SCI检索期刊
1、Haipeng Q , Zhen Y , Xi-Jun L , et al. Certificateless public key encryption with equality
test[J]. Information Sciences, 2018, 462:76-92.(SCI一区、CCF-B)
2、Qian Lu, Haipeng Qu*, Yuzhan Ouyang, and Jiahui Zhang, “SLFAT: Client-Side Evil Twin
Detection Approach Based on Arrival Time of Special Length Frames,” Security and
Communication Networks, vol. 2019.(CCF-C)
3、Lu Q , Qu H* , Zhuang Y , et al. Client-Side Evil Twin Attacks Detection Using Statistical
Characteristics of 802.11 Data Frames[J]. IEICE Transactions on Information and Systems,
2018, E101.D(10):2465-2473.
4、Xi-Jun Lin, Lin Sun, Haipeng Qu and He-Qun Xian. Cryptanalysis of A Compact Anonymous HIBE
with Constant Size Private Keys. The Computer Journal. (CCF-B)
5、Xi-Jun Lin, Lin Sun, Haipeng Qu and Dongxiao Liu. On the Security of Secure
Server-Designation Public Key Encryption with Keyword Search. The Computer Journal. (CCF-B)
6、Xi-Jun Lin, Lin Sun and Haipeng Qu. Generic construction of public key encryption,
identity-based encryption and signcryption with equality test. Information Sciences.2018.
(SCI一区、CCF-B)
7、Xi-Jun Lin, Lin Sun and Haipeng Qu. An Efficient RSA-based Certificateless Public Key
Encryption Scheme. Discrete Applied Mathematics.2017,241(51).pp.39-47.
8、Xi-Jun Lin, Lin Sun, Haipeng Qu and Dongxiao Liu.Cryptanalysis of A Pairing-Free
Certificateless Signcryption Scheme. The Computer Journal.2018,61(4). (CCF-B)
9、Xi-Jun Lin, Lin Sun, Haipeng Qu and Xiaoshuai Zhang. Editorial: On the Security of the
First Leakage-Free Certificateless Signcryption Scheme. The Computer Journal. 2016,60(4).
(CCF-B)
10、Xi-Jun Lin, Lin Sun and Haipeng Qu. Insecurity of An Anonymous Authentication
For Privacy-preserving IoT Target-driven Applications. Computers & Security.
2015,48(9).pp.142-149. (CCF-B)
11、Qu H , Hou G , Guo Y , et al. Localization with Single Stationary Anchor for Mobile Node
in Wireless Sensor Networks[J]. International Journal of Distributed Sensor Networks, 2013,
2013:1-11.
CCF推荐会议
1、Lu Q , Qu H , Zhuang Y , et al. A Passive Client-based Approach to Detect Evil Twin
Attacks[C]// Trustcom/bigdatase/icess. IEEE, 2017. (CCF-C)
2、Zhengbo Li, Zhongwen Guo, Haipeng Qu, Feng Hong, Pengpeng Chen, Meng Yang. UD-TDMA: A
Distributed TDMA Protocol for Underwater Acoustic Sensor Network. Proceedings of Mass 2009,
918-923. (CCF-C)
其他
1、张琦, 林喜军, 曲海鹏*. 云计算中支持授权相等测试的基于身份加密方案[J]. 信息网络安全, 2018(6).
2、张琦,李嘉伟,林喜军,曲海鹏*. 支持灵活授权的基于身份的加密相等性测试方案[J]. 计算机工程,2018.
3、杨浩, 林喜军, 曲海鹏*. 分布式网络下改进的Top-k查询算法[J]. 计算机工程, 2017(02):85-90.
4、王宁, 曲海鹏*, 范令. 一种分布式环境下高效查询算法[J]. 中国海洋大学学报(自然科学版), 2016, 46(2):138-145.
5、李嘉伟, 杨知举, 林喜军, 曲海鹏*. 基于软件定义网络的网络故障诊断方法研究[J]. 网络与信息安全学报, 2016(12).
6、石沙沙, 孙文红, 江明建, 曲海鹏*. 基于分布式数据聚合的智能电网隐私保护协议研究[J]. 信息网络安全, 2015, 26(12):59-65.
7、滕希龙, 曲海鹏. 基于区间值直觉模糊集相似性的信息安全风险评估方法研究[J]. 信息网络安全, 2015(5):62-68.
8、Yu-Ting D, Hai-Peng Q*, Xi-Long T. Real-time risk assessment based on hidden Markov model
and security configuration[C]//Information Science, Electronics and Electrical Engineering
(ISEEE), 2014 International Conference on. IEEE, 2014, 3: 1600-1603.
9、李正宝,郭忠文,曲海鹏,洪锋,洪璐.E2DTS:水下传感器网络能量高效的分布式时间同步算法.通信学报, 31(9A), 2010,22-29.
10、谢松, 郭忠文, 曲海鹏,等. 基于多密钥空间的无线传感器网络密钥管理方案[J]. 计算机应用, 2009, 29(4):932-934.
11、Zhang Wei, Pang Renbo, Pang Yanwei, Qu Haipeng. Self adaptive mail filtering POP3 proxy
based on users’ feedback, Journal of Tianjin University, 2009.
12、Lv G, Guo Z W, Qu H, et al. Study of RFEC-Based Transport Protocol in Underwater Acoustic
Sensor Networks[C]// International Conference on Wireless Communications. 2008.
13、冯庆云,曲海鹏,周英,郭忠文. 基于数据包标记的伪造IP DDoS攻击防御. 计算机工程,2008,34(19).
14、周英,曲海鹏,冯庆云,郭忠文. 信息安全风险评估中权重优化方法研究. 信息安全与通信保密,2008.2.
15、陈恺,冯登国,曲海鹏,张颖君. 高速以太网即时监控可定制内存访问模型. Proceedings of NetSec 2007.
16、曲海鹏,冯登国,苏璞睿. 基于有序标记的IP包追踪方案.电子学报,2006,1.
17、曲海鹏,李德全,苏璞睿,冯登国. 一种分块标记的IP包追踪方案,计算机研究与发展,2005,12.
18、QU H, SU P, LIN D, ET AL. A PACKET MARKING SCHEME FOR IP TRACEBACK[C]// NETWORKING - ICN
2005, INTERNATIONAL CONFERENCE ON NETWORKING, REUNIONISLAND, FRANCE, APRIL 17-21, 2005,
PROCEEDINGS. DBLP, 2005:964-971.
19、SU P, LI D, QU H, ET AL. DETECTING THE DEVIATIONS OF PRIVILEGED PROCESS EXECUTION[C]//
NETWORKING - ICN 2005, INTERNATIONAL CONFERENCE ON NETWORKING, REUNIONISLAND, FRANCE, APRIL
17-21, 2005, PROCEEDINGS. DBLP, 2005:980-988.
20、Qu H, Su P, Feng D. A typical noisy covert channel in the IP protocol[C]// International
Carnahan Conference on Security Technology. 2004.
21、唐功友, 曲海鹏, 高延铭. 一类非线性系统次优控制的灵敏度法[J]. 中国海洋大学学报(自然科学版), 2002, 32(4):615-620.