学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 姜奇的留言板
第一作者
  1. Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang, Jianfeng Ma. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing, 2017. DOI: 10.1007/s12652-017-0516-2(SCI)
  2. Qi Jiang, Jianfeng Ma, Fushan Wei. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. IEEE Systems Journal, 2016. DOI: 10.1109/JSYST.2016.2574719 (SCI,中科院2区, IF=3.882)
  3. Qi Jiang, Jianfeng Ma, Chao Yang, Xindi Ma, Jian Shen, Shehzad Ashraf Chaudhry. Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering, 2017,63:182-195. DOI:10.1016/j.compeleceng.2017.03.016 (SCI)
  4. Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He. Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks. IEEE Access, 2017, 5(1):3376-3392. DOI: 10.1109/ACCESS.2017.2673239 (SCI,中科院3区, IF=3.224)
  5. Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen Chilamkurti. A privacy aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. International Journal of Network Management, 2017, 27(3):e1937(1-17). DOI: 10.1002/nem.1937. (SCI, ESI高被引论文) 
  6. Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 2016, 76:37-48.(SCI, 中科院2区, IF=3.500, CCF Rank C)
  7. Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He. A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 2016, 72(10):3826–3849. DOI: 10.1007/s11227-015-1610-x. (SCI, ESI高被引论文, CCF Rank C)
  8. Qi Jiang, Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang, A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. Journal of Medical Systems, 2016, 40 (11):231 (SCI)
  9. Qi Jiang, Fushan Wei, Shuai Fu, Jianfeng Ma, Guangsong Li, Abdulhameed Alelaiwi. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics, 2016, 83(4):2085-2101. DOI: 10.1007/s11071-015-2467-5. (SCI, ESI高被引论文, 中科院2区, IF=3.000)
  10. Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 2015, 8 (6): 1070-1081. DOI: 10.1007/s12083-014-0285-z. (SCI, ESI高被引论文, CCF Rank C)
  11. Qi Jiang, Jianfeng Ma, Youliang Tian. Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al.. International Journal of Communication Systems, 2015, 28(7): 1340-1351. DOI: 10.1002/dac.2767. (SCI)
  12. Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li. Improvement of robust smart-card-based password authentication scheme. International Journal of Communication Systems, 2015, 28(2):383-393. DOI: 10.1002/dac.264.4. (SCI, ESI高被引论文)
  13. Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang. An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks. Wireless Personal Communications, 2014, 77 (2): 1489-1506. DOI 10.1007/s11277-013-1594-x. (SCI)
  14. Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian. Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. Journal of Medical Systems, 2014, 38(2):12. DOI: 10.1007/s10916-014-0012-6. (SCI:000331698300008)
  15. Jiang Qi, Ma Jianfeng, Li Guangsong, Yang Li. Robust two-factor authentication and key agreement preserving user privacy. International Journal of Network Security, 2014, 16(3): 229-240. (EI: 20140717337144)
  16. Jiang Qi, Ma Jianfeng, Li Guangsong, Ma Zhuo. An improved password-based remote user authentication protocol without smart cards. Information Technology and Control, 2013, 42(2):150-158. (SCI: 000324641900005)
  17. Jiang Qi, Ma Jianfeng, Li Guangsong, Yang Li. An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks. Wireless Personal Communications, 2013, 68(4):1477-1491. (SCI: 000314538100016, ESI高被引论文)
  18. Jiang Qi, Ma Jianfeng, Ma Zhuo, Li Guangsong. A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems, 2013, 37(1): 9897. (SCI: 000315681600007)
  19. Jiang Qi, Ma Zhuo, Ma Jianfeng, Li Guangsong. Security Enhancement of a Robust User Authentication fr[ant]amework for Wireless Sensor Networks. China Communications, 2012, 9(10):103-111. (SCI: 000312962100001)
  20. 姜奇, 李光松, 马建峰, 杨超. 异构无线网络混合认证模型. 华中科技大学学报, 2011, 39(2):11-14. (EI: 20111413898188)
  21. 姜奇, 马建峰, 李光松, 马卓. 基于WAPI的WLAN与3G网络安全融合. 计算机学报, 2010, 33(9):1675-1685. (EI: 20104613383361)
  22. 姜奇, 马建峰, 李光松, 刘宏月. 基于身份的异构无线网络匿名漫游协议. 通信学报, 2010, 31(10):138-145. (EI: 20104813444990)
  23. 姜奇, 李光松, 马建峰. 基于身份的匿名无线认证方案的安全缺陷及改进. 通信学报, 2010, 31(9A):209-216. (EI: 20104613391361)
  24. Qi Jiang, Bingyan Li, Jianfeng Ma, On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems. BWCCA-LSNA 2016. Advances on Broad-Band Wireless Computing, Communication and Applications, Volume 2 of the series Lecture Notes on Data Engineering and Communications Technologies, pp. 879-884. DOI:10.1007/978-3-319-49106-6_89
  25. Qi Jiang, Bingyan Li, Jianfeng Ma, Youliang Tian, Yuanyuan Yang, Cryptanalysis and improvement of a smart card based mutual authentication scheme in cloud computing. ICCCS 2016.
  26. Jiang Qi, Ma Jianfeng, Li Guangsong, Ye Ayong. Security Enhancement on an Authentication Method for Proxy Mobile IPv6. Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia, Advances in Intelligent and Soft Computing Volume 110, 2012, pp 345-352. (EI: 20120114655860)
  27. 姜奇, 李光松, 马建峰, 丁勇. 泛在无线网络双因素匿名漫游认证协议. 2010中国计算机大会优秀论文集光盘版, 论文ID: 46. 
合作
  1. Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao. ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Generation Computer Systems, 2017. DOI: 10.1016/j.future.2017.09.060
  2. Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang, Junwei Zhang, Limin Shen, Zhiquan Liu. VCKSM: Verifiable Conjunctive Keyword Search over Mobile E-health Cloud in Shared Multi-owner Settings. Pervasive and Mobile Computing, 2017. DOI:10.1016/j.pmcj.2017.06.016
  3. Yinbin Miao, Jianfeng Ma, Qi Jiang, Xiong Li, Arun Kumar Sangaiah. Verifiable keyword search over encrypted cloud data in smart city. Computers & Electrical Engineering, 2017. DOI: 10.1016/j.compeleceng.2017.06.021
  4. 马鑫迪,李辉,马建峰,习宁,姜奇,高胜,卢笛. 轻量级位置感知推荐系统隐私保护框架.计算机学报, 2017, 40(5): 1017-1030
  5. Chao Yang, Mingyue Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren,Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive and Mobile Computing, 2017. DOI:10.1016/j.compeleceng.2017.03.016 (SCI)
  6. Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao,AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service. Peer-to-Peer Networking and Applications, 2017. DOI: 10.1007/s12083-017-0545-9 (SCI)
  7. Fushan Wei, Qi Jiang, Ruijie Zhang, Chuangui Ma, A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017. (SCI)
  8. Xindi Ma, Hui Li, Jianfeng Ma, Qi Jiang, Sheng Gao. Applet: A Privacy-Preserving framework for Location-Aware Recommender System,SCIENCE CHINA Information Sciences, 2017, 60: 092101. doi:10.1007/s11432-015-0981-4 (SCI, CCF Rank B)
  9. FuShan Wei, JianFeng Ma, Qi Jiang, Jian Shen, ChuanGui Ma. Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Information Technology And Control, 2016,45(1):62-70 (SCI)
  10. Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao, RTRC: A Reputation-based Incentive Game Model for Trustworthy Crowdsourcing Service. China Communications, 2016, 13(12): 199-215(SCI)
  11. Fu Shuai, Ma Jianfeng, Li Hongtao, Jiang Qi. A robust and privacy‐preserving aggregation scheme for secure smart grid communications in digital communities. Security and Communication Networks, 2016, 9(15):2779-2788. DOI: 10.1002/sec.1188 (SCI)
  12. Guangsong Li,Qi Jiang,Yanan Shi,Fushan Wei. Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks, International Journal of Network Security,2016, 18 (1), 193-200. (EI)
  13. 付帅,姜奇,马建峰. 一种无线传感器网络隐私保护数据聚合方案.计算机研究与发展. 2016, 53 (9): 2030-2038;  doi: 10.7544/issn1000-1239.2016.20150456
  14. Guangsong Li, Qi Jiang, FushanWei, Chuangui Ma. A New Privacy-Aware Handover Authentication Scheme for Wireless Networks. Wireless Personal Communications, 2015, 80(2): 581-589. DOI 10.1007/s11277-014-2029-z. (SCI)
  15. Yang Li, Ma Jianfeng, Lou Wenjing, Jiang Qi. A delegation based cross trusted domain direct anonymous attestation scheme. Computer Networks, 2015, 81: 245-257. (SCI)
  16. Saru Kumari , Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Qi Jiang, Muhammad Khurram Khan, Ashok Kumar Das, Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Multimedia Tools and Applications, 2015. DOI: 10.1007/s11042-015-2988-4. (SCI)
  17. YouLiang Tian, ChangGen Peng, DongDai Lin, JianFeng Ma, Qi Jiang, WenJiang Ji. Bayesian mechanism for rational secret sharing scheme. Science China Information Sciences, 2015: 1-13. (SCI)
  18. 付帅, 马建峰, 李洪涛, 姜奇. 无线传感器网络中匿名的聚合节点选举协议. 通信学报, 2015, 36(2), 88-97
  19. 田有亮, 彭长根, 马建峰, 姜奇, 朱建明. 安全协议的博弈论机制. 计算机研究与发展, 2014, 51(2): 344-352. (EI)
  20. 李龙营, 李金库, 马建峰, 姜奇. 采用攻击策略图的实时警报综合分析方法, 西安电子科技大学学报, 2014, 41(5): 84-90 (EI)
  21. Guangsong Li, Qi Jiang, Chuangui Ma, Improvements on a Mobile IP Registration Protocol Featured with User Anonymity, Advanced Materials Research Vols. 765-767 (2013) pp 1027-1030, doi:10.4028/www.scientific.net/AMR.765-767.1027. 
  22. Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang. Fair (t, n) threshold secret sharing scheme. IET Information Security, June 2013, 7(2):106-112. (SCI: 000321701300006)
  23. Yang Li, Ma Jiangfeng, Jiang Qi. Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. International Journal of Network Security, 2012, 14(3):156-163. (EI: 20121214874606)
  24. Yang Y, Gu J, Lv C, Jiang Q, Ma W. Security analysis of Kulseng et al.’s mutual authentication protocol for RFID systems. IET Information Security, 2012, 6(4): 239–248. (SCI: 000312962100001)
  25. 杨力, 马建峰, 姜奇. 无线移动网络跨可信域的直接匿名证明方案. 软件学报, 2012, 23(5):1260-1271. (EI: 20122615179341)
  26. 李光松, 姜奇, 马建峰. 3G-WLAN融合网络的票据认证协议. 华南理工大学学报, 2011, 39(10):61-67. (EI: 20114914584457)
  27. Li, Guangsong ; Ma, Jianfeng ; Jiang, Qi ; Chen, Xi. A novel re-authentication scheme based on tickets in wireless local area networks. Journal of Parallel and Distributed Computing, 2011, 71(7):906–914. (SCI: 000291287900002)
  28. 马卓, 马建峰, 李兴华, 姜奇. 可证明安全的可信网络连接协议模型.计算机学报, 2011, 34(9):1669-1678. (EI: 20114214432292)
  29. Li Guangsong, Ma Jianfeng, Jiang Qi. SAM: Secure Access of Media Independent Information Service with User Anonymity. EURASIP Journal on Wireless Communications and Networking. Volume 2010, Article ID 249169, 12 pages, doi:10.1155/2010/249169. (SCI: 000286276100001)
  30. Li Guangsong, Jiang Qi, Ma Jianfeng. A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks, Proc. of International Conference on E-Business and E-Government, 2010, 1285-1288. (EI)
  31. Li Guangsong, Jiang Qi, Ma Jianfeng. Secure Access Authentication for Media Independent Information Service, Proc. of the 3rd International Symposium Computer Science and Computational Technology, 2010, 409-413. (EI)
  32. 李光松, 马建峰, 姜奇. 介质独立信息服务的匿名访问协议, 通信学报, 2010, 31(10), 128-137. (EI)
  33. Yang Yuanyuan, Ma Wenping, Liu Weibo, Jiang Qi. Security Analysis of the Newest ID-transfer Scheme for Low-Cost RFID Tags. IEICE TRANS. FUNDAMENTALS 2010, E93-A(10), 1837-1839. (SCI: 000285489200020)
  34. Lu Xiang, Jiang Qi, Ma Jianfeng. An Empirical Measurement of Security Association in 802.11 Mesh Networks. Proc. of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. (EI)

 

版权声明:未经西安电子科技大学以及个人主页教师本人许可不得复制,转载传播本主页内容或用于任何商业用途,如需转载请征得主页所有者同意,并附上主页链接.
西安电子科技大学个人主页 站点地图 | | 姜奇的留言板 | 更新日期 :2017-11-08 | |
Copyright © 2011-2016 西安电子科技大学 版权所有 陕ICP备021284(05016169) Powered by 信息化建设处 & 电院网络中心