学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 樊凯的留言板
学术论文

代表论文:

 

2020

1. A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks. IEEE Transactions on Vehicular Technology. 2020. (SCI 2区 IF 6.29) 

2. A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid. ICC 2020. 2020. (EI)

 

2019

1. A Lightweight Authentication Scheme for Cloud-based RFID Healthcare Systems. IEEE Network. 2019. (SCI 1区  IF 7.230)

2. Cloud-based Lightweight Secure RFID Mutual Authentication Protocol in IoT. Information sciences. 2019. (SCI 1区  IF  6.90)

3. Efficient and Privacy Preserving Access Control Scheme for Fog-enabled IoT. Future Generation Computer Systems. 2019. (SCI 1区  IF 6.30)

4. A Blockchain-based Clock Synchronization Scheme in IoT. Future Generation Computer Systems. 2019. (SCI 1区  IF 6.30)

5. Cloud-based RFID Mutual Authentication Scheme for Efficient Privacy Preserving in IoV. Journal of the Franklin Institute. 2019. (SCI 2区  IF  4.41)

6. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access. 2019. (SCI 2区  IF  4.96)

7. Permutation Matrix Encryption based Ultralightweight Secure RFID Scheme in Internet of Vehicles. Sensors. 2019. (SCI 2区  IF 3.72)

8. An Efficient Publicly Verifiable Multi-message and Multi-receiver Signcryption Scheme for Smart Mobile IoT. IEEE Access. 2019. (SCI 2区  IF  4.96)

9. A Secure and Efficient Outsourced Computation on Data Sharing Scheme for Privacy Computing. Journal of Parallel and Distributed Computing. 2019. (SCI 3区  IF 2.55)

10. A Secure Cross-domain Access Control Scheme in Social Networks. ICC 2019. 2019. (EI)

 

2018

1. Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Transactions on Industrial Informatics. 2018. (SCI 1区  IF  6.764)

2. Blockchain-based Secure Time Protection Scheme in IoT. IEEE Internet of Things Journal. 2018. (SCI 1区  IF 11.33)

3. Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing. IEEE NETWORK. 2018.(SCI 1区  IF  7.230)

4. EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing. Sensors. 2018. (SCI 2区 IF 2.677)

5. Lightweight NFC Protocol for Privacy Protection in Mobile IoT. Applied Sciences. 2018. (SCI 3区  IF 2.52)

6. Blockchain based Efficient Privacy Preserving and Data Sharing Scheme of Content-Centric Network in 5G. IET Communications. 2018.(SCI 4区 IF 1.061)

7. Privacy protection smartcard authentication scheme in cloud computing. Chinese Journal of Electronics. 2018. (SCI 4区 IF 0.325)

8. Secure Authentication Protocol for Mobile Payment. Tsinghua Science and Technology. 2018.(SCI 4区  IF  1.250)

9. MedBlock: Efficient and Secure Medical Data Sharing via Blockchain. Journal of Medical Systems. 2018.(SCI 3区  IF  2.532)

10. Cross-Domain based Data Sharing Scheme in Cooperative Edge Computing. IEEE EDGE 2018, 2018. (EI)

11. Secure Time Synchronization Scheme in IoT based on Blockchain. Blockchain 2018, 2018. (EI) (录取率15.3%)

 

2017

1. Proxy-assisted access control scheme of cloud data for smart cities. Personal and Ubiquitous Computing. 2017.(SCI 3区 IF 2.395)

2. Secure, Efficient and Revocable Data Sharing Scheme for Vehicular Fogs. Peer-to-Peer Networking and Applications. 2017.(SCI 4区 IF 1.0)

3. Privacy Protection based Access Control Scheme in Cloud-based Services. China Communications. 2017.(SCI 4区 IF 0.424)

4. Secure Ultra-lightweight RFID Mutual Authentication Protocol Based on Transparent Computing for IoV. Peer-to-Peer Networking and Applications. 2017.(SCI 4区 IF 1.0)

5. ULMAP: Ultra-lightweight NFC Mutual Authentication Protocol With pseudonyms in the tag for IoT in 5G. Mobile Information Systems. 2017.(SCI 4区 IF 1.462)

6. Secure and private key management scheme in big data networking. Peer-to-Peer Networking and Applications. 2017.(SCI 4区 IF 1.0)

7. NFC Secure Payment and Verification Scheme with CS E-Ticket. Security and Communication Networks. 2017.(SCI 4区 IF 0.806)

8. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing. Sensors, 2017.(SCI 2区 IF 2.677)

9. An Ultra-Lightweight RFID Authentication Scheme for Mobile Commerce. Peer-to-Peer Networking and Applications. 2017. (SCI 4区 IF 1.0)

10. Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for big data. IEEE GLOBECOM 2017.2017.(EI)

 

2016

1. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks. 2016. (SCI 4区 IF 0.806)

2. Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol. IEEE GLOBECOM 2016. 2016.(EI)

3. Privacy Protection based Access Control Scheme in Cloud-based Services. ICCC 2016. 2016.(EI)

4. NFC Secure Payment and Verification Scheme for Mobile Payment. WASA 2016. 2016.(EI)

 

2015

1. Adaptive Sensing Private Property Protection Protocol Based on Cloud. International Journal of Distributed Sensor Networks. 2015. (SCI 4区 IF 0.906)

2. A secure RFID application revocation scheme for IoT. IEICE Transactions on information and systems. 2016. (SCI 4区 IF 0.226)

3. Ciphertext retrieval in super-peer p2p network. IEEE GLOBECOM 2015. 2015. (EI)

4. RFID secure application revocation for IoT in 5G. IEEE TrustCom-15. 2015.(EI)

5. ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device. WASA 2015. 2015.(EI)

6. Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption. CSCloud 2015. 2015. (EI)

7. Cloud Storage Architecture with me[ant]ta-Data Service la[ant]yer in Cloud Computing. CSPS 2014. 2015. (EI)

 

2014之前

1. RSEL: Revocable secure efficient lightweight RFID authentication scheme. Concurrency and Computation: Practice and Experience. 2014. (SCI 4区 IF 0.845)

2. Efficient ID-based registration protocol featured with user anonymity in mobile IP networks. IEEE transactions on wireless communications. 2010. (SCI 2区 IF 4.951)

3. Mobile IP registration in certificateless public key infrastructure. IET information security. 2007. (SCI 4区 IF 0.623)

4. Watermarking protocol of secure verification. Journal of electronic imaging. 2007. (SCI 4区 IF 1.061)

5. Steganography scheme for m-commerce. Electronics Letters. 2005. (SCI 4区 IF 1.038)

6. Fairness electronic payment protocol. International journal of grid and utility computing. 2012. (EI)

7. A new proxy blind signature scheme. International journal of grid and utility computing. 2012. (EI)

8. A Fair Non-repudiation Protocol without TTP on Conic Curve over Ring Zn. Advances in information sciences and service sciences. 2012. (EI)

9. Perfect concurrent signatures scheme on conic curve over ring Zn. International journal of digital content technology and its applications. 2012. (EI)

10. Secure buyer-seller watermarking protocol. IEEE proceedings of information security. 2006. (EI)

11. LRMAPC: a lightweight RFID mutual authentication protocol with cache in the reader for IoT. CIT 2014. 2014. (EI)

12. An Adaptive Feedback Load Balancing Algorithm in HDFS. INCos 2013. 2013. (EI)

13. Smart-blocking file storage method in cloud computing. ICCC 2012. 2012. (EI)

14. ESLRAS: a lightweight RFID authentication scheme with high efficiency and strong security for Internet of Things. INCos 2012. 2012. (EI)

15. Abuse-freeness electronic payment protocol. INCos 2011. 2011. (EI)

16. Forward Secure Proxy Blind Signature Scheme. INCos 2011. 2011. (EI)

17. Concurrent Signature Protocol on Conic Curve over Ring Zn. ECC 2011. 2011. (EI)

18. Security analysis of the Kerberos protocol using BAN logic. IAS 2009. 2009. (EI)

19. A new abuse-free fair electronic payment protocol, IAS 2009, 2009. (EI)

20. Adaptive encrypted information hiding scheme for images, CIS 2007, 2007. (EI)

21. A secure steganography scheme based on (N, t) threshold. AINA 2004. 2004. (EI)