学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 姜奇的留言板
第一或通信作者期刊论文
  1. Qi Jiang, Guichuan Zhao, Xindi Ma, Meng Li,  Youliang Tian, Xinghua Li. Cross-modal Learning based Flexible Bimodal Biometric Authentication with Template Protection. IEEE Transactions on Information Forensics and Security, 2024, 19: 3593-3607. DOI: 10.1109/TIFS.2024.3364092(SCI, CCF A)
  2. Guichuan Zhao,Qi Jiang,Ding Wang,Xindi Ma,Xinghua Li. Deep Hashing based Cancelable Multi-biometric Template Protection. IEEE Transactions on Dependable and Secure Computing, 2024, 21(4): 3751-3767. DOI: 10.1109/TDSC.2023.3335961 (SCI, CCF A)
  3. 杨雪,刘怡静,姜奇,王金花,李兴华. 以用户为中心的双因子认证密钥协商协议. 软件学报, 2024, 35(10): 4859-4875
  4. 姜奇,赵晓敏,赵贵川,王金花,李兴华.自适应分数级融合的多模态生物特征认证.西安电子科技大学学报, 2023, 50(4): 11-21. https://kns.cnki.net/kcms/detail/61.1076.TN.20230330.1421.002.html
  5. 姜奇;叶远伊;孙建国;王金花;陈婷. 面向发布-订阅系统的多级安全访问控制方案. 密码学报, 2023, 10(4):752-768. DOI: 10.13868/j.cnki.jcr.000625
  6. Guichuan Zhao,  Qi Jiang, Ximeng Liu, Xindi Ma, Ning Zhang, Jianfeng Ma. Electrocardiogram Based Group Device Pairing for Wearables.  Transactions on Mobile Computing, 2023,22(11):6394 - 6409. DOI: 10.1109/TMC.2022.3200104 (SCI, CCF A, 中科院2区)
  7. 姜奇, 蔡明鑫, 程庆丰, 田有亮, 马建峰. 面向分层无人机网络的去中心群组密钥管理方案. 电子与信息学报, 2023, 45(5): 1669-1677. doi:  10.11999/JEIT220347
  8. 姜奇,杨雪,王金花,程庆丰,马鑫迪,马建峰. 面向车联网的抗设备捕获认证密钥协商协议. 中国科学 信息科学, 2022, 52(12): 2351–2370. DOI: 10.1360/SSI-2021-0379
  9. 姜奇,冯茹 ,张瑞杰 ,王金花,陈婷 ,魏福山.  基于 GRU 的智能手机多场景步态认证. 网络与信息安全学报, 2022, 8(5):26-39.  DOI: 10.11959/j.issn.2096-109x.2022060
  10. 姜奇,文悦,张瑞杰,魏福山,马建峰. 面向智能手机的自适应触屏持续认证方案. 电子学报, 2022, 50(5):1131-1139. DOI: 10.12263/DZXB.20210624
  11. Guichuan Zhao, Qi Jiang, Xiaohan Huang, Xindi Ma, Youliang Tian,Jianfeng Ma. Secure and Usable Handshake based Pairing for Wrist-Worn Smart Devices on Different Users. Mobile Networks and Applications, 2021, 26(6), 2407–2422. DOI: 10.1007/s11036-021-01781-x
  12. Naijian Zhang, Qi Jiang, Long Li, Xindi Ma, Jianfeng Ma. An efficient three-factor remote user authentication protocol based on BPV-FourQ for Internet of Drones. Peer-to-Peer Networking and Applications, 2021, 14(5):3319–3332. DOI: 10.1007/s12083-021-01130-5
  13. Qi Jiang, Xin Zhang, Ning Zhang, Youliang Tian, Xindi Ma, Jianfeng Ma. Three-Factor Authentication Protocol Using Physical Unclonable Function for IoV. Computer Communications, 2021,173:45-55. DOI: 10.1016/j.comcom.2021.03.022
  14. Junshuai Sun, Qi Jiang,Jianfeng Ma, Qingfeng Cheng, Chih-Lin I, Chengguang Yin. Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks,Transactions on Emerging Telecommunications Technologies, 2021,32(5):e3925. DOI: 10.1002/ett.3925
  15. Qi Jiang, Zhiren Chen, Jianfeng Ma, Xindi Ma, Jian Shen and Dapeng Wu. Optimized Fuzzy Commitment based Key Agreement Protocol for Wireless Body Area Network. IEEE Transactions on Emerging Topics in Computing,2021,9(2):839-853. DOI: 10.1109/TETC.2019.2949137 (SCI, 中科院2区, ESI高被引论文)
  16. Qi Jiang, Ning Zhang, Jianbing Ni, Jianfeng Ma, Xindi Ma, Kim-Kwang Raymond Choo. Unified Biometric Privacy Preserving Three-factor Authentication and Key Agreement for Cloud-assisted Autonomous Vehicles. IEEE Transactions on Vehicular Technology, 2020, 69(9):9390-9401. DOI: 10.1109/TVT.2020.2971254(SCI, ESI高被引论文, 中科院2区)
  17. Qi Jiang, Xiaohan Huang, Ning Zhang, Kuan Zhang, Xindi Ma, Jianfeng Ma. Shake to Communicate: Secure Handshake Acceleration-based Pairing Mechanism for Wrist Worn Devices. IEEE Internet of Things Journal, 2019, 6(3): 5618-5630. DOI: 10.1109/ JIOT. 2019. 2904177 (SCI, 中科院1区)
  18. Qi Jiang, Yuanyuan Qian, Jianfeng Ma, Xindi Ma, Qingfeng Cheng, Fushan Wei. User centric three‐factor authentication protocol for cloud‐assisted wearable devices. International Journal Communication Systems. 2019, 32(6): e3900. DOI: 10.1002/ dac.3900 (27 December 2018, April 2019) (SCI, ESI高被引论文)
  19. Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang, Jianfeng Ma. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing, 2018, 9(4):1061–1073. DOI: 10.1007/s12652-017-0516-2(SCI, ESI高被引论文)
  20. Qi Jiang, Jianbing Ni, Jianfeng Ma, Li Yang, and Xuemin (Sherman) Shen. Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing. IEEE Network, 2018, 32(3): 28-35. DOI: 10.1109/MNET.2018.1700347(SCI, 中科院1区, IF=7.197(2018))
  21. Qi Jiang, Jianfeng Ma, Fushan Wei. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. IEEE Systems Journal, 2018, 12(2): 2039-2042. DOI: 10.1109/JSYST.2016.2574719 (SCI, ESI高被引论文, 中科院2区, IF=4.337(2018))
  22. Qi Jiang, Jianfeng Ma, Chao Yang, Xindi Ma, Jian Shen, Shehzad Ashraf Chaudhry. Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering, 2017,63:182-195. DOI:10.1016/j.compeleceng.2017.03.016 (SCI)
  23. Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He. Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks. IEEE Access, 2017, 5(1):3376-3392. DOI: 10.1109/ACCESS.2017.2673239 (SCI, ESI高被引论文, 中科院2区,  IF=3.557(2018),  3.224(2017),Top 5 most cited articles in 2017 [2341 papers were published by IEEE Access in 2017])
  24. Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen Chilamkurti. A privacy aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. International Journal of Network Management, 2017, 27(3):e1937(1-17). DOI: 10.1002/nem.1937. (SCI, ESI高被引论文
  25. Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 2016, 76:37-48.(SCI, 中科院2区, IF=3.500, CCF Rank C)
  26. Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He. A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 2016, 72(10):3826–3849. DOI: 10.1007/s11227-015-1610-x. (SCI, ESI高被引论文, CCF Rank C)
  27. Qi Jiang, Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang, A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. Journal of Medical Systems, 2016, 40 (11):231 (SCI)
  28. Qi Jiang, Fushan Wei, Shuai Fu, Jianfeng Ma, Guangsong Li, Abdulhameed Alelaiwi. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics, 2016, 83(4):2085-2101. DOI: 10.1007/s11071-015-2467-5. (SCI, ESI高被引论文, 中科院2区, IF=3.464)
  29. Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 2015, 8 (6): 1070-1081. DOI: 10.1007/s12083-014-0285-z. (SCI, ESI高被引论文, CCF Rank C)
  30. Qi Jiang, Jianfeng Ma, Youliang Tian. Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al.. International Journal of Communication Systems, 2015, 28(7): 1340-1351. DOI: 10.1002/dac.2767. (SCI)
  31. Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li. Improvement of robust smart-card-based password authentication scheme. International Journal of Communication Systems, 2015, 28(2):383-393. DOI: 10.1002/dac.264.4. (SCI, ESI高被引论文)
  32. Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang. An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks. Wireless Personal Communications, 2014, 77 (2): 1489-1506. DOI 10.1007/s11277-013-1594-x. (SCI)
  33. Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian. Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. Journal of Medical Systems, 2014, 38(2):12. DOI: 10.1007/s10916-014-0012-6. (SCI:000331698300008)
  34. Jiang Qi, Ma Jianfeng, Li Guangsong, Yang Li. Robust two-factor authentication and key agreement preserving user privacy. International Journal of Network Security, 2014, 16(3): 229-240. (EI: 20140717337144)
  35. Jiang Qi, Ma Jianfeng, Li Guangsong, Ma Zhuo. An improved password-based remote user authentication protocol without smart cards. Information Technology and Control, 2013, 42(2):150-158. (SCI: 000324641900005)
  36. Jiang Qi, Ma Jianfeng, Li Guangsong, Yang Li. An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks. Wireless Personal Communications, 2013, 68(4):1477-1491. (SCI: 000314538100016, ESI高被引论文)
  37. Jiang Qi, Ma Jianfeng, Ma Zhuo, Li Guangsong. A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems, 2013, 37(1): 9897. (SCI: 000315681600007)
  38. Jiang Qi, Ma Zhuo, Ma Jianfeng, Li Guangsong. Security Enhancement of a Robust User Authentication fr[ant]amework for Wireless Sensor Networks. China Communications, 2012, 9(10):103-111. (SCI: 000312962100001)
  39. 姜奇, 李光松, 马建峰, 杨超. 异构无线网络混合认证模型. 华中科技大学学报, 2011, 39(2):11-14. (EI: 20111413898188)
  40. 姜奇, 马建峰, 李光松, 马卓. 基于WAPI的WLAN与3G网络安全融合. 计算机学报, 2010, 33(9):1675-1685. (EI: 20104613383361)
  41. 姜奇, 马建峰, 李光松, 刘宏月. 基于身份的异构无线网络匿名漫游协议. 通信学报, 2010, 31(10):138-145. (EI: 20104813444990)
  42. 姜奇, 李光松, 马建峰. 基于身份的匿名无线认证方案的安全缺陷及改进. 通信学报, 2010, 31(9A):209-216. (EI: 20104613391361)
第一或通信作者会议论文
  1. Xiaohan Huang, Guichuan Zhao, Qi Jiang, Xindi Ma, Youliang Tian, Jianfeng Ma. Secure and Usable Handshake based Secure Pairing for Wrist-Worn Smart Devices on Different Users. CollaborateCom 2020.
  2. Qi Jiang, Xin Zhang, Ning Zhang, Youliang Tian, Xindi Ma, Jianfeng Ma, Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV. IEEE ICCC 2019, pp. 195-200.
  3. Qi Jiang, Bingyan Li, Jianfeng Ma, On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems. BWCCA-LSNA 2016. Advances on Broad-Band Wireless Computing, Communication and Applications, Volume 2 of the series Lecture Notes on Data Engineering and Communications Technologies, pp. 879-884. DOI:10.1007/978-3-319-49106-6_89
  4. Qi Jiang, Bingyan Li, Jianfeng Ma, Youliang Tian, Yuanyuan Yang, Cryptanalysis and improvement of a smart card based mutual authentication scheme in cloud computing. ICCCS 2016.
  5. Jiang Qi, Ma Jianfeng, Li Guangsong, Ye Ayong. Security Enhancement on an Authentication Method for Proxy Mobile IPv6. Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia, Advances in Intelligent and Soft Computing Volume 110, 2012, pp 345-352. (EI: 20120114655860)
  6. 姜奇, 李光松, 马建峰, 丁勇. 泛在无线网络双因素匿名漫游认证协议. 2010中国计算机大会优秀论文集光盘版, 论文ID: 46. 
合作论文
  1. L Yang, X Jin, Q Jiang. Online handwritten signature verification based on the most stable feature and partition. Cluster Computing, 2018 (SCI)
  2. Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang.Attribute-based keyword search over hierarchical data in cloud computing. IEEE Transactions on Services Computing, 2018 (SCI)
  3. Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao. ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Generation Computer Systems, 2018, 79:82-94. DOI: 10.1016/j.future.2017.09.060 (SCI, 中科院2区)
  4. S Kumari, AK Das, X Li, F Wu, MK Khan, Q Jiang, SKH Islam.A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multimedia Tools and Applications, 2018, 77(2), 2359-2389 (SCI)
  5. Fushan Wei, Qi Jiang, Ruijie Zhang, Chuangui Ma, A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33(4): 907-921. (SCI)
  6. Chao Yang, Mingyue Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren. Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive and Mobile Computing, 2017, 41, 243-258. DOI:10.1016/j.compeleceng.2017.03.016 (SCI)
  7. Yinbin Miao, Jianfeng Ma, Qi Jiang, Xiong Li, Arun Kumar Sangaiah. Verifiable keyword search over encrypted cloud data in smart city. Computers & Electrical Engineering, 2018, 65:90-101. DOI: 10.1016/j.compeleceng.2017.06.021 (SCI)
  8. Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang, Junwei Zhang, Limin Shen, Zhiquan Liu. VCKSM: Verifiable Conjunctive Keyword Search over Mobile E-health Cloud in Shared Multi-owner Settings. Pervasive and Mobile Computing, 2017, 40:205-219. DOI:10.1016/j.pmcj.2017.06.016 (SCI)
  9. 马鑫迪,李辉,马建峰,习宁,姜奇,高胜,卢笛. 轻量级位置感知推荐系统隐私保护框架.计算机学报, 2017, 40(5): 1017-1030
  10. Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao,AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service. Peer-to-Peer Networking and Applications, 2017. DOI: 10.1007/s12083-017-0545-9 (SCI)
  11. Xindi Ma, Hui Li, Jianfeng Ma, Qi Jiang, Sheng Gao. Applet: A Privacy-Preserving framework for Location-Aware Recommender System,SCIENCE CHINA Information Sciences, 2017, 60: 092101. doi:10.1007/s11432-015-0981-4 (SCI, CCF Rank B)
  12. D Li, C Yang, C Li, Q Jiang, X Chen, J Ma, J Ren. A client-based secure deduplication of multimedia data. Communications (ICC), 2017 IEEE International Conference on, 1-6
  13. FuShan Wei, JianFeng Ma, Qi Jiang, Jian Shen, ChuanGui Ma. Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Information Technology And Control, 2016,45(1):62-70 (SCI)
  14. Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao, RTRC: A Reputation-based Incentive Game Model for Trustworthy Crowdsourcing Service. China Communications, 2016, 13(12): 199-215(SCI)
  15. Fu Shuai, Ma Jianfeng, Li Hongtao, Jiang Qi. A robust and privacy‐preserving aggregation scheme for secure smart grid communications in digital communities. Security and Communication Networks, 2016, 9(15):2779-2788. DOI: 10.1002/sec.1188 (SCI)
  16. Guangsong Li,Qi Jiang,Yanan Shi,Fushan Wei. Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks, International Journal of Network Security,2016, 18 (1), 193-200. (EI)
  17. 付帅,姜奇,马建峰. 一种无线传感器网络隐私保护数据聚合方案.计算机研究与发展. 2016, 53 (9): 2030-2038;  doi: 10.7544/issn1000-1239.2016.20150456
  18. Guangsong Li, Qi Jiang, FushanWei, Chuangui Ma. A New Privacy-Aware Handover Authentication Scheme for Wireless Networks. Wireless Personal Communications, 2015, 80(2): 581-589. DOI 10.1007/s11277-014-2029-z. (SCI)
  19. Yang Li, Ma Jianfeng, Lou Wenjing, Jiang Qi. A delegation based cross trusted domain direct anonymous attestation scheme. Computer Networks, 2015, 81: 245-257. (SCI)
  20. Saru Kumari , Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Qi Jiang, Muhammad Khurram Khan, Ashok Kumar Das, Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Multimedia Tools and Applications, 2015. DOI: 10.1007/s11042-015-2988-4. (SCI)
  21. YouLiang Tian, ChangGen Peng, DongDai Lin, JianFeng Ma, Qi Jiang, WenJiang Ji. Bayesian mechanism for rational secret sharing scheme. Science China Information Sciences, 2015: 1-13. (SCI)
  22. 付帅, 马建峰, 李洪涛, 姜奇. 无线传感器网络中匿名的聚合节点选举协议. 通信学报, 2015, 36(2), 88-97
  23. 田有亮, 彭长根, 马建峰, 姜奇, 朱建明. 安全协议的博弈论机制. 计算机研究与发展, 2014, 51(2): 344-352. (EI)
  24. 李龙营, 李金库, 马建峰, 姜奇. 采用攻击策略图的实时警报综合分析方法, 西安电子科技大学学报, 2014, 41(5): 84-90 (EI)
  25. Guangsong Li, Qi Jiang, Chuangui Ma, Improvements on a Mobile IP Registration Protocol Featured with User Anonymity, Advanced Materials Research Vols. 765-767 (2013) pp 1027-1030, doi:10.4028/www.scientific.net/AMR.765-767.1027. 
  26. Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang. Fair (t, n) threshold secret sharing scheme. IET Information Security, June 2013, 7(2):106-112. (SCI: 000321701300006)
  27. Yang Li, Ma Jiangfeng, Jiang Qi. Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. International Journal of Network Security, 2012, 14(3):156-163. (EI: 20121214874606)
  28. Yang Y, Gu J, Lv C, Jiang Q, Ma W. Security analysis of Kulseng et al.’s mutual authentication protocol for RFID systems. IET Information Security, 2012, 6(4): 239–248. (SCI: 000312962100001)
  29. 杨力, 马建峰, 姜奇. 无线移动网络跨可信域的直接匿名证明方案. 软件学报, 2012, 23(5):1260-1271. (EI: 20122615179341)
  30. 李光松, 姜奇, 马建峰. 3G-WLAN融合网络的票据认证协议. 华南理工大学学报, 2011, 39(10):61-67. (EI: 20114914584457)
  31. Li, Guangsong ; Ma, Jianfeng ; Jiang, Qi ; Chen, Xi. A novel re-authentication scheme based on tickets in wireless local area networks. Journal of Parallel and Distributed Computing, 2011, 71(7):906–914. (SCI: 000291287900002)
  32. 马卓, 马建峰, 李兴华, 姜奇. 可证明安全的可信网络连接协议模型.计算机学报, 2011, 34(9):1669-1678. (EI: 20114214432292)
  33. Li Guangsong, Ma Jianfeng, Jiang Qi. SAM: Secure Access of Media Independent Information Service with User Anonymity. EURASIP Journal on Wireless Communications and Networking. Volume 2010, Article ID 249169, 12 pages, doi:10.1155/2010/249169. (SCI: 000286276100001)
  34. Li Guangsong, Jiang Qi, Ma Jianfeng. A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks, Proc. of International Conference on E-Business and E-Government, 2010, 1285-1288. (EI)
  35. Li Guangsong, Jiang Qi, Ma Jianfeng. Secure Access Authentication for Media Independent Information Service, Proc. of the 3rd International Symposium Computer Science and Computational Technology, 2010, 409-413. (EI)
  36. 李光松, 马建峰, 姜奇. 介质独立信息服务的匿名访问协议, 通信学报, 2010, 31(10), 128-137. (EI)
  37. Yang Yuanyuan, Ma Wenping, Liu Weibo, Jiang Qi. Security Analysis of the Newest ID-transfer Scheme for Low-Cost RFID Tags. IEICE TRANS. FUNDAMENTALS 2010, E93-A(10), 1837-1839. (SCI: 000285489200020)
  38. Lu Xiang, Jiang Qi, Ma Jianfeng. An Empirical Measurement of Security Association in 802.11 Mesh Networks. Proc. of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. (EI)