陈晓峰
个人信息:Personal Information
教授 博士生导师 硕士生导师
性别:男
毕业院校:西安电子科技大学
学历:博士研究生毕业
学位:博士学位
在职信息:在职
所在单位:网络与信息安全学院
所属院系: 网络与信息安全学院
学科:网络空间安全
扫描关注
- [1]Editorial.International Journal of High Performance Computing and Networking.2015,8 (2):91-92
- [2]Towards secure and reliable cloud storage against data re-outsourcing.FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE.2015,52 :86-94
- [3]New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY.2015,10 (1):69-78
- [4]New Publicly Verifiable Databases with Efficient Updates.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.2015,12 (5):546-556
- [5]Efficient request-based comparable encryption scheme based on sliding window method.SOFT COMPUTING.2016,20 (11):4589-4596
- [6]Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.SOFT COMPUTING.2016,20 (11):4487-4495
- [7]Verifiable Auditing for Outsourced Database in Cloud Computing.IEEE TRANSACTIONS ON COMPUTERS.2015,64 (11):3293-3303
- [8]Verifiable Computation over Large Database with Incremental Updates.IEEE TRANSACTIONS ON COMPUTERS.2016,65 (10):3184-3195
- [9]Efficient and secure encrypted image search in mobile cloud computing.Soft Computing.2017,21 (11):2959-2969
- [10]Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.JOURNAL OF INTERNET TECHNOLOGY.2016,17 (2):277-289
- [11]Towards achieving flexible and verifiable search for outsourced database in cloud computing.Future Generation Computer Systems.2017,67 :266-275
- [12]Secure and efficient fine-grained data access control scheme in cloud computing 1.Journal of High Speed Networks.2015,21 (4):259-271
- [13]Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation.IEEE TRANSACTIONS ON COMPUTERS.2016,65 (8):2363-2373
- [14]Improved algorithm for secure outsourcing of modular exponentiations with high checkability.INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING.2016,23 (3-4):182-191
- [15]Secure three-party computational protocols for triangle area.International Journal of Information Security.2016,15 (1):1-13
- [16]Secure three-party computational protocols for triangle area.INTERNATIONAL JOURNAL OF INFORMATION SECURITY.2016,15 (1):1-13
- [17]Efficient algorithms for secure outsourcing of bilinear pairings.THEORETICAL COMPUTER SCIENCE.2015,562 :112-121
|