武汉大学计算机博士导师 王丽娜,武汉大学计算机学院博士生导师简介:陈晶...

[7] Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi

Hassan, Abdulhameed Alelaiwi. Secure Independent-update Concise-expression

Access Control for Video on Demand in Cloud. Information Science, 2016. DOI:

10.1016/j.ins.2016.08.018 (SCI收录, CCF B类)

[8] Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy

Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE

International Conference on Sensing, Communication, and Networking(SECON 2015).

2015 (CCF B类)

[9] Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu.

Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data

Sharing. IEEE Transactions on Cloud Computing. 2016

[10] Jing Chen, Lihong Zhang, Kun He, Ruiying Du. Lina Wang. Message-Locked

Proof of Ownership and Retrievability with Remote Repairing in Cloud. Security

and Communication Networks. 2016 (SCI收录, CCF C类)

[11] Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du. A r-Strawman

privacy-preserving scheme in weighted social networks. Security and

Communication Networks. 2016 (SCI收录, CCF C类)

[12] Yu Fajiang, Chen Jing, Xiang Yang, Zhu Jiacheng, Zhao Yangdi. An

efficient anonymous remote attestation scheme for trusted computing based on

improved CPK. Electronic Commerce Research. 2014 (SSCI收录,corresponding

author)

[13] Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based

on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE

International Conference on Trust, Security and Privacy in Computing and

Communications (IEEE TrustCom-13). Melbourne, Australia, 2013:58-64 (CCF,C类)

[14] Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A

Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of

IEEE International Conference on Trust, Security and Privacy in Computing and

Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding

author)

[15] Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based

on Incomplete Information Game in Wireless Mesh Networks. China Communication.

2012,9(10): 23-32 (SCI收录)

[16] Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of

Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International

Conference on Trust, Security and Privacy in Computing and Communications

(TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)

[17] Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic

Network Coding Based on Hybrid Flow in Wireless Network. China Communication.

2011,8(4): 125-131 (SCI收录)

[18] 张宇,陈晶,杜瑞颖,周庆,郑明辉. 适于车载网通信的高效签密方案. 2015, 43(3):512-517 (权威期刊,

corresponding author)

[19] Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of

Security Network Coding toward Various Attacks. In Proc. of IEEE International

Conference on Trust, Security and Privacy in Computing and Communications

(TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)

[20] Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on

Reputation for Spectrum Allocation in Wireless Networks. Computer

Communications. 2010, 33(14): 1623-1631 (SCI收录)

[21] 陈晶, 杜瑞颖, 王丽娜, 田在荣. 网络环境下一种基于概率密度的信任博弈模型. 电子学报.2010,38(2): 427-433

(权威期刊)

[22] 沙乐天,傅建明,陈晶,黄诗勇. 一种面向敏感信息处理的敏感度度量方法 [J]. 计算机研究与发展, 2014, 51(5):

1050-1060. (权威期刊)

[23] 李拴保,傅建明,张焕国,陈晶,王晶,任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报. 2014, 35(9): 99-111

(权威期刊)

[24] Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote

Authentication Protocol with User Anonymity Based on Elliptic Curve

Cryptography. Wireless Personal Communications. 2014 (SCI收录)

[25] Wei Liu, Wei Du, Jing Chen, Wei Wang, Guosun Zeng. Adaptive

energy-efficient scheduling algorithm for parallel tasks on homogeneous

clusters. Journal of Network and Computer Applications. 2013. (SCI收录)

[26]Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui. An Efficient Fair

UC-Secure Protocol for Two-Party Computation, Security and Communication

Networks. 2013 (SCI收录)

[27] Fu Cai, Gao Xiang, Chen Jing etc. GRAP: Grey Risk Assessment based on

Projection in Ad Hoc networks. Journal of Parallel and Distributed Computing.

2011.71(9): 1249-1260. (CCF B类)

[28] Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution

scheme using network coding for mobile ad hoc network. Security and

Communication Networks. 2011.3 (SCI收录)

[29] 徐鹏, 崔国华, 陈晶. 标准模型下一种实用的和可证明安全的IBE方案. 计算机学报. 2010.2(33): 335-344

(权威期刊)

[30] Minghui Zheng, Jing Chen. Provably Secure Two-party Explicit

Authenticated Key Agreement Protocol. In proc. of IEEE International Conference

on Trust, Security and Privacy in Computing and Communications(TrustCom). 2012:

1299-1303 (CCF C类)

[31] 张宇, 陈晶, 杜瑞颖,等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 第3期(03):512-517.

(权威期刊)

通用考博英语精品课程【节选】-1元领!

d228363d86aec26cb67c198602b21d28.png

摸清考试命脉,有技巧有方法有准备地进入到考博英语中。

适用人群:对考博英语茫然不知如何下手,想通过考博英语的学子们。

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值