Xidian Meeting Xidian Guide About Help Search Home Login Control Panel AddBookMark Xiaofeng Chen's MessageBoard
Profile

Xiaofeng Chen

 

Ph.D,  Professor

School of Cyber Enginnering,

Xidian University, P.R. China 

Research Areas
  • Public Key Cryptography 
  • Financial Cryptography
  • Cloud Computing and Security 
  • Data Security 
Contact Information

Mailing Address:  P.O.Box 91 Xidian University Xi'an 710071, P.R. China

Email: xfchen@xidian.edu.cn 

Tel: 86-29-88204749 (O) 

Resume
  • Young scholar of the Yangtze River of Ministry of Education, China;
  • Director of information Security Research Center, State Key Laboratory of Integrated Service Network. 

Education and Working Background

 

 

  • 5/2009-Current   Professor (2011.7), Xidian University
  • 5/2004-5/2009    Associate Professor (2005.1), Sun Yat-sen University
  • 4/2003-4/2004    Research as a Post-doctor in ICU, Korea
  • 3/2000-3/2003    Ph.D in Cryptography in Xidian University, P.R. China
  • 3/1998-12/1999   M.Sc of Mathematics in Northwest University, P.R. China
  • 9/1994-12/1997   B.Sc in Mathematics in Northwest University, P.R. China

 

Selected Papers

 

  • Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou, New Publicly Verifiable Databases with Efficient Updates, IEEE Transactions on Dependable and Secure Computing, accepted.
  • Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang, Efficient Algorithms for Secure Outsourcing of Bilinear Pairings, Theoretical Computer Science, accepted.
  • Xiaofeng Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations. IEEE Transactions on Information and Forensics Security, 10(1), 69-78, 2015.
  • Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan Wong. Secure Outsourced Attribute-based Signatures, IEEE Transactions on Parallel and Distributed Systems, 25(12): 3285-3294, 2014.
  • Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou, Verifiable Computation over Large Database with Incremental Updates, ESORICS 2014, LNCS 8712, 148–162, Springer-Verlag, 2014.
  • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations, IEEE Transactions on Parallel and Distributed Systems, 25(9), 2386-2396, 2014.
  • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim, Identity-based chameleon hashing and signatures without key exposure, Information Sciences, 265: 198-210, 2014.
  • Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak, Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks, IEEE Transactions on Parallel and Distributed Systems, 25(2), 332-342, 2014.
  • Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou, Fine-Grained Access Control System based on Outsourced Attribute-based Encryption, ESORICS 2013, LNCS 8134, 592-609, Springer-Verlag, 2013.
  • Xiaofeng Chen, Jin Li, Willy Susilo, Efficient Fair Conditional Payments for Outsourcing Computations, IEEE Transactions on Information Forensics and Security, 7(6), pp 1687-1694, 2012.
  • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations, ESORICS 2012, LNCS 7459, 541–556, Springer-Verlag, 2012.
  • Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li, Identity-Based Trapdoor Mercurial Commitment and Applications, Theoretical Computer Science, 412(39),5498-5512, 2011.
  • Xiaofeng Chen, Fangguo  Zhang, Haibo  Tian, Baodian  Wei, Kwangjo  Kim, Discrete Logarithm Based Chameleon Hashing and Signatures Without Key Exposure, Computers and Electrical Engineering,37(4), 614-623, 2011.
  • Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim: New receipt-free voting scheme using double-trapdoor commitment, Information Sciences, Elsevier, 181(8), 1493-1502, 2011.
  • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim,Identity-Based Chameleon Hash Scheme Without Key Exposure, 15th Australasian Conference on Information Security and Privacy (ACISP 2010), LNCS 6168, Springer, 200-215, 2010.
  • Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Kwangjo Kim,Three-round Abuse-free Optimistic Contract Signing With Everlasting Secrecy,Financial Cryptography and Data Security (FC 2010),LNCS 6052, Springer, 304–311, 2010.

 

Courses

 

  • Communications Network Security (2015-2011)
  • Communications Network Security (Graduated) (2015)
  • Advance in Cryptography (Graduated, Seminar) (2015-2010)
  • Communications Network Security (2009)
  • Abstract Algebra (2008)
  • Discrete Mathematics; Security in Electronic Commerce; Combinational Mathematics and Number Theory (2007)
  • Linear Algebra; Electronic Commerce; Provable Secuirty in PKC (Graduated) (2006)
  • Electronic commerce; Financial Cryptography (Graduated) (2005)
  • Modern Cryptography (2004) 
版权声明:未经西安电子科技大学以及个人主页教师本人许可不得复制,转载传播本主页内容或用于任何商业用途,如需转载请征得主页所有者同意,并附上主页链接.
Xidian University Homepage sitemap | | Xiaofeng Chen's MessageBoard | update by :2017-03-14 | |
Copyright © 2011-2016 Xidian University ICP 021284(05016169) Powered by XIDIANNIC & SEENIC