扫描手机二维码

欢迎您的访问
您是第 位访客

开通时间:2017.10.12

最后更新时间:2017.10.12

  • 李发根 ( 教授 )

    的个人主页 http://faculty.uestc.edu.cn/lifagen/zh_CN/index.htm

  •   博士生导师

论文 当前位置: 中文主页 >> 科学研究 >> 论文

 


发表的论文

2023

[106]

 

Zhan Xie, Yong Chen, Ikram Ali, Chengwei Pan, Fagen Li, Wen He. Efficient and secure certificateless signcryption without pairing for edge computing-based internet of vehicles. IEEE Transactions on Vehicular Technology, 2023,72(5): 5642-5653.

[105]

 

Yuyang Zhou, Zhebin Hu, Fagen Li. Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Transactions on Cloud Computing, 2023, 11(1) :383-396, IEEE.

[104]

 

Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li. A group key agreement protocol based on ECDH and short signature. Journal of Information Security and Applications, 2023, 72:103388, Elsevier.

2022

[103]

 

Ling Xiong, Fagen Li, Mingxing He, Zhicai Liu, Tu Peng. An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services. IEEE Transactions on Cloud Computing, 2022,10(4): 2309-2323, 

[102]

 

Xiangyu Pan, Yuqiao Jin, Ziqing Wang, Fagen Li. A pairing-free heterogeneous signcryption scheme for unmanned aerial vehicles. IEEE Internet of Things Journal,2022, 9(19):19426-19437, IEEE.

[101]

 

Yuyang Zhou,Liang Zhao,Yuqiao Jin, Fagen Li. Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Information Sciences,2022, 604:80-96, Elsevier.

[100]

Ziqing Wang, Zeyu Yang, Fagen Li. A two rounds dynamic authenticated group key agreement protocol based on LWE. Journal of Systems Architecture,2022, 133: 102756, Elsevier.

[99]

Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci, Fagen Li. A provably secure free-pairing certificateless searchable encryption scheme.Telecommunication Systems, 2022, 80: 383-395, Springer. 

[98]

Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher. A computationally efficient HMAC-based authentication scheme for network coding.Telecommunication Systems,2022,79(1):47-69, Springer.

2021

[97]

 

Xuyang Ding, Shuai Zhang, Mengkai Song, Xiaocong Ding, Fagen Li. Towards invisible adversarial examples against DNN-based privacy leakage for Internet of things. IEEE Internet of Things Journal, 2021, 8(2): 802-812, IEEE

[96]

Nabeil Eltayieb,Rashad Elhabob,Alzubair Hassan,Fagen Li. Secure mobile health system supporting search function and decryption verification. Journal of Ambient Intelligence and Humanized Computing,2021,12(2), 2221-2231, Springer.

[95]

Ziqing Wang, Dianhua Tang, Haomiao Yang, Fagen Li. A public key encryption scheme based on a new variant of LWE with small cipher size. Journal of Systems Architecture, 2021, 117: 102165, Elsevier.

[94]

Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher. An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. Journal of Systems Architecture, 2021, 116: 102051, Elsevier.

[93]

Mengdi Ouyang, Ziqing Wang, Fagen Li. Digital signature with cryptographic reverse firewalls. Journal of Systems Architecture, 2021, 116: 102029, Elsevier.

[92]

Xiangyu Pan, Fagen Li. Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. Journal of Systems Architecture, 2021,115: 102075, Elsevier.

2020

[91]

 

Ikram Ali, Tandoh Lawrence, Anyembe Andrew Omala, Fagen Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 2020, 69(10): 11266-11280, IEEE

[90]

Fagen Li, Jiye Wang,Yuyang Zhou,Chunhua   Jin, SK Hafizul Islam. A heterogeneous user authentication and key establishment for mobile client-server environment.Wireless Networks, 2020, 26(2):913-924, Springer.

[89]

Ikram Ali, Fagen Li. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs.Vehicular Communications, 2020,22:100228, Elsevier.

[88]

Ikram Ali, Tandoh Lawrence, Fagen Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 2020,103:101692, Elsevier.

[87]

Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 2020,102:101653, Elsevier.

[86]

Yuyang Zhou, Jing Guo, Fagen Li. Certificateless public key encryption with cryptographic reverse firewalls. Journal of Systems Architecture, 2020,109:101754, Elsevier.

[85]

Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li. A bandwidth efficient HMAC-based authentication scheme for network coding. Journal of Information Security and Applications, 2020, 55: 102658. 

[84]

Mwitende Gervais, Ikram Ali, Nabeil Eltayieb, Baocang Wang, Fagen Li. Authenticated key agreement for blockchain-based WBAN. Telecommunication Systems, 2020,74:347-365, Springer

[83]

Gervais Mwitende, Yalan Ye, Ikram Ali, Fagen Li. Certificateless authenticated key agreement for blockchain-based WBANs. Journal of Systems Architecture, 2020,110:101777.

[82]

Xiaoyu Zheng, Yuyang Zhou, Yalan Ye, Fagen Li. A cloud data deduplication scheme based on certificateless proxy re-encryption. Journal of Systems Architecture, 20 20,102:101666, Elsevier.

2019

[81]

 

Emmanuel Ahene, Zhangchi Qin, Akua Konadu Adusei, Fagen Li. Efficient signcryption with proxy re-encryption and its application in smart grid. IEEE Internet of Things Journal, 2019, 6(6):9722-9737, IEEE. 

[80]

Ikram Ali, Alzubair Hassan, Fagen Li. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 2019,16: 45-61, Elsevier.

[79]

Emmanuel Ahene, Chunhua Jin, Fagen Li. Certificateless deniably authenticated encryption and its application to e-voting system. Telecommunication Systems, 2019,70 (3):417-434, Springer.

[78]

Emmanuel Ahene, Junfeng Dai, Hao Feng, Fagen Li. A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid. Telecommunication Systems, 2019, 70(4): 491-510, Springer.

[77]

Erneste Uwizeye, Jiye Wang, Zhihua Cheng, Fagen Li. Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Annals of Telecommunications, 2019, 74(7-8): 435-449, Springer

[76]

Jiaojiao Hong, Bo Liu, Qianyuan Sun, Fagen Li. A combined public-key scheme in the case of attribute-based for wireless body area networks. Wireless Networks, 2019, 25(2):845-859, Springer.

[75]

Alzubair Hassan, Anyembe Andrew Omala, Mohamed Ali, Chunhua Jin, Fagen Li. Identity-based user authenticated key agreement protocol for multi-server environment with   anonymity. Mobile Networks and Applications, 2019, 24(3): 890-902, Springer.

[74]

Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 2019,98:165-172, Elsevier.

[73]

Ikram Ali, Mwitende Gervais, Emmanuel Ahene, Fagen Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 2019,99: 101636, Elsevier. 

[72]

Mwitende Gervais, Liang Sun, Ke Wang, and Fagen Li. Certificateless authenticated key agreement for decentralized WBANs. Frontiers in Cyber Security (FCS 2019), CCIS 1105, pp. 268-290, 2019.

[71]

Emmanuel Ahene, Yuanfeng Guan, Zhiwei Zhang, Fagen Li. CLIBDA: A deniable authentication scheme for pervasive computing environment. Frontiers in Cyber Security (FCS 2019), CCIS 1105, pp. 67-83, 2019.

2018

[70]

 

Fagen Li, Yanan Han, Chunhua Jin. Cost-effective and anonymous access control for wireless body area networks. IEEE Systems Journal, 2018, 12(1):747-758, IEEE.

[69]

Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala. Practical deniable authentication for pervasive computing environments. Wireless Networks, 2018, 24 (1): 139-149, Springer.

[68]

刘波,周雨阳,胡飞,李发根.适用于移动客户端--多服务器环境的用户认证与密钥协商协议.密码学报. 2018, 5 (2): 111-125.

[67]

Xiaoguang Liu, Chunhua Jin, Fagen Li. An improved two-layer authentication scheme for wireless body area networks. Journal of Medical Systems, 2018, 42:143, Springer.

[66]

Anyembe Andrew Omala, Angolo Shem Mbandu, Kamenyi Domenic Mutiria, Chunhua Jin, Fagen Li. Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems, 2018, 42:108, Springer.

[65]

Yuyang Zhou, Zhaoqi Li, Fei Hu, Fagen Li. Identity-based combined public key schemes for signature, encryption and signcryption. Information Technology and Applied Mathematics, AISC 699, pp. 3-22, Springer-Verlag, 2018.

[64]

Anyembe Andrew Omala, Ikram Ali, Fagen Li. Heterogeneous signcryption with keyword search for wireless body area network Internet of Things. Security and Privacy, 1(5):e25, Wiley, 2018.

[63]

Alzubair Hassan,Nabeil Eltayieb,Rashad Elhabob,Fagen Li. An efficient certificateless user authentication and key exchange protocol for client-server environment. Journal of Ambient Intelligence and Humanized Computing, 2018,9 (6):1713-1727, Springer.

[62]

Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. Fine-grained attribute-based encryption scheme supporting equality test. International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2018), LNCS 11337, pp.220-233, Springer-Verlag, 2018.

2017

[61]

 

Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala. Efficient certificateless access control for industrial Internet of Things. Future Generation Computer Systems, 2017, 76: 285-292, Elsevier.

[60]

 

Fagen Li, Bo Liu, Jiaojiao Hong. An efficient signcryption for data access control in cloud computing. Computing, 2017, 99 (5): 465-479, Springer.

[59]

Fagen Li, Yanan Han, Chunhua Jin. Certificateless online/offline signcryption for the Internet of things. Wireless Networks, 2017, 23 (1): 145-158, Springer.

[58]

Anyembe Andrew   Omala,Kittur P. Kibiwott, Fagen Li. An efficient remote authentication scheme for wireless body area network, Journal of Medical Systems, 2017, 41 (2):25, Springer.

[57]

Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li. A Provably secure certificateless user authentication protocol for mobile client-server environment. Advances in Internetworking, Data & Web Technologies (EIDWT 2017), LNDECT 6, pp. 592-602, Springer-Verlag, 2017.

2016

[56]

Fagen Li, Di Zhong, Tsuyoshi Takagi. Efficient deniably authenticated encryption and its application to e-mail. IEEE Transactions on Information Forensics and Security, 2016, 11 (11): 2477-2486, IEEE.

[55]

Fagen Li, Jiaojiao Hong. Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal, 2016, 16 (13): 5389-5396, IEEE.

[54]

Fagen Li, Yanan Han, Chunhua Jin. Practical access control for sensor networks in the context of the Internet of things. Computer Communications, 2016, 89-90:   154-164, Elsevier.

[53]

Fagen Li, Yanan Han, Chunhua Jin. Practical signcryption for secure communication of wireless sensor networks. Wireless Personal Communications, 2016, 89 (4): 1391-1412, Springer.

[52]

Fagen Li, Zhaohui Zheng, Chunhua Jin. Secure and efficient data transmission in the Internet of things. Telecommunication Systems, 2016, 62 (1): 111-122, Springer.

[51]

Fagen Li, Zhaohui Zheng, Chunhua Jin. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommunication Systems, 2016, 62 (4): 625-639, Springer.

[50]

Anyembe Andrew Omala, Niyifasha Robert, Fagen Li. A Provably-secure transmission scheme for wireless body area networks. Journal of Medical Systems, 2016, 40: 247, Springer.

[49]

韩亚楠,李发根.适用于智能电网的组合公钥密码体制研究.密码学报, 2016, 3(4): 340-351.

2015

[48]

Weifeng Wu, Fagen Li. An Efficient identity-based deniable authenticated encryption scheme. KSII Transactions on Internet and Information Systems, 2015, 9(5): 1904-1919.

2014

[47]

Fagen Li, Pan Xiong, Chunhua Jin. Identity-based deniable authentication for ad hoc networks. Computing, 2014, 96 (9): 843-853, Springer.

2013

[46]

Fagen Li, Hui Zhang, Tsuyoshi Takagi. Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 2013, 7 (3): 420-429, IEEE.

[45]

Fagen Li, Pan Xiong. Practical secure communication for integrating wireless sensor networks into the Internet of things. IEEE Sensors Journal, 2013, 13 (10): 3677-3684, IEEE.

[44]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Certificateless hybrid signcryption. Mathematical and Computer Modelling, 2013, 57 (3-4): 324-343, Elsevier.

[43]

Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi. Lattice-based signcryption. Concurrency and Computation: Practice and Experience, 2013, 25 (14): 2112-2122, Wiley.

[42]

Fagen Li, Tsuyoshi Takagi. Secure identity-based signcryption in the standard model. Mathematical and Computer Modelling, 2013, 57 (11-12): 2685-2694,   Elsevier.

[41]

Fagen Li, Tsuyoshi Takagi. Cryptanalysis and improvement of robust deniable authentication protocol. Wireless Personal Communications, 2013, 69 (4): 1391-1398, Springer.

[40]

Fagen Li, Mingwu Zhang, Tsuyoshi Takagi. Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 2013, 58(1-2): 196-203, Elsevier.

2012

[39]

Fagen Li, Muhammad Khurram Khan. A biometric identity-based signcryption scheme. Future Generation Computer Systems, 2012, 28 (1): 306-310, Elsevier.

[38]

Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi. Identity-based online/offline signcryption for low power devices. Journal of Network and Computer Applications, 2012, 35(1): 340-347, Elsevier.

[37]

Fagen Li, Mingwu Zhang, Tsuyoshi Takagi. Efficient signcryption in the standard model. Concurrency and Computation: Practice and Experience, 2012, 24 (17): 1977-1989, Wiley.

[36]

Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi. Further improvement of an identity-based signcryption scheme in the standard model. Computers and Electrical Engineering, 2012, 38 (2): 413-421, Elsevier.

[35]

Fagen Li, Di Zhong, Tsuyoshi Takagi. Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 2012, 1(6): 637-640, IEEE.

2011

[34]

Fagen Li, Yongjian Liao, Zhiguang Qin. Analysis of an identity-based signcryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011, E94-A(1): 268-269.

[33]

Fagen Li, Muhammad Khurram Khan. A survey of identity-based signcryption. IETE Technical Review, 2011, 28(3): 265-272.

[32]

Fagen Li, Jiang Deng, Tsuyoshi Takagi. An Improved Authenticated Encryption Scheme. IEICE Transactions on Information and Systems, 2011, E94-D(11): 2171-2172.

[31]

Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi. Efficient Identity-Based Signcryption in the Standard Model. The Fifth International Conference on Provable Security (ProvSec 2011), LNCS 6980, pp.120-137, Springer-Verlag,   2011.

2010

[30]

Fagen Li, Zhiguang Qin. Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. IETE Technical Review, 2010, 27(3):266-269. (SCI)

[29]

李发根, SHIRASE Masaaki, TAKAGI Tsuyoshi. 对适用于移动通信的代理签名方案的安全性分析. 中国科学:信息科学, 2010, 40(6):   796-800.

[28]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Cryptanalysis of efficient proxy signature schemes for mobile communication. SCIENCE CHINA Information Sciences, 2010, 53(10):2016-2021.

2009

[27]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Certificateless hybrid signcryption. The 5th Information Security Practice and Experience Conference (ISPEC 2009),   LNCS 5451, pp.112-123, Springer-Verlag, 2009.

[26]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Efficient multi-PKG ID-based signcryption for ad hoc networks. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 289-304,   Springer-Verlag, 2009.

[25]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Efficient signcryption key encapsulation without random oracles. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 47-59, Springer-Verlag, 2009.

[24]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Identity-based hybrid signcryption. Fourth International Conference on Availability, Reliability and Security (ARES 2009), pp. 534-539, IEEE Computer Society, Fukuoka, Japan, 2009.

[23]

Fagen Li, Hu Xiong, Yongjian Liao. A generic construction of identity-based signcryption. International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp. 291-295, IEEE Press, San Jose, USA , 2009.

[22]

Fagen Li, Hu Xiong, Xuyun Nie. A  new multi-receiver ID-based signcryption scheme for group communications. International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp.296-300, IEEE Press, San Jose, USA , 2009.

2008

[21]

Fagen Li, Xiangjun Xin, Yupu Hu. Identity-based broadcast signcryption, Computer Standards and Interfaces, 2008, 30(1-2):89-94.

[20]

Fagen Li, Xiangjun Xin, Yupu Hu. Efficient certificate-based signcryption scheme from bilinear pairings. International Journal of Computers and Applications, 2008, 30(2):129-133.

[19]

Fagen Li, Shijie Zhou, Rong Sun. Cryptanalysis of an identity based proxy multi-signature scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008, E91-A(7):1820-1823.

[18]

Fagen Li, Xiangjun Xin, Yupu Hu. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks, 2008,   3(3):206-215.

[17]

Fagen Li, Chunxiang Xu, Shijie Zhou. Improvement of a proactive threshold signcryption scheme. International Journal of Computers and Applications, 2008, 30(4):345-347.

[16]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. On the security of online/offline signatures and multisignatures from ACISP’06. The 7th International Conference on Cryptology and Network Security (CANS 2008), LNCS 5339, pp. 108-119, Springer-Verlag, 2008.

[15]

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Key management using certificateless public key cryptography in ad hoc networks. IFIP International Conference on Network and Parallel Computing (NPC 2008), LNCS 5245, pp.116-126, Springer-Verlag, 2008.

[14]

Fagen Li, Yong Yu. An efficient   and provably secure ID-based threshold signcryption scheme. International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.547-551, IEEE Press, Chengdu, China , 2008.

[13]

Fagen Li, Hu Xiong, Yong Yu. An efficient ID-based ring signcryption scheme. International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.542-546, IEEE Press, Chengdu, China , 2008.

2007

[12]

Fagen Li, Yupu Hu. Security analysis of the pomykala-barabasz scheme. Fundamenta Informaticae, 2007, 80(4):453-462.

[11]

Fagen Li, Xiangjun Xin, Yupu Hu. A pairing-based signcryption scheme using self-certified public keys, International Journal of Computers and Applications, 2007,  29(3): 278-282.

[10]

Fagen Li, Xiangjun Xin, Yupu Hu. Key management in ad hoc networks using self-certified publey system, International Journal of Mobile Communication, 2007, 5(1):94-106.

[9]

Fagen Li, Yupu Hu, Chuanrong   Zhang. An identity-based signcryption scheme for multi-domain ad hoc networks. 5th International Conference on Applied Cryptography and Network Security (ACNS 2007), LNCS 4521, pp. 373-384, Springer-Verlag, 2007.

[8]

Fagen Li, Yupu Hu, Shuanggen Liu. ID-based (t, n) threshold proxy signcryption for multi-agent systems. International Conference on Computational   Intelligence and Security (CIS 2006), Revised Selected Papers, LNAI 4456, pp.406-416, Springer-Verlag, 2007.

[7]

Fagen Li, Chunxiang Xu. An improved identity-based KCDSA signcryption scheme. The First International Symposium on Data, Privacy, & E-Commerce (ISDPE 2007), pp. 230-232, IEEE   Computer Society, 2007.

2006

[6]

李发根,胡予濮,李刚.一个高效的基于身份的签密方案.计算机学报,2006, 29(9):1641-1647.

[5]

Fagen Li,   Xiangjun Xin, Yupu Hu. ID-based signcryption scheme with (t, n) shared unsigncryption. International Journal of Network Security, 2006,   3(2):155-159.

[4]

Fagen Li, Yupu Hu, Jie Chen. Efficient ID-based signcryption scheme for multiple recipients. The 5th International Workshop for Applied PKC (IWAP 2006), Dalian, China , pp. 1-12, 2006.

[3]

Fagen Li, Yupu Hu, Shuanggen Liu. Security analysis of two ID-based threshold proxy signature schemes. The 5th International Workshop for Applied PKC (IWAP 2006), Dalian, China , pp. 13-20, 2006.

[2]

Fagen Li, Yupu Hu, Jie Chen. Efficient and provably secure signcryption scheme from bilinear pairings. The 9th China Cryptography Conference (ChinaCrypt 2006), Jinan, China , pp. 200-207, 2006.

2005

[1]

Fagen Li, Juntao Gao, Yupu Hu. ID-based threshold unsigncryption scheme from pairings. SKLOIS Conference on Information Security and Cryptology (CISC 2005), LNCS 3822, pp. 242-253, Springer-Verlag, 2005.

 


清水河校区:成都市高新区(西区)西源大道2006号 邮编: 611731  
沙河校区:成都市建设北路二段四号 邮编:610054
蜀ICP备 05006379 号   I 川公网安备 51019002000280 号