学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 李晖的留言板
Conference paper

2015

  1. Kai Fan, Deng Hai, Lang  Wang, Hui Li, Yinyang Yang, Ciphertext retrieval in super-peer p2p network, GLOBECOM 2015
  2. Boyang Wang, Ming Li, Haitao Wang, Hui LI, Circular Range Search on Encrypted Spatial Data, IEEE CNS 2015
  3. Jin Cao ; Hui Li; Maode Ma ,  GAHAP: A Group-based Anonymity Handover Authentication Protocol for MTC in LTE-A Networks, ICC 2015
  4. Jin Cao ; Hui Li ; MaodeMa ; Fenghua Li, UGHA:Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks ,ICC 2015
  1. Shunrong Jiang ; Xiaoyan Zhu; Ripei Hao; Haotian Chi; Hui Li ; Liangmin WangLightweight and Privacy-Preserving Agent Data Transmission for Mobile Healthcare, ICC 2015
  2. Weihao Li ; Ben Niu; Hui Li; Fenghua Li, Privacy-Preserving Strategies in Service Quality Aware   Location-Based Services, ICC 2015
  3. Wenhai Sun, Xuefeng Liu; Wenjing Lou,Thomas Hou, Hui Li, Catch You If You Lie to Me: Efficient Verifiable Conjunctive Keyword Search over Large Dynamic Encrypted Cloud Data, IEEE INFOCOM 2015
  4. Ben Niu; Qinghua Li; Xiaoyan Zhu; Guohong Cao; Hui Li , Enhancing Privacy through Caching in   Location-Based Services,  IEEE INFOCOM 2015
  5. Niu, Ben ; Zhu, XiaoyanLi, WeihaoLi, HuiWang, YingjuanLu, Zongqing  A personalized two-tier cloaking scheme for privacy-aware location-based services, ICNC 2015, p 94-98,March 26, 2015

2014

1.     Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index, ASIA CCS '14, Tokoyo, Japan

2.     Boyang Wang ; Ming Li ; Sherman S. M. Chow ; Hui Li, A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys, 2th IEEE Conference on Communications and Network Security, 2014.10, San FransicoUSA

3.     Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li. Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy, 10th International Conference on Security and Privacy in Communication NetworksBeijing, China

4.     Niu, Ben ;Zhu, Xiaoyan; WeihaoLiLi, Hui, EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs, IEEE MASS 2014, Philadelphia, USA,2014.10

5.     Niu, Ben ; Li, Qinghua; Zhu, Xiaoyan; Li, Hui, A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services, ICCCN, September 25, 2014, Shanghai, China

6.     Zhu, Hui ; Huang, Rong; Liu, Ximeng; Li, Hui, SPEMR: A new secure personal electronic medical record scheme with privilege separation, 2014 IEEE International Conference on Communications Workshops, ICC 2014, p 700-705, 2014,

7.     Zhu, Xiaoyan ; Chi, Haotian; Jiang, Shunrong; Lei, Xiaosan; Li, Hui, Using dynamic pseudo-IDs to protect privacy in location-based services, 2014 IEEE International Conference on Communications, ICC 2014, p 2307-2312, 2014,

8.     Zhu, Hui; Huang, Cheng; Li, Hui, MPPM: Malware propagation and prevention model in online SNS, 2014 IEEE International Conference on Communications Workshops, ICC 2014,Sydney, NSW, Australia

9.     Zhu, Xiaoyan; Liu, Jie; Jiang, Shunrong; Chen, Zengbao; Li, Hui, Efficient Weight-based Private Matching for proximity-based mobile social networks, 2014 IEEE International Conference on Communications, ICC 2014Sydney, NSW, Australia,2014

10.   Lai, Chengzhe;  Li, Hui; Lu, Rongxing; Jiang, Rong; Shen, Xuemin, SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks, 2014 IEEE International Conference on Communications, ICC 2014, p 1011-1016, 2014

11.   Niu B, Zhang Z, Li X and Li H, Privacy-Area Aware Dummy Generation Algorithms for Location-Based Services, in Proc. of IEEE ICC 2014

12.   Sun W, Yu S, Lou W, Hou T Y, and Li H, Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud, in Proc. of IEEE INFOCOM 2014

13.   Niu B, Li Q, Zhu X, Cao G and Li H, Achieving k-anonymity in Privacy-Aware Location-Based Services, in Proc. of IEEE INFOCOM 2014, Toronto, Canada

14.    Zhang, Yinghui ; Zheng, Dong; Chen, Xiaofeng; Li, Jin; Li, Hui, Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts, Lecture Notes in Computer Science, v 8782, p 259-273, 2014

2013

1.     Niu B, Zhu X, Lei X, Zhang W, and Li H, EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services, in Proc. of IEEE GLOBECOM 2013

2.     Niu B, Zhu X, Liu J, Li Z, and Li H, Weight-aware Private Matching Scheme for Proximity-Based Mobile Social Networks," in Proc. of IEEE GLOBECOM 2013

3.     Zhu X, Chi H, Niu B, Zhang W, Li Z, and Li H, Mobicache: When k-anonymity meets cache, in Proc. of IEEE GLOBECOM 2013

4.     Niu B, Zhu X, Zhang T, Chi H, and Li H, P-match: Priority-aware Friend Discovery for Proximity-Based Mobile Social Networks, in Proc. of IEEE MASS, pp.351-355, 2013

5.     Boyang Wang, Sherman S.M. Chow, Ming Li, Hui Li, Storing Shared Data on the Cloud via Security-Mediator, ICDCS 2013

6.     Boyang Wang, Hui Li, Ming Li, Privacy Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics, ICC 2013.

7.     Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Thomas Hou and Hui Li, Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking, ASIACCS 2013

8.     Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong and Hui Li, Anonymous Attribute-Based Encryption Supporting Efficient Decryption Test,  ASIACCS 2013, distinguished paper award

9.     Boyang Wang, Baochun Li, Hui Li, Public Auditing for Shared Data with Efficient User Revocation in the Cloud, INFOCOM 2013, Apr.15-19, Turin, Italia.

10.   Ben Niu, Xiaoyan Zhu, Hui Li, An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems, IEEE WCNC 2013

11.   Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li, plus:$ Privacy-Preserving Pseudo-Location Updating System in Location-Based Services, IEEE WCNC 2013

2012

1.     Jin Cao, Maode Ma, Hui Li, Unified Handover Authentication between Heterogeneous Access Systems in LTE Networks, IEEE GlobeCom 2012, Dec.3-7, CA, USA

2.     Jin Cao, Maode Ma, Hui Li, A Group-based Authentication and Key Agreement for MTC in LTE Networks, IEEE GlobeCom 2012, Dec.3-7, CA, USA

3.     Boyang Wang, Baochun Li, Hui Li, Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks,IEEE GlobeCom 2012, Dec.3-7, CA, USA

4.     Zhao XingwenLi HuiCodes based tracing and revoking scheme with constant ciphertextLecture Notes in Computer Science, v 7496 LNCS, p318-335, 2012, Provable Security - 6th International Conference, ProvSec 2012, Proceedings

5.     Boyang Wang, Baochun Li, Hui Li, Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud, ACNS 2012, LNCS 7341, 507-525,June 26-29, Singapore

6.     Boyang Wang, Baochun Li, Hui Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Cloud 2012, Honolulu, Hawaii, USA.June 24-29, 2012.

7.     Kai Fan, Libin Zhao, Xuemin Sherman Shen, Hui Li, Yintang Yang, Smart-blocking File Storage Method in Cloud Computing, IEEE ICCC 2012, Beijing, August 15-18, 2012.

2011

1.     Yinghui Zhang, Xiaofeng Chen, Hui Li, Jin Cao, Identity Based Construction for Secure and Efficient Handoff Authentication Schemes in Wireless Networks, The 2011 FTRA World Convergence Conference, Korea, DEC 12-15, 2011

2.     Sun, Yuhua; Wang, Zilong; Li, Hui; Yan, Tongjiang, On the cross-correlation of a ternary m-sequence of period 3<sup>4k</sup>-1 and its decimated sequence by (3<sup>2k</sup>+1)<sup>2</sup>/20, Proceedings of the 5th International Workshop on Signal Design and Its Applications in Communications, IWSDA'11, p 48-51,  2011,  EI 20121214883358

3.     Li, Zhanhu ; Fan, KaiLi, HuiConcurrent signature protocol on conic curve over ring Zn Source: 2011 International Conference on Electronics, Communications and Control, ICECC 2011 - Proceedings, p 194-197, 2011, EI 20114714544163

4.     Niu, Ben , Li, Hui; Zhu, Xiaoyan; Chao, Lv, Security analysis of some recent authentication protocols for RFID,  Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011, p 665-669, 2011,

2010

1.     Yong Wang, Hui Li and Xiyuan Wang. Performance Analysis of Optimal Antenna Scheme in Transmit Diversity Systems. The 6th International Conference on Natural Computation (ICNC'10), Yantai, August, 2010, Vol. 6, 2793-2797. EI 20104613380415

2.     Yong Wang, Hui Li. Full Rate and Full Diversity STBC in Decode-and-Forward Relay Systems. The 2010 International Conference on Communications and Intelligence Information Security, Nanning, October, 2010, 135-138.

3.     Can Mo, Hui Li, Hui Zhu, A steam pattern matching method for traffic analysis, ICST E-Forensics 2010, Shanghai

4.     Chao Lv; Maode Ma, Hui Li, Jianfeng Ma, A security enhanced authentication and key distribution protocol for wireless networks, in IEEE GLOBECOM 2010 Workshop on Web and Pervasive Security, 2010.12EI 20110913697828

5.     Chao Lv; Maode Ma, Hui Li, Jianfeng Ma, An Efficient Three-Party Authenticated Key Exchange Protocol with One-Time Key, INFOCOM IEEE Conference on Computer Communications Workshops , 2010

2009

1.     Zhou Yejun, Li Hui, Ma Jianfeng, Secure Error-Correction Network Coding in a Randomized SettingISA2009LNCS 5576pp570-577

2.     ZhuHui, LiHui, WangYumin. An Efficient Fast Authentication Protocol. IEEE 2009 International Conference on Computational Intelligence and Security. 2009, 12.

3.     Li, Xiaoqing, Li Hui, Ma Jianfeng and Zhang Weidong. An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. The 5th International Conference on Information Assurance and Security, Volume II, pp. 287–290, 2009.

4.     Lv Chao, Li Hui, Ma Jianfeng. Analysis the Properties of TLS Based on Temporal Logic of Knowledge, The Fifth International Conference on Information Assurance and Security, 2009.

2008 and before

1.     Wang Ying, Li Hui, Du Xinjun, Wang Yumin, The design of optimal period interleaver, Proceedings-International Conference on Advanced Information Networking and Applications, AINA, Proceedings-22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, 2008, p 413-415

2.     Wang Ying, Du Xinjun, Li Hui, Zhu Xiaoyan, Tail-biting theory for turbo codes, IEEE Wireless and Microwave Technology Conference, WAMICON 2006, IEEE Wireless and Microwave Technology Conference, WAMICON 2006

3.     Li Hui, Shenqing, A Token Based Single Sign-on protocol, CIS 2005, Part II, LNAI 3802, Springer-Verlag 2005.12

4.     Wang Meng, Li Hui, Liu Zhijing, Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability,ICCNMC 2005, LNCS Springer Verlag 2005.8. 

Journal Paper

2015

  1.  Liu, X.; Sun, W.; Quan, H.; Lou, W.; Zhang, Y.; Li, H. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys, IEEE Transactions on Services Computing, online

  2. Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui,  Modelling information dissemination under privacy concerns in social media, Physica A: Statistical Mechanics and its Applications, v 449, p 53-63, May 1, 2016

  3. Zhu, HuiGao, LijuanLi, Hui, Secure and privacy-preserving body sensor data collection and query scheme, Sensors (Switzerland), v 16, n 2, February 1, 2016

  4. Zhu, HuiHe, XiaoyingLiu, XimengLi, Hui, PTFA: A secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system, International Journal of em[ant]bedded Systems, v 8, n 1, p 78-86, 2016

  5. Niu, Ben;(Zhu, Xiaoyan; Li, Qinghua ; Chen, Jie; Li, Hui*, A novel attack to spatial cloaking schemes in location-based services, FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE,Vol.49,p125-132,2015

  6. Wang, Yong; Wu, Hao;Tang, Liyang; Li, Hui, The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,9(3):956-970,2015
  7. Lv, Xixiang ;  Mu, Yi; Li, Hui, Key management for Smart Grid based on asymmetric key-wrapping, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS,92(3): 498-512,2015
  8. Lai, Chengzhe; Li, Hui; Li, Xiaoqing; Cao, Jin, A novel group access authentication and key agreement protocol for machine-type communication, TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES 26(3):414-431,2015
  9. Li, Chen; Chen, Le; Lu, Rongxing; Li, Hui, Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding", IEEE TRANSACTIONS ON COMPUTERS, 64(3): 882-883,2015
  10.  Zhu, Hui; Xue, Yingfang;Chen, Xiaofeng;Li, Qiang; Li, Hui, V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service, MOBILE INFORMATION SYSTEMS, 1-9,2015
  11.  Wang B, Li B, Li H, Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud, IEEE Transactions on Service Computing, 8(1): 92-106,2015

2014

  1. Sun W, Wang B, Cao N, Li M, Lou W, Y Hou Y, Li H,Verifiable Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking, IEEE Transactions on Parallel and Distributed Systems, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(11): 3025-3035, 2014
  2. Wang, Boyang; Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing, Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud, JOURNAL OF COMMUNICATIONS AND NETWORKS,16(6): 592-599
  3. Zhang, Yinghui; Chen, Xiaofeng; Li, Jin;Li, Hui, Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks, COMPUTER NETWORKS, 75:192-211,series A,2014
  4.  Li, Chen ; Lu, Rongxing;Li, Hui; Chen, Le;Li, Xiaoqing, Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding", IEEE COMMUNICATIONS LETTERS, 18(12): 2129-2132,2014
  5. Cao J, Ma M, Li H, Zhang Y,A Survey on Security Aspects for LTE and LTE-A Networks, IEEE Communications Surveys & Tutorials, Vol.16, No.1, pp.283-302, 2014
  6. Xiang, Xinyin ; Li, Hui; Wang, Mingyu; Liu, Zhenhua, Hidden attribute-based signcryption scheme for lattice, Security and Communication Networks, 11(7):1780-1787, 2014
  7. Wang B, Li B, Li H, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Transactions on Cloud Computing, 2(1): 43-56, 2014
  8. Lv X, Mu Y, Li H, Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs, IEEE Transactions on Information Forensics and Security, 9(1): 5-13, 2014
  9. Chengzhe Lai ; Hui Li; Xiaohui Liang; Rongxing Lu; Kuan Zhang; Xuemin Shen, CPAL: a conditional privacy-preserving authentication with access linkability for roaming service, IEEE Internet of Things Journal, 1(1): 46-57, 2014
  10. Wang, Boyang; Li, Hui; Liu, Xuefeng, SecureMatch: Privacy-preserving group matching in social networks for large groups, Journal of Computational Information Systems, 10(2):665-672, 2014
  11. Han, Qi ; Zhang, Yinghui; Chen, Xiaofeng; Li, Hui; Quan, Jiaxiang, Efficient and robust identity-based handoff authentication for EAP-based wireless networks, Concurrency Computation Practice and Experience, 26(8):1561-1573, 2014
  12.  Li, Xiaoqing ; Li, Hui; A survey on data dissemination in VANETs, CHINESE SCIENCE BULLETIN, 59(32): 4190-4200

2013

  1. Lv, Chao; Ma, Maode; Li, Hui; Ma, Jianfeng; Zhang, Yaoyu An novel three-party authenticated key exchange protocol using one-time key,Journal of Network and Computer Applications, v 36, n 1, p 498-503, January 2013
  2.  Lai C, Li H, Lu R, Shen XS ,SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks, Computer Networks, Vol.57, No.17, pp.3492-3510, 2013

2012

  1. Yinghui Zhang, Xiaofeng Chen, Hui Li, Key-Evolving Hierarchical ID-Based Signcryption, the Computer Journal, accepted, The Computer Journal (2012) doi: 10.1093/comjnl/bxs154 First published online: December 2, 2012,
  2. Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, Chengzhe Lai, An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks , IEEE Transaction on Wireless Communication, Vol. 11, No. 10, 2012, pp 3644-3650
  3. Lv Xixiang, Li Hui, Wang Baocang, Group key agreement for secure group communication in dynamic peer systems, Journal of Parallel and Distributed Computing, v 72, n 10, p 1195-1200, October
  4. Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, Chengzhe Lai, A simple and robust handover authentication between HeNB and eNB in LTE networks, Computer Networks, 56(8), 2012, 2119-2131
  5. Boyang Wang, Hui Li, Jin Cao, An efficient MAC scheme for secure network coding with probabilistic detection, Frontiers of Computer Science Volume 6, Number 4 (2012), 429-441
  6. C. Lv, M. Ma, H. Li, and J. Ma, A security enhanced authentication and key distribution protocol for wireless networks, Security and Communication Networks,  5(4):343-352 (2012),
  7. C. Lv, M. Ma, H. Li, J. Ma, and B.Niu Security enhancement of the communication efficient AUTHMAC_DH protocols, Security and Communication Networks ,5(6):674-680 (2012)
  8. Chengzhe Lai, Hui LiYueyu Zhang, Jin Cao: Security Issues on Machine to Machine Communications. KSII Transactions on Internet and Information Systems, 6(2): 198-514 (2012)
  9.  Chao LvHui LiJianfeng MaBen Niu: Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems. International Journal of Radio Frequency Identification Technology and Applications, 4(1):3-12 (2012)
  10.  Zhitu SuChunhui SunHui LiJianfeng Ma: A method for efficient parallel computation of Tate pairing.  International Journal of Grid and Utility Computing 3(1):43-52 (2012)

2011

  1.  Lv, Xixiang;Li, Hui; Wang, Baocang, Identity-based key distribution for mobile Ad Hoc networks, FRONTIERS OF COMPUTER SCIENCE IN CHINA vol. 5. No. 4, 442-447, 2011.12
  2.  Lv, Chao; Li, H; Ma, JF; Niu,B; Vulnerability Analysis of Elliptic Curve-Based RFID Protocol, CHINA COMMUNICATIONS,Vol.8,No.4, pp 153-158
  3.  Lai, ChengzheLi, Hui; Zhang, Yueyu; Cao, Jin,A fast seamless handoff scheme between IEEE 802.11 and EPS networks using optimized proxy mobile IPv6,International Journal of Digital Content Technology and its Applications, v 5, n 8, p 81-91, 2011
  4.  Sun Chunhui, Li Hui, Yangyang, Chen Jie, Research on fault-electromagnetic attack on block cipher, Journal of Convergence Information Technology, Vol.6 No.11, 409-417 2011.
  5.  Su, Zhitu; Sun, Chunhui; Li, Hui; Ma, Jianfeng, Fast computation of tate pairing using elliptic curves with prime subgroup order of proth form, Advances in Information Sciences and Service Sciences, v 3, n 7, p 384-393, August 2011
  6. Lv, Chao, Li Hui, Ma, Jianfeng; Zhao, Meng, Security analysis of two recently proposed RFID authentication protocols, Frontiers of Computer Science in China, v 5, n 3, p 335-340, September 2011
  7. Yong Wang, Hui Li, Weidong Zhang. Design of Multiuser Intermediate Relay Safety Communication Based on Sharing Signals Subspace Beamforming. Advanced Science Letters, Vol.4., Mo.2, pp606-609, 2011.2.
  8.  Sun Yinxia, Li Hui, ID-based Signcryption KEM to Multiple Recipients, Chinese Journal of Electronics, Vol.20,No.2,317-322, 2011
  9. Yong Wang, Hui Li. A Novel Convex Optimization for Receive Antenna Selection. Applied Mechanics and Materials, v 186, p 611-615, 2011, New Trends and Applications of Computer-Aided Material and Engineering
  10. Lv, Chao; Li, Hui ; Ma, Jianfeng; Niu, Ben; Jiang, Haiyang,Security analysis of a privacy-preserving ECC-based grouping-proof protocol,Journal of Convergence Information Technology,v 6, n 3, p 113-119, March 2011
  11. Yong Wang, Hui Li and Xiyuan Wang. Robustness of Weighting Receive Antenna Selection Algorithm. Wireless Personal Communication, Vol.61,No.1, pp69-67, 2011

2010 and before

  1. Yong Wang, Hui Li. A Novel Antenna Selection Scheme for Amplify-and-Forward MIMO Relay Systems. Journal of Electromagnetic Waves and Applications, 2010, 24(11/12). 1530-1542.
  2. Xudong Zhu,  Hui Li,  Zhijing Liu, Behavior Clustering for Anomaly Detection, China Communications, 2010:7(6).
  3. Zhu Hui, Li Hui, Mo Can, A steam pattern matching method for traffic analysis , China Communication, 2010.No.6
  4.  Zhao bin, Kou Weidong, Li Hui, Dang Lanjun, Zhang Jun, Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,Information Sciences, v 180, n 23, p 4672-4684, 2010,
  5. Sun Yinxia,Li Hui,Short-ciphertext and BDH-based CCA2 secure certificateless encryption,Science China Information Science,2010, No.10, Vol.53 2005-2015
  6. Sun Yinxia, Li Hui. Efficient Signcryption between TPKC and IDPKC and Its Multi-Receiver Construction, Science China-Information Sciences, 2010.3
  7. Dang Lanjun, Kou Weidong, Li Hui, Zhang Junwei, Cao Xuefei, Zhao Bin, Fan Kai, Efficient ID-based Registration Protocol Featured with User Anonymity in Mobile IP Networks, IEEE Transaction on Wireless Communication, FEB,2010, VoL 9,No.2 pp594-604
  8. Xixiang Lv, Hui Li. ID-based authenticated group key agreement from bilinear maps. Front. Comput. Sci. China, 2010.2
  9. ZHOU Ye-jun, LI Hui, MA Jian-feng, Secure Network Coding Against the Contamination and Eavesdropping Adversaries, Chinese Journal of Electronics, 2009.7
版权声明:未经西安电子科技大学以及个人主页教师本人许可不得复制,转载传播本主页内容或用于任何商业用途,如需转载请征得主页所有者同意,并附上主页链接.
西安电子科技大学个人主页 站点地图 | | 李晖的留言板 | 更新日期 :2016-10-20 | |
Copyright © 2011-2016 西安电子科技大学 版权所有 陕ICP备021284(05016169) Powered by 信息化建设处 & 电院网络中心