierarchical Identity-Based Broadcast Encryption. International Journal of Information Security pp 1-16, 24 April 2015 SCI收录 Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin
76 国外重要刊物 An Improved Automatic Search Method for Differential Trails in TEA Cipher International Journal of Network Security Vol. 18, No. 4, 2016, pp. 644-649 EI收录 Kaihao Chen, Xiaoming Tang, Peng Xu*, Man Guo, Guangpeng Song, Weidong Qiu, Zheng Gong
77 国外重要刊物 Tang. Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round International Journal of Network Security, 2015, 17(6): 678-682. (EI检索) EI收录 Q. F. Cheng*, C. M. Tang
78 国外重要刊物 Improved Fully Homomorphic Encryption over the Integers with Shorter Public Keys[J] International Journal of Security and Its Applications,   Vol.8, No.6, (2014): 365-374. EI收录 Can Xiang, Chunming Tang*
79 国外重要刊物  Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol International Journal of Theoretical Physics 54(3), 910-916(2015) SCI收录 Yu-Guang Yang, Si-Jia Sun, Yan Wang
80 国外重要刊物 Trojan-horse attacks on quantum key distribution with classical Bob International Journal of Theoretical Physics  14(2), 681-686 (2015) SCI收录 Yu-Guang Yang, Si-Jia Sun, Qian-Qian Zhao
81 国外重要刊物 Quantum bit commitment with application in quantum zero-knowledge proof ISAAC 2015   EI收录 Jun Yan*, Jian Weng, Dongdai Lin, Yujuan Quan
82 国外重要刊物 Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures ISPEC 2014 : 359-372  EI收录 Yong Yu*, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
83 国外重要刊物 ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage ISPEC'14 LNCS 8434, pp. 481–495, 2014. EI收录 Mingwu Zhang
84 国外重要刊物 Differential Fault Analysis on the

MD5  Compression  Function
Journal  of  Computers  8(11),  pp.  2888–2894,

2013.(EI: 20134616980998)
EI收录 W. Li, Z. Tao, D. Gu, Y. Li, Z. Liu, Y. Liu
85 国外重要刊物 Further results on permutation polynomials of the form   over  Journal of Algebra and Its Applications  Vol. 15, No. 6 (2016) ,DOI: 10.1142/S0219498816500985 SCI收录  Guangkui Xu, Xiwang Cao*, Shanding X
86 国外重要刊物 Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server[J] Journal of Ambient Intelligence and Humanized Computing  (2015) 6: 131–139  SCI收录 Can Xiang, Chunming Tang*
87 国外重要刊物 Construction of Multiplicative Monotone Span Program Journal of Computational Information Systems.  2014年11月 EI收录 Yuenai Chen, Chunming Tang*
88 国外重要刊物  Key Policy Attribute Based Proxy Re-encryption and RCCA Secure Scheme Journal of Internet Services and Information Security 2014, 4(2): 70-82 其他收录 Keying Li*, Jianfeng Wang, Yinghui Zhang, and Hua Ma
89 国外重要刊物 Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Journal of Visual Communication and Image Representation 28(4), pp. 21-27, 2015 SCI收录 Xin    Liao*, Changwen Shu
90 国外重要刊物 User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion [J] Journal of Visual Communication and Image Representation, 2015, 29: 46-60 其他收录 Duanhao Ou, Lili Ye, Wei Sun*
91 国外重要刊物 A Privacy Preserving Handover Authentication Scheme for WiMAX- WiFi Networks KSII Transactions on Internet and Information Systems vol.8,no.9,pp.3250-3265,September 2014. (SCI 检索) SCI收录  Anmin Fu *, Gongxuan Zhang, Yan Yu, Zhenchao Zhu
92 国外重要刊物 Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things KSII Transactions on Internet and Information Systems 9(2), pp. 793–810, 2015. (SCI) SCI收录 W. Li, W. Zhang, D. Gu, Z. Tao, Z. Zhou, Y. Liu, Z. Liu
93 国外重要刊物 Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. KSII Transactions on Internet and Information Systems 2014, 8(11): 4028-4049 SCI收录 Yinghui Zhang*, Xiaofeng Chen, Jin Li, Hui Li, and Fenghua Li
94 国外重要刊物 Behave Well: How to Win a Pop Vacant Band via Cooperative Spectrum Sensing KSII Transactions on Internet and Information Systems  vol.9, no.4, pp.1321-1335, 2015 SCI收录  Jingyu Feng, Guangyue Lu* and Hong Chang
95 国外重要刊物  High payload image steganography with minimum distortion based on absolute moment block truncation coding [J] Multimedia Tools and Applications 2014,74(21): 9117-9137 SCI收录 Duanhao Ou, Wei Sun*.
96 国外重要刊物 Quantum-assisted encryption for digital audio signals Optik   126,3221-3226(2015) SCI收录 Yu-Guang Yang, Ju Tian, Si-Jia Sun, Peng Xu. 
97 国外重要刊物  Reductions between private information retrieval and oblivious transfer at the quantum level. Optik   126,3206-3209(2015) SCI收录 Yu-Guang Yang, Si-Jia Sun, Qing-Xiang Pan, Peng Xu.
98 国外重要刊物  Quantum oblivious transfer based on unambiguous set discrimination. Optik   126,3838-3843(2015) SCI收录 Yu-Guang Yang, Si-Jia Sun, Qing-Xiang Pan, Peng Xu
99 国外重要刊物 Secure quantum private query with real-time security check Optik  125, 5538-5541 (2014) SCI收录 Yu-Guang Yang, Si-Jia Sun, Ju Tian, Peng Xu.
100 国外重要刊物 Quantum oblivious transfer with an untrusted third party. Optik   125,5409-5413(2014)  SCI收录 Yu-Guang Yang, Peng Xu, Ju Tian, Hua Zhang. 
101 国外重要刊物 Attribute-Based Data Sharing in Mobile Clouds Pervasive and Mobile Computing. Online Publication doi:10.1016/j.pmcj.2015.06.009. SCI收录 Yinghui Zhang*, Dong Zheng, Xiaofeng Chen, Jin Li, and Hui Li
102 国内重要刊物 SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems Proc.    WASA'15, Qufu, Shandong, China August 10-12, 2015 EI收录 C. Lai*, R. Lu, and D. Zheng
103 国外重要刊物 "UGHA: Uniform Group-based Handover
Authentication for MTC within E-UTRAN in LTE-A Networks
Proc. IEEE ICC'15, London, UK  June 8-12, 2015 EI收录 J. Cao*, Hui Li, MaodeMa, Fenghua Li
104 国外重要刊物 Towards Power Consumption-Delay Tradeoff by Workload Allocation in Cloud-Fog Computing Proc. IEEE ICC'15, London, UK,  June 8-12, 2015 EI收录 R. Deng*, R. Lu, C. Lai, and T. H. Luan
105 国外重要刊物 GAHAP: A Group-based Anonymity Handover Authentication Protocol for MTC in LTE-A Networks Proc. IEEE ICC'15, London, UK,  June 8-12, 2015 EI收录 J. Cao*, Hui Li, Maode Ma
106 国外重要刊物 Enhancing Privacy through Caching in Location-Based Services Proc. IEEE INFOCOM 2015   EI收录 B. Niu*, Qinghua Li, Xiaoyan Zhu, Guohong Cao and Hui Li
107 国外重要刊物 Achieving  Secure  Friend
Discovery in Social Strength-Aware PMSNs
Proc. IEEE MILCOM 2015   EI收录 B.  Niu*,  Yuanyuan  He,  Fenghua  Li  and  Hui  Li
108 国外重要刊物 A New Encryption-Then-Compression Algorithm Using the Rate-Distortion Optimization Proc. of IWDW 2015,  Oct., 2015 EI收录 胡翔磊,倪江群(通信作者),潘润标
109 国外重要刊物 Detecting Video Forgery By Estimating Extrinsic Camera Parameters Proc. of SPIE MIPPR 2015.  Nov., 2015 EI收录 欧俊海,倪江群(通信作者)
110 国外重要刊物 Improving the security of protocols of  quantum  key  agreement  solely  using  Bell  states  and  Bell  measurement Quantum Inf Process 2015, 14(11):4245–4254. (SCI 检索) SCI收录 Zhenchao ZHU, AiQun HU and AnMin FU
111 国外重要刊物 Private database queries using one quantum state Quantum Information Processing 14(3), 1017-1024(2015) SCI收录 Yu-Guang Yang, Ming-Ou Zhang, Rui Yang
112 国外重要刊物 Relativistic quantum private database queries Quantum Information Processing 14(4),1443-1450 (2015) SCI收录 Si-Jia Sun, Yu-Guang Yang, Ming-Ou Zhang
113 国外重要刊物 Quantum oblivious transfer with relaxed constraints on the receiver Quantum Information Processing 14,3031–3040(2015) SCI收录 Yu-Guang Yang, Rui Yang, He Lei,Wei-Min Shi, Yi-Hua Zhou
114 国外重要刊物  Analysis and improvement of the watermark strategy for quantum images based on quantum wavelet transform.  Quantum Information Processing  13,1931-1936(2014) SCI收录 Yu-Guang Yang, Peng Xu, Ju Tian, Hua Zhang
115 国外重要刊物 Formal Analysis of the Real-time Multimedia Network Protocol ZRTP Recent Advances in Electrical & Electronic Engineering 2015, 8(1): 12-17. (EI: 20152400931645) EI收录 S. Q. Lu, W. B. Wang, Q. F. Cheng*
116 国外重要刊物 GBAAM: group-based access authentication for MTC in LTE  networks Security and  Communication  Networks,   8  (17):  3282–3299,  2015 SCI收录 J. Cao*, M. Ma, H. Li,
117 国外重要刊物 Construction of resilient Boolean functions with highly nonlinearity and good algebraic immunity Security and Communication Networks vol.8, pp. 2909–2916, 2015. SCI收录 Lu-Yang Li, Wei-Guo Zhang*
118 国外重要刊物 High-capacity Reversible Data Hiding in Encrypted Images by Prediction Error [J] Signal Processing  2014, 104: 387-400 SCI收录 Xiaotian Wu, Wei Sun*
119 国外重要刊物 Secure medical information sharing in cloud computing Technology and Health Care 2015, 23(2015):s133-s137. SCI收录 Zhiyi Shao, Bo Yang, Wenzheng Zhang, Yi Zhao, Zhenqiang Wu and Meixia Miao
120 国外重要刊物 Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. The 8th International Conference on Provable Security (ProvSec’14) LNCS 8782, 2014, pp. 259-273 EI收录 Yinghui Zhang*, Dong Zheng, Xiaofeng Chen, Jin Li, and Hui Li
121 国外重要刊物  Kirill Morozov: LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces The Journal of Supercomputing  70(3): 1405-1432 (2014) SCI收录 Mingwu Zhang, Chunzhi Wang
122 国外重要刊物 The higher-order meet-in-the-middle attack and its application to the Camellia block cipher Theoretical Computer Science 527, (2014), pp.102–122 SCI收录 Jiqiang Lu*,Yongzhuang Wei, Jongsung Kimd, Enes Pasalice
123 国外重要刊物 Practical (Fully) Distributed Signatures Provably Secure in the Standard Model.  Theoretical Computer Science  vol. 595, pp.143-158,  2015. EI收录 Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu, Yong Ding
124 国外重要刊物 Nframe: A Privacy-preserving with Non-frameability Handover Authentication Protocol Based  on  (t,n)  Secret  Sharing  for  LTE/LTE-A Networks Wireless  Networks, under the second review. (SCI 检索源刊) SCI收录 Anmin Fu*, Ningyuan Qin, Yongli Wang, Qianmu Li, Gongxuan Zhang,
125 国内重要刊物 基于随机路径点移动模型的 MANET 容量及延迟分析 [J] 北京科技大学学报  2014,v36, n10, p1400-1410 EI收录 王晓菲, 蔡英*, 范艳芳
126 国内重要刊物 基于协作的社交位置隐私保护方案 北京信息科技
大学学报
2015,30(5):61-66 其他收录 汤飞,蔡英*,范艳芳,夏红科
127 国内重要刊物 一种高效的移动数据卸载方案 北京信息科技大 学学报 2015,30(4):80-84. 其他收录 倪明云,蔡英*,夏红科,范艳芳
128 国内重要刊物 具有隐私保护的云存储访问控制方案 电子科技 2015, 28(6): 61-63. 其他收录 张应辉*, 郑东, 马华
129 国内重要刊物 一类周期为素数倍数的跳频序列族 电子学报, Vol. 43,No. 10, 2015, 1932-1935.  其他收录 徐善顶,曹喜望,许广魁
130 国内重要刊物 基于属性的指定证实人签名方案 广州大学学报 2014年6月 其他收录 任燕,唐春明*
131 国内重要刊物 针对空域明文LSB隐写的消息提取方法. 华中科学技术大学学报(自然科学版) 43(5):73-78, 2015 EI收录 刘九芬,王俊超,韩涛
132 国内重要刊物 针对LBlock算法的踪迹驱动Cache攻击 计算机工程  41(5), pp.153–158, ( 2015). 其他收录 朱嘉良,韦永壮*
133 国内重要刊物 无线局域网中基于身份签名的接入认证方案 计算机工程 2014,40(12):108-113. 其他收录 王志蓬,林慕清,季东杰,徐剑*
134 国内重要刊物 异构无线网络中基于自更新哈希链的不可否认 性计费协议 计算机科学 vol. 42, no. 3, pp. 111-116,2015 年 3 月 其他收录 陈守国,付安民*,秦宁元
135 国内重要刊物 LTE/LTE-A  网络中基于盲签名的具有条件隐私 保护的切换认证协议 计算机科学 vol. 42, no. 8, pp. 145-151,2015 年 8 月 其他收录 秦宁元,付安民*,陈守国
136 国内重要刊物 隐私保护的推理机策略函数加密及应用 计算机学报,  38(4): 897-908, (2015) EI收录 张明武, 杨波, 王春枝, Tsuyoshi Takagi.
137 国内重要刊物 可证安全的移动互联网络匿名漫游协议 计算机学报. 4.2015, 38(4):733-748. EI收录 周彦伟, 杨波, 张文政
138 国内重要刊物 云端多管理者群组共享数据中具有隐私 保护的公开审计方案 计算机研究与发展  vol.  52,  no.  10,  pp.  2353-2362,2015。(EI 检索) EI收录 付安民*,秦宁元,宋建业,苏铓
139 国内重要刊物 支持协作的强制访问控制模型[J] 计算机研究与发展 2015, 52(10):
2411-2421
其他收录  范艳芳,蔡英
140 国内重要刊物 11轮3D分组密码算法的中间相遇攻击 计算机应用 35( 3), pp.700–703, ( 2015). 其他收录 李灵琛,韦永壮*, 朱嘉良
141 国内重要刊物 DAFE-AC: 支持动态授权和文件评价的访问控制机制 计算机应用 2015, 35(4): 964-967 其他收录 张悦*, 郑东, 张应辉
142 国内重要刊物 可否认的基于属性的指定证实人签名方案 计算机应用研究 2014年1月. 其他收录 任燕,唐春明
143 国内重要刊物 安全协议形式化工具分析比较研究 密码学报 2014, 1(6): 568-577 其他收录 陆思奇, 程庆丰*, 赵进华
144 国内重要刊物  三次旋转对称Bent函数的构造 密码学报 2015, 2(4): 372-380. 其他收录 高光普*, 程庆丰, 王磊
145 国内重要刊物 密文长度恒定且属性直接可撤销的基于属性的加密 密码学报 2014, 1(5): 465-480 其他收录 张应辉*, 郑东, 李进, 李晖
146 国内重要刊物  三次旋转对称bent函数的构造 密码学报 vol. 2. No. 4, pp. 372-380, 2015. 其他收录 高光普*, 程庆丰, 王磊
147 国内重要刊物 物联网移动节点直接匿名漫游认证协议 软件学报 3.2015, 26(9): 2436−2450. 其他收录 周彦伟, 杨波
148 国内重要刊物 使用ECC的身份混合签密方案 软件学报 2015, 26(12): 1-9. 其他收录 俞惠芳, 杨波
149 国内重要刊物 UVDA: 自动化融合异构安全漏洞库框架的设计与实现[J] 通信学报 2015, 36(10): 235-244 EI收录 温涛, 张玉清, 刘奇旭 
150 国内重要刊物 新型组织隐藏的认证密钥交换协议 通信学报 第36卷第九期,82-90,2015.9 EI收录 温雅敏,龚征*
151 国内重要刊物 多样化的可控匿名通信系统 通信学报.  5.2015, 36(6):2015138. 其他收录 周彦伟, 吴振强, 杨波
152 国内重要刊物 认证加密算法SCREAM及iSCREAM的新伪造攻击 网络与信息安全学报   其他收录 田玉丹,韦永壮*
153 国内重要刊物 混合签密综述. 西安邮电大学学报 2015, 20(3): 1-10 其他收录 俞惠芳, 杨波, 张文政
154 国内重要刊物 云计算环境下的安全 西安邮电大学学报 2015,20(4):1-9. 其他收录 邵志毅,杨波,张文政
155 国内重要刊物 “基于 AVISPA 的快速切换认证协议 FHAM  的安 全建模与检测 信息网络安全 2014,05:21-25 其他收录 秦宁元,付安民*,陈守国
156 国内重要刊物 计算量和密文长度恒定的基于属性的加密 中国密码学会2014年会 (ChinaCrypt’14) 2014, 244-252 其他收录 张应辉*, 郑东, 陈晓峰, 李进, 李晖
157 国外重要刊物 Mutual dependency of features in multi-biometric systems Electronics Letters     1.Jiankun Hu    2.Song Wang 3.陈驰
158 国内重要刊物 基于相似查询树的快速密文检索方法 通信学报     1.陈驰       2.朱晓杰     3.申培松
159 国外重要刊物 On affine sub-families of Grain-like structures Jouranl of Cryptology     1.姜宇鹏     2.林东岱
160 国外重要刊物 A Note On Generating Coset Representatives of $PGL-2(q)$ in $PGL_2(q∧2)$ Information Processing Letters 2015 EI收录 1.庄金城    2.程岐
161 国外重要刊物 简易物联网关键技术与挑战 Jouranl of Cryptologic Research 2015年,卷:2,期:1,页:40-53 CSCD收录 武传坤
162 国内重要刊物 基于纠错码的RFID认证协议 计算机应用研究 2015年,卷:153,页:41-47 EI收录 1.赵欢       2.武传坤
163 国内重要刊物 基于透明加解密的密文云存储系统的设计与实现 计算机应用     1.薛锐       2.陈驰      3.邹洪         4.陈力
164 国内重要刊物 RFID快速隐私保护认证协议 软件学报     翟黎
165 国内重要刊物 A modified product code with high payload in steganography 电子学报     1.张凌宇    2.赵险峰     3.关晴骁
166 国内重要刊物 海云安全体系架构 中国科学:信息科学 2015年,卷:45,期:6,页:796~816 其他收录 1.章睿      2.薛锐      3.林东岱   
167 国外重要刊物 Results on Highly Nonlinear Boolean Functions with Provably Good Immunity to Fast Algebraic Attacks Information Sciences 3   1.刘美成     2.林东岱
168 国内重要刊物 Solving Discrete Logarithm Problem in p-Groups on Elliptic Curves over F_{p^n} by Lifting  电子学报     1.朱玉清    2.庄金城     3.林东岱
169 国内重要刊物 模2^k加法的差分性质分析 密码学报 2015年,卷:2,期:2页:122-138 CSCD收录 1.翟黎      2.武传坤
170 国内重要刊物 Improved Domain Extender for the Ideal Cipher 密码与通信 2015年卷:7期:4页:509~533 SCI收录 1.郭淳      2.林东岱
171 国内重要刊物 可验证技术研究进展 中国科学:信息科学 2015年,卷:45,期:11,页:1370~1388 其他收录 1.薛锐       2.吴迎      3.刘牧华    4.张良峰    5.章睿
172 国内重要刊物 物联网感知层安全检测技术研究 通信学报     1.白鲲鹏     2.皮兰      3.武传坤    4.刘海峰    5.赵章界
173 国内重要刊物 Image composite authentication using a single shadow observation 中国科学:信息科学     1.操晓春     2.赵汉东     3.王川      4.张炜
174 国内重要刊物 Active Link Selection for Efficient Semi-supervised Community Detection 科学报道     1.杨亮       2.金弟      3.王啸      4.操晓春
175 国内重要刊物 Total Variation Regularized RPCA for lrregularly Moving Object Detection under Dynamic Background 电气和电子工程师协会控制论学报     1.操晓春     2.杨亮      3.郭晓杰
176 国外重要刊物 布尔环上基于线性代数的Groebner基符号处理函数实现问题/On Implementing the Symbolic Preprocessing Funtion over Boolean Polynomial Rings in Groebner Basis Algorithms Using Linear Algebra Journal of Systems Science and Complexity     1.孙瑶      2.黄震宇    3.林东岱     4.王定康
177 国内重要刊物 A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization 电气和电子工程师协会控制论学报     1.杨亮       2.操晓春     3.金弟     4.王啸     5.孟丹
178 国内重要刊物 Motion Vector-based Video Steganography with Preserved Local Optimality 多媒体工具与应用 2015 EI收录 1.张弘      2.曹纭      3.赵险峰
179 国外重要刊物 An Efcient Privacy-Preserving Ranked Keyword Search Method IEEE期刊     1.陈驰       2.朱晓杰     3.申培松   4.Jiankun Hu 5.Song Guo 6.Zahir Tari 7.Albert Y.Zomaya
180 国外重要刊物 The KDM-CCA Security of the Kurosawa-Desmedt Scheme IEICE Transactions on fundamentals of electronics communications and computer sciences 2015年,卷:E98A,期:4,页:1032~1037 SCI收录 1.常金勇     2.薛锐       3.张安玲
181 国内重要刊物 PFA:Privacy-aware Federal Authentication Scheme for WLAN-MONET Environment 电子学报英文版     1.吴槟       2.咸鹤群      3.芦翔      4.阮书涵
182 国外重要刊物 Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption IEEE Transactions on Information Forensics&Secruity 2015 卷:10 期:10页:2119~2130 SCI收录 1.林素青     2.张锐      3.马晖      4.王明生
183 国内重要刊物 基于白盒密码的DCAS终端安全芯片方案 计算机研究与发展     1.许涛       2.武传坤     3.张卫明
184 国外重要刊物 On the Primary Constructions of  Vectorial Boolean Bent Functions  IEEE信息理论     1.徐玉威    2.武传坤
185 国外重要刊物 Comments on ``Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption'' IEEE取证和安全信息     1.马晖      2.张锐      3.袁巍
186 国内重要刊物 Separating Invertible Key Derivations from Non-invertible Ones: Sequential Indifferentiability of 3-Round Even-Mansour 设计、编码与密码学 2015 SCI收录 1.郭淳       2.林东岱
187 国内重要刊物 Three new infinite families of bent functions 中国科学:信息科学     1.王立波     2.吴保峰    3.刘卓军    4.林东岱
188 国内重要刊物 Transferred Human Parsing with Video Context  多媒体研究杂志     1.刘偲      2.梁晓丹    3.刘洛麒    4.林倞      5.吕科      6.操晓春    7.颜水成
189 国内重要刊物 一种FAT32文件系统中文件恢复方法 网络新媒体技术文     1.顾广宇     2.张淑娟     3.王雪飞     4.蔡翔      5.袁巍 
190 国外重要刊物 An Integer Programming Based Bound for Locally Repairable Codes IEEE Transactions on Information Theory     1.王安宇    2.张志芳
191 国内重要刊物 一种FAT32文件系统中文件恢复方法 The computer Journal     1.顾广宇     2.张淑娟     3.王雪飞     4.蔡翔      5.袁巍
192 国外重要刊物 Adaptively Unified Semi-Supervised Dictionary Learning with Active Points IET Information Security 2015 EI收录 1.王晓波     2.郭晓杰    3.李子青
193 国外重要刊物 Bits hardness of the CDH Problem and related DH schemes over prime fields  Security and Communication Networks     1.王明强     2.吴铤      3.庄金城
194 国内重要刊物 An AES-Like Cipher and Its White-Box Implementation The computer Journal     1.白鲲鹏    2.武传坤
195 国外重要刊物 A Secure White-Box AES Implementation  IET Information Security     1.白鲲鹏    2.武传坤
196 国外重要刊物 A Secure White-Box SM4 Implementation  Security and Communication Networks     1.白鲲鹏    2.武传坤
197 国内重要刊物 On $s$-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers 中国科学:信息科学     1.姜宇鹏     2.郑群雄     3.林东岱
198 国内重要刊物 基于相似查询树的快速密文检索方法 软件学报     1.陈驰       2.朱晓杰     3.申培松
199 国内重要刊物 Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in cloud computing 电气电子工程师学会可信安全计算期刊     1.马晖      2.张锐      3.万志国     4.卢尧      5.林素青
200 国内重要刊物 Forensics of Hidden Information Processed by Two Steganography Tools  计算机科学     1.李金才     2.易小伟     3.赵险峰
201 国内重要刊物 RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms 中国科学 2015年,卷:58,期:12210215),页:1-15 SCI收录 1.张文涛    2.包珍珍    3.林东岱4.Vincent Rijmen      5.Yang BoHan 6.Ingrid Verbauwhede
202 国内重要刊物 On affine sub-families of Grain-like structures 设计、编码与密码学     1.姜宇鹏     2.林东岱
203 国外重要刊物 On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation 第12届国际密码学会密码学理论会议 2015年:110~133页 EI收录 1.郭淳      2.林东岱
204 国外重要刊物 PS bent functions constructed from finite pre-quasifield spreads 2015IEEE信息论国际研讨会     1.吴保峰    2.林东岱
205 国外重要刊物 Output Feature Augmented Lasso 2014ICDM国际数据挖掘大会     1.张长青    2.韩亚洪    3.郭晓杰    4.操晓春
206 国外重要刊物 Constructing Boolean Functions With (Potentially) Optimal Algebraic Immunity Based on Multiplicative Decompositions of Finite Fields 2015IEEE信息论国际研讨会 2015pages491~495 EI收录 1.吴保峰      2.郑嘉     3.林东岱
207 国外重要刊物 New classes of quadratic semi-bent functions in polynomial forms with coefficients in extension fields 2015IEEE信息论国际研讨会     1.吴保峰    2.林东岱
208 国外重要刊物 On The Dual of Generalized Boolean Bent Functions over Z4 2015IEEE信息论国际研讨会 2015pages506~510 EI收录 1.吴保峰    2.林东岱
209 国外重要刊物 Improved N-gram Approach for Cross-site Scripting Detection in Online Social Network  2015年IEEE科学与信息技术联合会议     1.王蕊      2.贾晓启    3.李沁蕾    4.张道娟
210 国外重要刊物 An Adaptive Detecting Strategy against Motion Vector-Based Steganography 多媒体与博览国际会议 2015pages1-6 EI收录 1.王培培    2.曹纭       3.赵险峰    4.于海波
211 国外重要刊物 HCSF: a hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search 第10届IEEE工业电子和应用国际会议 2015年:290~295 EI收录 1.朱晓杰     2.陈驰      3.田雪      4.Jiankun Hu
212 国外重要刊物 Searching Cubes for Testing Boolean Functions and Its Application to Trivium The 2015 IEEE International Symposium on Information Theory 2015年:496~500 EI收录 1.刘美成     2.林东岱
213 国外重要刊物 CONSTRUCTION OF CUBIC ROTATION SYMMETRIC BENT FUNCTIONS IN POWER-OF-TWO VARIABLES The 2015 IEEE International Symposium on Information Theory 2015年:486~490 EI收录 1.王天择    2.刘美成     3.赵尚伟    4.林东岱
214 国外重要刊物 Statistically Undetectable Video Steganography Based on Optimized Motion Estimation Perturbation 第三届ACM信息隐藏暨多媒体安全会议     1.曹纭      2.张弘       3.赵险峰    4.于海波
215 国外重要刊物 A Fast Implementation of MPC-KSA Side-Channel Distinguisher IEEE计算机通信与网络国际学术会议 2015年:1~7 EI收录 1.郑超      2.周永彬     3.郑英显
216 国外重要刊物 A TCM-Based Remote Anonymous Attestation Protocol for Power Information System  第三届能源、电力与环境工程国际会议     1.陈锐忠    2.魏理豪     3.邹洪     4.翟梅洁
217 国外重要刊物 Security Classification-Based Access of Power Information System 第三届能源、电力与环境工程国际会议     1.赵延帅    2.钱扬       3.陈锐忠     4.马红霞
218 国外重要刊物 Motion Vector Reversion-Based Steganalysis Revisited 信号和信息处理国际会议中国峰会     1.王培培     2.曹纭      3.赵险峰    4.吴槟
219 国外重要刊物 Generalized Tensor Total Variation Minimization for Visual Data Recovery 计算机视觉与模式识别国际会议 2015 EI收录 1.郭晓杰     2.马毅
220 国外重要刊物 Robust Subspace Segmentation by Simultaneously Learning Data Representations and Their Affinity Matrix  人工智能国际联合大会 2015年:3547-3553 EI收录 郭晓杰
221 国外重要刊物 Online Robust Low Rank Matrix Recovery  人工智能国际联合大会 2015年:3540-3546 EI收录 郭晓杰
222 国外重要刊物 Factor base Discrete logarithms in Kummer Extensions 2015亚密会     1.肖佃艳    3.程岐
223 国外重要刊物 Esting Differential-Linear Distinguishers and Application to CTC2 2015年信息安全实践与经验国际会议 2015年:220~234页 EI收录 1.郭淳      2.张海龙    3.林东岱
224 国外重要刊物 Leakage Prevention Method for Structured Data Based on Hierarchical Classification 2015年计算机科学与智能通信国际会议     1.唐亮亮    2.林泽鑫    3.陈锐忠    4.马红霞
225 国外重要刊物 A data recovery method for NTFS files system 2015第二届计算机工程与信息技术国际学术研讨会     1.顾广宇    2.张淑娟    3.王雪飞    4.蔡香      5.丁锟      6.苏帅
226 国外重要刊物 A data recovery method for FAT32 files system 2015第二届计算机工程与信息技术国际学术研讨会     1.顾广宇    2.张淑娟    3.王雪飞    4.蔡香      5.苏帅      6.丁锟
227 国外重要刊物 A Practical Method to Determine Achievable Rates for Secure Steganography 第17届高性能计算与通信国际会议     1.张凌宇     2.陈雕      3.曹纭      4.赵险峰
228 国外重要刊物 Dynamic Game Access Control based on Trust 第14届可信、安全与隐私计算通信国际会议 2015 EI收录 马书南
229 国外重要刊物 A Similarity Evaluation Algorithm and Its Application in Multi-Keyword Search on Encrypted Cloud Data IEEE MCC 2015年:1218~1223 EI收录 1.申培松       2.陈驰      3.田雪
230 国外重要刊物 Efficient Keyword Search for Public-Key Setting 军事通信国际会议 2015年:1236~1241 EI收录 1.章睿      2.薛锐
231 国外重要刊物 A Note on Generating Coset Representatives of $PGL_2(q)$ in $PGL_2(q^2)$ 信息安全与密码学国际会议2015     1.庄金城    2.程岐
232 国外重要刊物 Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control 第九届网络与系统安全国际会议 2015pages254-267 EI收录 1.马晖      2.张锐
233 国外重要刊物 Video Steganalysis Based on Intra Prediction Mode Calibration 数字取证和水印国际研讨会2015 2015pages25-31 EI收录 1.赵砚彬     2.张弘       3.曹纭       4.王培培    5.赵险峰
234 国外重要刊物 A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers 21届密码学、信息安全理论与应用年会 2015年:389~410页 EI收录 1.郭淳      2.林东岱
235 国外重要刊物 A New Construction of Tagged Visual Cryptography Scheme 数字取证和水印国际研讨会2015     1.任亚唯    2.刘峰      3.林东岱    4.冯荣权    5.王文
236 国外重要刊物 An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion 数字取证和水印国际研讨会2015     1.王文      2.刘峰      3.闫伟齐    4.沈刚      5.郭腾
237 国外重要刊物 A Lightweight Code-based Authentication Protocol for RFID Systems 第六届信息安全应用与技术国际会议     1.刘卓华    2.张伟      3.武传坤
238 国外重要刊物 A data recovery method for NTFS files system 2015信息安全应用与技术国际会议     1.彭泽武    2.冯歆尧    3.唐亮亮     4.翟梅洁
239 国外重要刊物 Leakage Prevention Method for Unstructured Data Based on Classification 2015信息安全应用与技术国际会议     1.李皓     2.彭泽武    3.冯歆尧     4.马红霞
240 国外重要刊物 The Design and Implementation of Data Security Management and Control Platform 2015信息安全应用与技术国际会议     1.邹洪      2.钱扬      3.赵廷帅     4.丁锟
241 国外重要刊物 The Method and System Implementation of Unstructured Data Tracking and Forensics  2015信息安全应用与技术国际会议     1.顾广宇     2.张淑娟     3.王雪飞     4.蔡翔      5.陈盛 
242 国外重要刊物 Factor Base Discrete logarithms in Kummer Extensions RSA会议2016     1.肖佃艳    2.庄金成    3.程岐
243 国外重要刊物 一种FAT32文件系统中文件恢复方法 中国声学学会第十一届青年学术会议     1.顾广宇     2.张淑娟     3.王雪飞     4.蔡翔      5.袁巍
244 国外重要刊物 Adaptively Unified Semi-Supervised Dictionary Learning with Active Points 计算机视觉国际大会 2015 EI收录 1.王晓波     2.郭晓杰    3.李子青
245 国内重要刊物 Bits hardness of the CDH Problem and related DH schemes over prime fields  公钥密码会议     1.王明强     2.吴铤      3.庄金城
246 国外重要刊物 Higher-Order Masking Schemes for SIMON 2015国际信息与通信安全会议 2015 EI收录 1.唐杰辉    2.周永彬     3.张海龙     4.邱爽
247 国外重要刊物 An Approach for Mitigating the Vulnerabilities in Practical SSO systems 第11届中国国际信息安全与密码学国际会议 2015 EI收录 1.李孟豪    2.杨亮      3.袁子牧    4.薛锐      5.章睿
248 国外重要刊物 A New cryptographic Analysis of 4-bit S-Boxes 第11届中国国际信息安全与密码学国际会议 2015 EI收录 1.程玲       2.张文涛     3.向泽军
249 国外重要刊物 Bitsliced Implementations of the PRINCE,LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers 第17届信息与通信安全国际会议 2015 EI收录 1.包珍珍    2.张文涛    3.罗鹏      4.林东岱
250 国外重要刊物 Event Analogy Based Privacy Preservation in Visual Surveillance 第七届太平洋地区图像和视频技术研讨会     1.闫伟齐     2.刘峰
251 国外重要刊物 Verifiable Proxy Re-encryption from Indistinguishability obfuscation  第17届信息与通信安全国际会议 2015 EI收录 1.刘牧华    2.吴迎      3.常金勇    4.薛锐      5.郭威
252 国外重要刊物  Forensics of Hidden Information Processed by Two Steganography Tools 第5届全国计算机取证技术研讨会     1.李金才     2.易小伟     3.赵险峰
253 国外重要刊物 A Solution of Code Authentication on Android 第17届信息与通信安全国际会议     1.张雪      2.张锐
254 国内重要刊物 基于相似查询树的快速密文检索方法 软件学报--香山专题研讨会     1.陈驰       2.朱晓杰     3.申培松
255 国外重要刊物 Accelerating the DCTR features extraction for JPEG steganalysis based on CUDA 2016IS&T电子成像技术国际会议     1.夏超       2.关晴骁     3.赵险峰     4.邓永
256 国内重要刊物 特征3有限域上椭圆曲线的Co-Z Montgomery算法 计算机学报 已接收 EI收录 于伟、李宝、王鲲鹏、李维晅、田松
257 国外重要刊物 Constructing permutations and complete permutations over finite fields via subfield-valued polynomials  Finite Fields and Their Applications Volume 31, 162-177 SCI收录 Zhengbang Zha, Lei Hu, Xiwang Cao
258 国外重要刊物 The weight distributions of two classes of binary cyclic codes.  Finite Fields and Their Applications Volume 34, 192-207 SCI收录 Xiaoqiang Wang, Dabin Zheng, Lei Hu, Xiangyong Zeng
259 国外重要刊物  A secure delegation scheme of large polynomial computation in multi-party cloud  Int. J. of Grid and Utility Computing 6 EI收录 郭姝/徐海霞
260 国外重要刊物 The weight distribution of a family of p-ary cyclic codes Designs, Codes and Cryptography Volume 75, 263-275 SCI收录 Dabin Zheng, Xiaoqiang Wang, Xiangyong Zeng, Lei Hu
261 国外重要刊物 Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks Designs, Codes and Cryptography Volume 76, 279-305 SCI收录 Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan:
262 国内重要刊物 Boolean functions with four-valued Walsh spectra Journal of Systems Science and Complexity Volume 28, 743-754 SCI收录 Zhiqiang Sun, Lei Hu
263 国外重要刊物 Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications IEEE Transactions on Information Theory Volume 61, 1491-1495 SCI收录 Zhengbang Zha, Lei Hu
264 国外重要刊物 HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches IEEE Transactions on Knowledge and Data Engineering volume:27 issue:8 page:2109-2202 EI收录 Thimma, Manogna、Liu, Fang、林璟锵、罗勃
265 国外重要刊物 Improved MILP Modeling for Automatic Security Evaluation and Application to FOX IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Volume 98-A, 72-80 SCI收录 Kexin Qiao, Lei Hu, Siwei Sun, Xiaoshuang Ma, Haibin Kan
266 国外重要刊物 RIKE+: Using revocable identities to support key escrow in public key infrastructures with flexibility IET Information Security volume:9 issue:2 page:136-147 EI收录 林璟锵、朱文涛、王琼霄、张楠、荆继武、高能
267 国外重要刊物 Complementary witness soundness for witness
indistinguishable proof system and CCA2
public-key encryption schemes
Int. J. Information and Computer Security 7 EI收录 徐海霞/李宝/梅其祥
268 国外重要刊物 Ciphertext-auditable identity-based encryption International Journal of Network Security 17 EI收录 Lin, Changlu; Li, Yong; Lv, Kewei; Chang, Chin-Chen
269 国内重要刊物  
DSP平台上基于PUF的两种真随机数产生方法研究
 信息网络安全 186-190 其他收录 李飞,刘宗斌,章庆隆,林璟锵
270 国内重要刊物 Android数据安全存储平台的设计与实现  信息网络安全 113-118 其他收录 田伟,高能,王平建,张令臣 
271 国内重要刊物 在桌面虚拟化系统中实施国产密码算法 中国科学院大学学报 volume:32 issue:5 page:701-707 其他收录 林雪燕、林璟锵、管乐、王雷
272 国内重要刊物 基于AD的私有云存储访问控制实现方案 中国科学院大学学报 Volume:32 Issue:5page:676-681 其他收录 李从午,潘无穷,林璟锵
273 国内重要刊物  关于区间上离散对数问题的改进算法  密码学报 录用 其他收录 王瑶,吕克伟
274 国外重要刊物 A quantum algorithm for approximating the influences of Boolean functions and its applications Quantum Information Processing 11 SCI收录 李红伟、杨理
275 国外重要刊物 Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services ACSAC2015   其他收录 Chen Cao,Neng Gao,Peng Liu,Ji Xiang
276 国外重要刊物  TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)   其他收录 He Sun, Kun Sun
, Yuewu Wang
, and Jiwu Jing
277 国外重要刊物  Reliable and Trustworthy Memory Acquisition on Smartphones Transaction on Forensics and Security   其他收录 He Sun, Kun Sun ; Yuewu Wang ; Jiwu Jing
278 国外重要刊物  TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens the 22nd ACM Conference on Computer and Communications Security (CCS)   其他收录 He Sun, Kun Sun
, Yuewu Wang
, and Jiwu Jing
279 国外重要刊物 vbox: Proactively establishing secure channels between wireless devices without prior knowledge 20th European Symposium on Research in Computer Security    其他收录 王伟,林璟锵,王展,王泽,夏鲁宁
280 国外重要刊物 WAVE: Secure wireless pairing exploiting human body movements the 8th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things    其他收录 王伟,王展 ,朱文涛,王磊
281 国外重要刊物 MobiPluto:File System Friendly Deniable Storage for Mobile Devices Annual Computer Security Applications Conference   其他收录 常冰,王展,陈波,张锋巍
282 国内重要刊物 无线环境下的密钥管理技术的发展现状及趋势 全国电子认证技术交流大会   其他收录 贾兆宏,杨玲
283 国外重要刊物 Extracting Robust Keys from NAND Flash Physical Unclonable Functions IFIP International Information Security Conference   其他收录 贾世杰、夏鲁宁、王展、林璟锵、张国柱、嵇亚飞
284 国外重要刊物 An Efficiency Optimization Scheme for the On-the-fly Statistical Randomness Test IEEE International Conference on Cyber Security and Cloud Computing   其他收录 陈天宇、马原、林璟锵、王展、荆继武
285 国外重要刊物 Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication International Conference on Information and Communications Security   其他收录 嵇亚飞、夏鲁宁、林璟锵、周健、张国柱、贾世杰
286 国外重要刊物 Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory 36th IEEE Symposium on Security and Privacy   其他收录 管乐、林璟锵、罗勃、荆继武、汪婧
287 国外重要刊物 A complete classification of quantum public-key encryption protocols SPIE Security+Defence 2015   其他收录 吴辰苗、杨理
288 国外重要刊物 Quantum differential cryptanalysis to the block ciphers The 6th International Conference on Applications and Technologies in Information Security    其他收录 李红伟、杨理
289 国外重要刊物 Constant-Round Leakage-Resilient  Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption: ACISP2015   其他收录  Tingting Zhang, Hongda Li, Guifang Huang
290 国外重要刊物 Fully Leakage-Resilient Non-Malleable Identification Schemes in the Bounded-Retrieval Model IWSEC2015   其他收录  Tingting Zhang, Hongda Li
291 国外重要刊物 KDM-CCA security from RKA secure authenticated encryption International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2015   其他收录 路献辉,李宝,贾仃仃
292 国外重要刊物 Cryptanalysis of reduced-round whirlwind Australasian Conference on Information Security and Privacy, ACISP 2015   其他收录 马冰珂、李宝,郝荣林,李晓千
293 国外重要刊物 Hashing into Jacobi Quartic Curves Information Security Conference   其他收录 于伟,王鲲鹏,李宝,何晓阳,田松
294 国外重要刊物  Leveled Strongly Unforgeable Identity Based Fully Homomorphic Signatures Information Security Conference   其他收录 王付群、王鲲鹏、李宝、高媛媛
295 国外重要刊物 Lossy Projective Hashing and Its Applications International Conference on Cryptology in India   其他收录 薛海洋,刘亚敏,路献辉,李宝
296 国外重要刊物 An Efficient Leveled Identity-Based FHE International Conference on Network and System Security   其他收录 王付群、王鲲鹏、李宝
297 国外重要刊物 New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates Information workshop on Security   其他收录 于伟, Kim Kwang Ho, Jo Myong Song
298 国外重要刊物 Identity-Based Lossy Encryption from Learning with Errors Information workshop on Security   其他收录 贺婧楠、李宝、路献辉、贾仃仃、薛海洋、孙小超
299 国外重要刊物 Improved Efficiency of MP12 Information workshop on Security   其他收录 方赴洋、李宝、路献辉、孙小超
300 国外重要刊物 Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions Information workshop on Security   其他收录 马冰珂、李宝、郝荣林、李晓千
301 国外重要刊物 LWE-Based FHE with Better Parameters Information workshop on Security   其他收录 王付群、王鲲鹏、李宝
302 国外重要刊物 Fully homomorphic encryption with auxiliary inputs Conference on Information Security and Cryptology    其他收录 王付群、王鲲鹏
303 国外重要刊物 A Note on Diem's Proof Conference on Information Security and Cryptology    其他收录 田松,王鲲鹏,李宝,于伟
304 国外重要刊物 CCA Secure Public Key Encryption Scheme based on LWE without Gaussian Sampling Conference on Information Security and Cryptology    其他收录 孙小超、李宝、路献辉、方赴洋
305 国外重要刊物 Hashing into Generalized Huff Curves Conference on Information Security and Cryptology    其他收录 何晓阳,于伟,王鲲鹏
306 国外重要刊物 Models of Curves from GHS Attack in Odd Characteristic The 11th International Conference on Information Security Practice and Experience   其他收录 田松,于伟,李宝,王鲲鹏
307 国外重要刊物 Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves The 11th International Conference on Information Security Practice and Experience   其他收录 田松,于伟,李宝,王鲲鹏
308 国外重要刊物 Cramer-shoup like chosen ciphertext security from LPN The 11th International Conference on Information Security Practice and Experience   其他收录 孙小超、李宝、路献辉
309 国内重要刊物 An Efficient Implementation on Storage and Lookup for Flow
Table of OpenFlow
中国科学 45卷15期 1280-1288 其他收录 E YuePeng, CHEN Zhi, GE JingGuo & WU YuLei
310 国外重要刊物 Performance investigation of virtual network and physical network based on advanced testbed networks IUCC 2015 暂无 EI收录 Tong Li, Xiaodan Zhang,Zongzhen Liu,Jingguo Ge, Zhongjiang Yao, Yuepeng E, Yulei Wu, Lei Zhang
311 国外重要刊物 Performance improvement for source mobility in named data networking based on global–local FIB updates Peer-to-Peer Networking and Applications Volumes 8, Issues 32, pp 1-11 SCI收录 Jingguo Ge,  Shaojie Wang, Yulei Wu,  Haina Tang,  Yuepeng E
312 国外重要刊物 Achieving Secure Friend Discovery in Social Strength-Aware PMSNs Proceedings of the 34th IEEE Military Communications Conference (MILCOM) 2015, Page(s): 962-968 EI收录 Ben Niu, Yuanyuan He, Fenghua Li and Hui Li
313 国外重要刊物 Achieving lightweight and secure access control in Multi-authority cloud (Best Paper Award) Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM) 2015, Page(s): 459-466 EI收录 Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu and Fangfang Shan
314 国外重要刊物 UGHA: uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks IEEE International Conference on Communications (ICC) 2015, Page(s): 7246-7251 EI收录 Jin Cao, Hui Li, Maode Ma and Fenghua Li
315 国外重要刊物 Privacy-preserving strategies in service quality aware location-based services IEEE International Conference on Communications (ICC) 2015, Page(s): 7328-7334 EI收录 Weihao Li, Ben Niu, Hui Li and Fenghua Li
316 国内重要刊物 面向多维数字媒体的访问控制机制 通信学报 36(11): 52-60 EI收录 单芳芳, 李凤华, 谢绒娜, 熊金波, 王彦超
317 国内重要刊物 一种基于代理的移动互联网隐私保护机制 通信学报 36(11): 25-32 EI收录 耿魁, 李凤华, 李维皓, 李晖, 牛犇
318 国内重要刊物 支持多关键词的可搜索公钥加密方案 西安电子科技大学学报 42(5) EI收录 李昊星, 李风华, 宋承根, 苏铓, 刘歆
319 国内重要刊物 一种基于免疫计算的安全授权系统模型(An Immunology-Based Security System Model for Authorization) 2015 6th International Conference on Advanced Computer Control 2015.7.11-7.12 EI收录 刘桐 王雅哲
320 国内重要刊物 智能云电视公共安全服务平台建设(Building public security service platform for Smart cloud TV) 中国科学:信息科学  45(10): 1289-1309 EI收录 王雅哲 徐震 王瑜 晏敏 张妍 刘桐
321 国外重要刊物 Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data 10th International Workshop on Security (IWSEC 2015)  LNCS 9241, pp. 316–334 EI收录 刘桐 王雅哲
322 国外重要刊物 VFA: A Variable-Factor Authentication Framework for Mobile Users Journal of Communications Vol. 10, No. 6, June 2015 EI收录 Kai Chen, Weifeng Chen, Zhen Xu and Yazhe Wang
323 国内重要刊物 A Dominating-set-based and Popularity-driven Caching Scheme in Edge CCN 34th IEEE -- International Performance Computing and Communications Conference (IPCCC)   EI收录 Weiyuan Li, Yang Li, Wei Wang, Yonghui Xin, Tao Lin
324 国外重要刊物 iCacheOS: In-RAN Caches Orchestration Strategy through Content Joint Wireless and Backhaul Routing in Small-Cell Networks IEEE Globecom 2015 2015.10,pp.1200-1206 EI收录 Li Hongjia, Hu Dan, Ci Song
325 国外重要刊物 Joint Wireless and Backhaul Load Balancing in Cooperative Caches enabled Small-Cell Networks IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2015.8,pp.2079-2084 EI收录 Li Hongjia, Wang Zejue, Hu Dan
326 国外重要刊物 High-Resolution Cell Breathing for Improving Energy Efficiency of Ultra-Dense HetNets IEEE Wireless Communications and Networking Conference (WCNC) 2015.3, pp.1476-1481 EI收录 Li Hongjia, Hu Dan, Ci Song
327 国内重要刊物 Collaborative EPC and RAN Caching Algorithms for LTE Mobile Networks IEEE Globecom 2015 EI收录 Shoushou Ren, Tao Lin, Wei An, Yang Li, Yu Zhang and Zhen Xu
328 国外重要刊物 OSDT: A Scalable Application-Level Scheduling Scheme for TCP Incast Problem IEEE International Conference on Communications Year: 2015 Pages: 325 - 331 EI收录 Shuli Zhang, Yan Zhang, Yifang Qin, Yanni Han, Zhijun Zhao, Song Ci
329 国外重要刊物 A Partial-decentralized Coflow Scheduling Scheme in Data Center Networks IEEE Conference on Local Computer Networks 2015 EI收录 Shuli Zhang, Yan Zhang, Ding Tang, Zhen Xu, Jingguo Ge, Zhijun Zhao
330 国外重要刊物 Transmit Power Aware Cross-Layer Optimization for LTE Uplink Video Streaming IEEE International Conference on Communications Year: 2015 EI收录 Pinghua Zhao, Yanwei Liu, Jinxia Liu, Ruixiao Yao, Song Ci, Antonios Argyriou
331 国内重要刊物 A Cost-Effective Scheme Supporting Adaptive Service Migration in Cloud Data Center Frontiers of Computer Science 9卷6期: 875-886 SCI收录 Bing Yu, Yanni Han, Hanning Yuan, Xu Zhou, Zhen Xu
332 国外重要刊物 An Efficient Resource Embedding Algorithm in Software Defined Virtualized Data Center GlobeCom 2015 2015 EI收录 Xuemin Wen, Yanni Han, Hanning Yuan, Xu Zhou and Zhen Xu
333 国外重要刊物 TCP-FNC: A Novel TCP with Network Coding for Wireless Networks ICC 2015   EI收录 Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhijun Zhao and Song Ci
334 国外重要刊物 Improving TCP Performance in Data Center
Networks with Adaptive Complementary Coding
LCN 2015   EI收录 Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhen Xu and Jingguo Ge
335 国外重要刊物 面向盲DDoS的基于POF移动目标防御方法 10th International Conference on Security and Privacy in Communication Networks(ICCCN2015) 暂无 EI收录 马多贺、徐震、林东岱、宋晨、刘鹏、李萌
附件: