[7] Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi
Hassan, Abdulhameed Alelaiwi. Secure Independent-update Concise-expression
Access Control for Video on Demand in Cloud. Information Science, . DOI:
10.1016/j.ins..08.018 (SCI收录, CCF B类)
[8] Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy
Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE
International Conference on Sensing, Communication, and Networking(SECON ).
(CCF B类)
[9] Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu.
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data
Sharing. IEEE Transactions on Cloud Computing.
[10] Jing Chen, Lihong Zhang, Kun He, Ruiying Du. Lina Wang. Message-Locked
Proof of Ownership and Retrievability with Remote Repairing in Cloud. Security
and Communication Networks. (SCI收录, CCF C类)
[11] Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du. A r-Strawman
privacy-preserving scheme in weighted social networks. Security and
Communication Networks. (SCI收录, CCF C类)
[12] Yu Fajiang, Chen Jing, Xiang Yang, Zhu Jiacheng, Zhao Yangdi. An
efficient anonymous remote attestation scheme for trusted computing based on
improved CPK. Electronic Commerce Research. (SSCI收录,corresponding
author)
[13] Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based
on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE
International Conference on Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom-13). Melbourne, Australia, :58-64 (CCF,C类)
[14] Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A
Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of
IEEE International Conference on Trust, Security and Privacy in Computing and
Communications (TrustCom-14). Beijing, China, (CCF C类, corresponding
author)
[15] Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based
on Incomplete Information Game in Wireless Mesh Networks. China Communication.
,9(10): 23-32 (SCI收录)
[16] Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of
Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International
Conference on Trust, Security and Privacy in Computing and Communications
(TrustCom-14). Beijing, China, (CCF C类, corresponding author)
[17] Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic
Network Coding Based on Hybrid Flow in Wireless Network. China Communication.
,8(4): 125-131 (SCI收录)
[18] 张宇,陈晶,杜瑞颖,周庆,郑明辉. 适于车载网通信的高效签密方案. , 43(3):512-517 (权威期刊,
corresponding author)
[19] Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of
Security Network Coding toward Various Attacks. In Proc. of IEEE International
Conference on Trust, Security and Privacy in Computing and Communications
(TrustCom-14). Beijing, China, (CCF C类, corresponding author)
[20] Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on
Reputation for Spectrum Allocation in Wireless Networks. Computer
Communications. , 33(14): 1623-1631 (SCI收录)
[21] 陈晶, 杜瑞颖, 王丽娜, 田在荣. 网络环境下一种基于概率密度的信任博弈模型. 电子学报.,38(2): 427-433
(权威期刊)
[22] 沙乐天,傅建明,陈晶,黄诗勇. 一种面向敏感信息处理的敏感度度量方法 [J]. 计算机研究与发展, , 51(5):
1050-1060. (权威期刊)
[23] 李拴保,傅建明,张焕国,陈晶,王晶,任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报. , 35(9): 99-111
(权威期刊)
[24] Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote
Authentication Protocol with User Anonymity Based on Elliptic Curve
Cryptography. Wireless Personal Communications. (SCI收录)
[25] Wei Liu, Wei Du, Jing Chen, Wei Wang, Guosun Zeng. Adaptive
energy-efficient scheduling algorithm for parallel tasks on homogeneous
clusters. Journal of Network and Computer Applications. . (SCI收录)
[26]Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui. An Efficient Fair
UC-Secure Protocol for Two-Party Computation, Security and Communication
Networks. (SCI收录)
[27] Fu Cai, Gao Xiang, Chen Jing etc. GRAP: Grey Risk Assessment based on
Projection in Ad Hoc networks. Journal of Parallel and Distributed Computing.
.71(9): 1249-1260. (CCF B类)
[28] Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution
scheme using network coding for mobile ad hoc network. Security and
Communication Networks. .3 (SCI收录)
[29] 徐鹏, 崔国华, 陈晶. 标准模型下一种实用的和可证明安全的IBE方案. 计算机学报. .2(33): 335-344
(权威期刊)
[30] Minghui Zheng, Jing Chen. Provably Secure Two-party Explicit
Authenticated Key Agreement Protocol. In proc. of IEEE International Conference
on Trust, Security and Privacy in Computing and Communications(TrustCom). :
1299-1303 (CCF C类)
[31] 张宇, 陈晶, 杜瑞颖,等. 适于车载网安全通信的高效签密方案[J]. 电子学报, , 第3期(03):512-517.
(权威期刊)
通用考博英语精品课程【节选】-1元领!
摸清考试命脉,有技巧有方法有准备地进入到考博英语中。
适用人群:对考博英语茫然不知如何下手,想通过考博英语的学子们。