东北大学
NEU Site
科研
 
发表论文:
 
1.Xu Jian*, et al. Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system[J],Future Generation Computer Systems, Available online 21 April 2018,https://doi.org/10.1016/j.future.2018.04.018.SCI检索
2.Xu Jian*, et al. Dynamic Fully Homomorphic Encryption-based Merkle Tree for Lightweight Streaming Authenticated Data Structures[J],Journal of Network and Computer Applications, 107(2018):113-124.SCI检索(000428009500008).https://doi.org/10.1016/j.jnca.2018.01.014.
3.徐剑*,王安迪,毕猛,周福才. 支持隐私保护的k近邻分类器研究[J],软件学报, 2018.(Accepted).EI检索
4.Xu Jian*, Zhao Sijia, Zhou Fucai. Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services[J], Journal of Information Science and Engineering, 2017, 33(4): 965-978. SCI检索(000405540300008)
5.Jian Xu*, Fuxiang Li, Ke Chen, Fucai Zhou, Junho Choi, Juhyun Shin. Dynamic Chameleon Authentication Tree for Verifiable Data Streaming in 5G Networks [J], IEEE Access, 2017, 5(1): 26448-26459.SCI检索(000418881100033)
6.Jian Xu*, Fucai Zhou, Zhihao Jiang, Rui Xue. Dynamic proofs of retrievability with square-root oblivious RAM[J], Journal of Ambient Intelligence and Humanized Computing, 2016,5(5):611-621.SCI检索(000383132800002)
7.Jian Xu*, Mingjie Li, Fuxiang Li, Qingsong Yang, Fucai Zhou. Optimized Algorithms for Flexible Length-Based Authenticated Skip List[J], China Communications, 2016, 13(1): 124-138. SCI检索(000369045900013)
8.Jian Xu*, Xin Zhou, Jian Han, Fuxiang Li, Fucai Zhou. Data Authentication Model Based on Reed-solomon Error correcting Codes in Wireless Sensor Networks[J], IETE Technical Review,2013,30(3):191-199. SCI检索(000321142100005).
9.徐剑*,李坚,韩健,李福祥,周福才. 融合门限公钥加密和指数纠删码的安全云存储模型[J],软件学报,2016,27(6): 1463-1474.
10.徐剑*,周福才,杨牧洲,李福祥,朱志良. 面向分布式查询认证的分层哈希链表[J],计算机研究与发展, 2012,49(7): 1533-1544.
11.徐剑*,周福才,陈旭,朱志良,云计算中基于认证数据结构的数据外包认证模型[J],通信学报,2011,32(7):153-160.
12.徐剑*,周福才,李欣阳,朱志良. 面向P2P存储的分布式认证跳表[J], 东北大学学报(自然科学版), 2012,33(1):73-76.
13.徐剑*,李明洁,周福才,薛锐. 基于用户鼠标行为的身份认证方法[J],计算机科学,2016,43(2): 148-154
14.周福才,徐剑*(通信作者),王兰兰,陈晨,李福祥. 基于组合阶双线性群的组签名方案[J],计算机学报,2012,35(4):654-663.
15.ZHOU Fucai, XU Jian*, LI Hui, WANG Lanlan. Group Signature Based on Non-interactive Zero-Knowledge Proofs [J], China Communications,2011,8(3):34-41. SCI检索( 000289663300005).
16.Su Peng, Fucai Zhou, Jian Xu*, Zifeng Xu. Comments on “Identity-Based Distributed Provable Data Possession in Multicloud Storage” [J], IEEE Transactions on Services Computing,2016, 9(6): 996-998. (SCI 检索:000390471000013) .
 
申请专利:
 
1.徐剑等.专利名称:一种基于用户鼠标行为的身份认证方法,专利授权号:ZL 2013 1 0512750.2,(已授权)
 
2.徐剑等.专利名称:一种基于数字证书的远程移动支付系统及支付方法,专利授权号:ZL 2012 1 0011160.7,(已授权)
 
3.徐剑等.专利名称:一种基于LRC纠删码的可恢复云存储系统,专利申请号:201710009884.0,(已公开)
 
4.徐剑等.专利名称:一种基于数据包捕获技术的网络威胁分析系统与方法,专利申请号:201710032555.8,(已公开)
 
学术著作:
 
1.周福才,徐剑.格理论与密码学,科学出版社,2013年1月
校址:辽宁省沈阳市和平区文化路3号巷11号 邮编:110819
Copyright ©Northeastern University | Site Designer: Network Center
Welcome to Northeastern University!