的个人主页 http://faculty.uestc.edu.cn/lifagen/zh_CN/index.htm
发表的论文 |
|
2023年 |
|
[106]
|
Zhan Xie, Yong Chen, Ikram Ali, Chengwei Pan, Fagen Li, Wen He. Efficient and secure certificateless signcryption without pairing for edge computing-based internet of vehicles. IEEE Transactions on Vehicular Technology, 2023,72(5): 5642-5653. |
[105]
|
Yuyang Zhou, Zhebin Hu, Fagen Li. Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Transactions on Cloud Computing, 2023, 11(1) :383-396, IEEE. |
[104]
|
Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li. A group key agreement protocol based on ECDH and short signature. Journal of Information Security and Applications, 2023, 72:103388, Elsevier. |
2022年 |
|
[103]
|
Ling Xiong, Fagen Li, Mingxing He, Zhicai Liu, Tu Peng. An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services. IEEE Transactions on Cloud Computing, 2022,10(4): 2309-2323, |
[102]
|
Xiangyu Pan, Yuqiao Jin, Ziqing Wang, Fagen Li. A pairing-free heterogeneous signcryption scheme for unmanned aerial vehicles. IEEE Internet of Things Journal,2022, 9(19):19426-19437, IEEE. |
[101]
|
Yuyang Zhou,Liang Zhao,Yuqiao Jin, Fagen Li. Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Information Sciences,2022, 604:80-96, Elsevier. |
[100] |
Ziqing Wang, Zeyu Yang, Fagen Li. A two rounds dynamic authenticated group key agreement protocol based on LWE. Journal of Systems Architecture,2022, 133: 102756, Elsevier. |
[99] |
Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci, Fagen Li. A provably secure free-pairing certificateless searchable encryption scheme.Telecommunication Systems, 2022, 80: 383-395, Springer. |
[98] |
Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher. A computationally efficient HMAC-based authentication scheme for network coding.Telecommunication Systems,2022,79(1):47-69, Springer. |
2021年 |
|
[97]
|
Xuyang Ding, Shuai Zhang, Mengkai Song, Xiaocong Ding, Fagen Li. Towards invisible adversarial examples against DNN-based privacy leakage for Internet of things. IEEE Internet of Things Journal, 2021, 8(2): 802-812, IEEE |
[96] |
Nabeil Eltayieb,Rashad Elhabob,Alzubair Hassan,Fagen Li. Secure mobile health system supporting search function and decryption verification. Journal of Ambient Intelligence and Humanized Computing,2021,12(2), 2221-2231, Springer. |
[95] |
Ziqing Wang, Dianhua Tang, Haomiao Yang, Fagen Li. A public key encryption scheme based on a new variant of LWE with small cipher size. Journal of Systems Architecture, 2021, 117: 102165, Elsevier. |
[94] |
Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher. An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. Journal of Systems Architecture, 2021, 116: 102051, Elsevier. |
[93] |
Mengdi Ouyang, Ziqing Wang, Fagen Li. Digital signature with cryptographic reverse firewalls. Journal of Systems Architecture, 2021, 116: 102029, Elsevier. |
[92] |
Xiangyu Pan, Fagen Li. Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. Journal of Systems Architecture, 2021,115: 102075, Elsevier. |
2020年 |
|
[91]
|
Ikram Ali, Tandoh Lawrence, Anyembe Andrew Omala, Fagen Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 2020, 69(10): 11266-11280, IEEE |
[90] |
Fagen Li, Jiye Wang,Yuyang Zhou,Chunhua Jin, SK Hafizul Islam. A heterogeneous user authentication and key establishment for mobile client-server environment.Wireless Networks, 2020, 26(2):913-924, Springer. |
[89] |
Ikram Ali, Fagen Li. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs.Vehicular Communications, 2020,22:100228, Elsevier. |
[88] |
Ikram Ali, Tandoh Lawrence, Fagen Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 2020,103:101692, Elsevier. |
[87] |
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 2020,102:101653, Elsevier. |
[86] |
Yuyang Zhou, Jing Guo, Fagen Li. Certificateless public key encryption with cryptographic reverse firewalls. Journal of Systems Architecture, 2020,109:101754, Elsevier. |
[85] |
Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li. A bandwidth efficient HMAC-based authentication scheme for network coding. Journal of Information Security and Applications, 2020, 55: 102658. |
[84] |
Mwitende Gervais, Ikram Ali, Nabeil Eltayieb, Baocang Wang, Fagen Li. Authenticated key agreement for blockchain-based WBAN. Telecommunication Systems, 2020,74:347-365, Springer |
[83] |
Gervais Mwitende, Yalan Ye, Ikram Ali, Fagen Li. Certificateless authenticated key agreement for blockchain-based WBANs. Journal of Systems Architecture, 2020,110:101777. |
[82] |
Xiaoyu Zheng, Yuyang Zhou, Yalan Ye, Fagen Li. A cloud data deduplication scheme based on certificateless proxy re-encryption. Journal of Systems Architecture, 20 20,102:101666, Elsevier. |
2019年 |
|
[81]
|
Emmanuel Ahene, Zhangchi Qin, Akua Konadu Adusei, Fagen Li. Efficient signcryption with proxy re-encryption and its application in smart grid. IEEE Internet of Things Journal, 2019, 6(6):9722-9737, IEEE. |
[80] |
Ikram Ali, Alzubair Hassan, Fagen Li. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 2019,16: 45-61, Elsevier. |
[79] |
Emmanuel Ahene, Chunhua Jin, Fagen Li. Certificateless deniably authenticated encryption and its application to e-voting system. Telecommunication Systems, 2019,70 (3):417-434, Springer. |
[78] |
Emmanuel Ahene, Junfeng Dai, Hao Feng, Fagen Li. A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid. Telecommunication Systems, 2019, 70(4): 491-510, Springer. |
[77] |
Erneste Uwizeye, Jiye Wang, Zhihua Cheng, Fagen Li. Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Annals of Telecommunications, 2019, 74(7-8): 435-449, Springer |
[76] |
Jiaojiao Hong, Bo Liu, Qianyuan Sun, Fagen Li. A combined public-key scheme in the case of attribute-based for wireless body area networks. Wireless Networks, 2019, 25(2):845-859, Springer. |
[75] |
Alzubair Hassan, Anyembe Andrew Omala, Mohamed Ali, Chunhua Jin, Fagen Li. Identity-based user authenticated key agreement protocol for multi-server environment with anonymity. Mobile Networks and Applications, 2019, 24(3): 890-902, Springer. |
[74] |
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 2019,98:165-172, Elsevier. |
[73] |
Ikram Ali, Mwitende Gervais, Emmanuel Ahene, Fagen Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 2019,99: 101636, Elsevier. |
[72] |
Mwitende Gervais, Liang Sun, Ke Wang, and Fagen Li. Certificateless authenticated key agreement for decentralized WBANs. Frontiers in Cyber Security (FCS 2019), CCIS 1105, pp. 268-290, 2019. |
[71] |
Emmanuel Ahene, Yuanfeng Guan, Zhiwei Zhang, Fagen Li. CLIBDA: A deniable authentication scheme for pervasive computing environment. Frontiers in Cyber Security (FCS 2019), CCIS 1105, pp. 67-83, 2019. |
2018年 |
|
[70]
|
Fagen Li, Yanan Han, Chunhua Jin. Cost-effective and anonymous access control for wireless body area networks. IEEE Systems Journal, 2018, 12(1):747-758, IEEE. |
[69] |
Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala. Practical deniable authentication for pervasive computing environments. Wireless Networks, 2018, 24 (1): 139-149, Springer. |
[68] |
刘波,周雨阳,胡飞,李发根.适用于移动客户端--多服务器环境的用户认证与密钥协商协议.密码学报. 2018, 5 (2): 111-125. |
[67] |
Xiaoguang Liu, Chunhua Jin, Fagen Li. An improved two-layer authentication scheme for wireless body area networks. Journal of Medical Systems, 2018, 42:143, Springer. |
[66] |
Anyembe Andrew Omala, Angolo Shem Mbandu, Kamenyi Domenic Mutiria, Chunhua Jin, Fagen Li. Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems, 2018, 42:108, Springer. |
[65] |
Yuyang Zhou, Zhaoqi Li, Fei Hu, Fagen Li. Identity-based combined public key schemes for signature, encryption and signcryption. Information Technology and Applied Mathematics, AISC 699, pp. 3-22, Springer-Verlag, 2018. |
[64] |
Anyembe Andrew Omala, Ikram Ali, Fagen Li. Heterogeneous signcryption with keyword search for wireless body area network Internet of Things. Security and Privacy, 1(5):e25, Wiley, 2018. |
[63] |
Alzubair Hassan,Nabeil Eltayieb,Rashad Elhabob,Fagen Li. An efficient certificateless user authentication and key exchange protocol for client-server environment. Journal of Ambient Intelligence and Humanized Computing, 2018,9 (6):1713-1727, Springer. |
[62] |
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. Fine-grained attribute-based encryption scheme supporting equality test. International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2018), LNCS 11337, pp.220-233, Springer-Verlag, 2018. |
2017年 |
|
[61]
|
Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala. Efficient certificateless access control for industrial Internet of Things. Future Generation Computer Systems, 2017, 76: 285-292, Elsevier. |
[60]
|
Fagen Li, Bo Liu, Jiaojiao Hong. An efficient signcryption for data access control in cloud computing. Computing, 2017, 99 (5): 465-479, Springer. |
[59] |
Fagen Li, Yanan Han, Chunhua Jin. Certificateless online/offline signcryption for the Internet of things. Wireless Networks, 2017, 23 (1): 145-158, Springer. |
[58] |
Anyembe Andrew Omala,Kittur P. Kibiwott, Fagen Li. An efficient remote authentication scheme for wireless body area network, Journal of Medical Systems, 2017, 41 (2):25, Springer. |
[57] |
Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li. A Provably secure certificateless user authentication protocol for mobile client-server environment. Advances in Internetworking, Data & Web Technologies (EIDWT 2017), LNDECT 6, pp. 592-602, Springer-Verlag, 2017. |
2016年 |
|
[56] |
Fagen Li, Di Zhong, Tsuyoshi Takagi. Efficient deniably authenticated encryption and its application to e-mail. IEEE Transactions on Information Forensics and Security, 2016, 11 (11): 2477-2486, IEEE. |
[55] |
Fagen Li, Jiaojiao Hong. Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal, 2016, 16 (13): 5389-5396, IEEE. |
[54] |
Fagen Li, Yanan Han, Chunhua Jin. Practical access control for sensor networks in the context of the Internet of things. Computer Communications, 2016, 89-90: 154-164, Elsevier. |
[53] |
Fagen Li, Yanan Han, Chunhua Jin. Practical signcryption for secure communication of wireless sensor networks. Wireless Personal Communications, 2016, 89 (4): 1391-1412, Springer. |
[52] |
Fagen Li, Zhaohui Zheng, Chunhua Jin. Secure and efficient data transmission in the Internet of things. Telecommunication Systems, 2016, 62 (1): 111-122, Springer. |
[51] |
Fagen Li, Zhaohui Zheng, Chunhua Jin. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommunication Systems, 2016, 62 (4): 625-639, Springer. |
[50] |
Anyembe Andrew Omala, Niyifasha Robert, Fagen Li. A Provably-secure transmission scheme for wireless body area networks. Journal of Medical Systems, 2016, 40: 247, Springer. |
[49] |
韩亚楠,李发根.适用于智能电网的组合公钥密码体制研究.密码学报, 2016, 3(4): 340-351. |
2015年 |
|
[48] |
Weifeng Wu, Fagen Li. An Efficient identity-based deniable authenticated encryption scheme. KSII Transactions on Internet and Information Systems, 2015, 9(5): 1904-1919. |
2014年 |
|
[47] |
Fagen Li, Pan Xiong, Chunhua Jin. Identity-based deniable authentication for ad hoc networks. Computing, 2014, 96 (9): 843-853, Springer. |
2013年 |
|
[46] |
Fagen Li, Hui Zhang, Tsuyoshi Takagi. Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 2013, 7 (3): 420-429, IEEE. |
[45] |
Fagen Li, Pan Xiong. Practical secure communication for integrating wireless sensor networks into the Internet of things. IEEE Sensors Journal, 2013, 13 (10): 3677-3684, IEEE. |
[44] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Certificateless hybrid signcryption. Mathematical and Computer Modelling, 2013, 57 (3-4): 324-343, Elsevier. |
[43] |
Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi. Lattice-based signcryption. Concurrency and Computation: Practice and Experience, 2013, 25 (14): 2112-2122, Wiley. |
[42] |
Fagen Li, Tsuyoshi Takagi. Secure identity-based signcryption in the standard model. Mathematical and Computer Modelling, 2013, 57 (11-12): 2685-2694, Elsevier. |
[41] |
Fagen Li, Tsuyoshi Takagi. Cryptanalysis and improvement of robust deniable authentication protocol. Wireless Personal Communications, 2013, 69 (4): 1391-1398, Springer. |
[40] |
Fagen Li, Mingwu Zhang, Tsuyoshi Takagi. Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 2013, 58(1-2): 196-203, Elsevier. |
2012年 |
|
[39] |
Fagen Li, Muhammad Khurram Khan. A biometric identity-based signcryption scheme. Future Generation Computer Systems, 2012, 28 (1): 306-310, Elsevier. |
[38] |
Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi. Identity-based online/offline signcryption for low power devices. Journal of Network and Computer Applications, 2012, 35(1): 340-347, Elsevier. |
[37] |
Fagen Li, Mingwu Zhang, Tsuyoshi Takagi. Efficient signcryption in the standard model. Concurrency and Computation: Practice and Experience, 2012, 24 (17): 1977-1989, Wiley. |
[36] |
Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi. Further improvement of an identity-based signcryption scheme in the standard model. Computers and Electrical Engineering, 2012, 38 (2): 413-421, Elsevier. |
[35] |
Fagen Li, Di Zhong, Tsuyoshi Takagi. Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 2012, 1(6): 637-640, IEEE. |
2011年 |
|
[34] |
Fagen Li, Yongjian Liao, Zhiguang Qin. Analysis of an identity-based signcryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011, E94-A(1): 268-269. |
[33] |
Fagen Li, Muhammad Khurram Khan. A survey of identity-based signcryption. IETE Technical Review, 2011, 28(3): 265-272. |
[32] |
Fagen Li, Jiang Deng, Tsuyoshi Takagi. An Improved Authenticated Encryption Scheme. IEICE Transactions on Information and Systems, 2011, E94-D(11): 2171-2172. |
[31] |
Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi. Efficient Identity-Based Signcryption in the Standard Model. The Fifth International Conference on Provable Security (ProvSec 2011), LNCS 6980, pp.120-137, Springer-Verlag, 2011. |
2010年 |
|
[30] |
Fagen Li, Zhiguang Qin. Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. IETE Technical Review, 2010, 27(3):266-269. (SCI) |
[29] |
李发根, SHIRASE Masaaki, TAKAGI Tsuyoshi. 对适用于移动通信的代理签名方案的安全性分析. 中国科学:信息科学, 2010, 40(6): 796-800. |
[28] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Cryptanalysis of efficient proxy signature schemes for mobile communication. SCIENCE
|
2009年 |
|
[27] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Certificateless hybrid signcryption. The 5th Information Security Practice and Experience Conference (ISPEC 2009), LNCS 5451, pp.112-123, Springer-Verlag, 2009. |
[26] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Efficient multi-PKG ID-based signcryption for ad hoc networks. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 289-304, Springer-Verlag, 2009. |
[25] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Efficient signcryption key encapsulation without random oracles. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 47-59, Springer-Verlag, 2009. |
[24] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Identity-based hybrid signcryption. Fourth International Conference on Availability, Reliability and Security (ARES 2009), pp. 534-539, IEEE Computer Society, Fukuoka, Japan, 2009. |
[23] |
Fagen Li, Hu Xiong, Yongjian Liao. A generic construction of identity-based signcryption. International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp. 291-295, IEEE Press, San Jose,
|
[22] |
Fagen Li, Hu Xiong, Xuyun Nie. A new multi-receiver ID-based signcryption scheme for group communications. International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp.296-300, IEEE Press, San Jose,
|
2008年 |
|
[21] |
Fagen Li, Xiangjun Xin, Yupu Hu. Identity-based broadcast signcryption, Computer Standards and Interfaces, 2008, 30(1-2):89-94. |
[20] |
Fagen Li, Xiangjun Xin, Yupu Hu. Efficient certificate-based signcryption scheme from bilinear pairings. International Journal of Computers and Applications, 2008, 30(2):129-133. |
[19] |
Fagen Li, Shijie Zhou, Rong Sun. Cryptanalysis of an identity based proxy multi-signature scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008, E91-A(7):1820-1823. |
[18] |
Fagen Li, Xiangjun Xin, Yupu Hu. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks, 2008, 3(3):206-215. |
[17] |
Fagen Li, Chunxiang Xu, Shijie Zhou. Improvement of a proactive threshold signcryption scheme. International Journal of Computers and Applications, 2008, 30(4):345-347. |
[16] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. On the security of online/offline signatures and multisignatures from ACISP’06. The 7th International Conference on Cryptology and Network Security (CANS 2008), LNCS 5339, pp. 108-119, Springer-Verlag, 2008. |
[15] |
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Key management using certificateless public key cryptography in ad hoc networks. IFIP International Conference on Network and Parallel Computing (NPC 2008), LNCS 5245, pp.116-126, Springer-Verlag, 2008. |
[14] |
Fagen Li, Yong Yu. An efficient and provably secure ID-based threshold signcryption scheme. International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.547-551, IEEE Press, Chengdu,
|
[13] |
Fagen Li, Hu Xiong, Yong Yu. An efficient ID-based ring signcryption scheme. International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.542-546, IEEE Press, Chengdu,
|
2007年 |
|
[12] |
Fagen Li, Yupu Hu. Security analysis of the pomykala-barabasz scheme. Fundamenta Informaticae, 2007, 80(4):453-462. |
[11] |
Fagen Li, Xiangjun Xin, Yupu Hu. A pairing-based signcryption scheme using self-certified public keys, International Journal of Computers and Applications, 2007, 29(3): 278-282. |
[10] |
Fagen Li, Xiangjun Xin, Yupu Hu. Key management in ad hoc networks using self-certified publey system, International Journal of Mobile Communication, 2007, 5(1):94-106. |
[9] |
Fagen Li, Yupu Hu, Chuanrong Zhang. An identity-based signcryption scheme for multi-domain ad hoc networks. 5th International Conference on Applied Cryptography and Network Security (ACNS 2007), LNCS 4521, pp. 373-384, Springer-Verlag, 2007. |
[8] |
Fagen Li, Yupu Hu, Shuanggen Liu. ID-based (t, n) threshold proxy signcryption for multi-agent systems. International Conference on Computational Intelligence and Security (CIS 2006), Revised Selected Papers, LNAI 4456, pp.406-416, Springer-Verlag, 2007. |
[7] |
Fagen Li, Chunxiang Xu. An improved identity-based KCDSA signcryption scheme. The First International Symposium on Data, Privacy, & E-Commerce (ISDPE 2007), pp. 230-232, IEEE Computer Society, 2007. |
2006年 |
|
[6] |
李发根,胡予濮,李刚.一个高效的基于身份的签密方案.计算机学报,2006, 29(9):1641-1647. |
[5] |
Fagen Li, Xiangjun Xin, Yupu Hu. ID-based signcryption scheme with (t, n) shared unsigncryption. International Journal of Network Security, 2006, 3(2):155-159. |
[4] |
Fagen Li, Yupu Hu, Jie Chen. Efficient ID-based signcryption scheme for multiple recipients. The 5th International Workshop for Applied PKC (IWAP 2006), Dalian,
|
[3] |
Fagen Li, Yupu Hu, Shuanggen Liu. Security analysis of two ID-based threshold proxy signature schemes. The 5th International Workshop for Applied PKC (IWAP 2006), Dalian,
|
[2] |
Fagen Li, Yupu Hu, Jie Chen. Efficient and provably secure signcryption scheme from bilinear pairings. The 9th
|
2005年 |
|
[1] |
Fagen Li, Juntao Gao, Yupu Hu. ID-based threshold unsigncryption scheme from pairings. SKLOIS Conference on Information Security and Cryptology (CISC 2005), LNCS 3822, pp. 242-253, Springer-Verlag, 2005. |
科研项目 |
|
[19] |
国家自然科学基金面上项目:适用于标识密码的逆向防火墙设计与分析,2023.01-2026.12 |
[18] |
国家重点研发计划子任务:多模态数据同步一致性检测模型研究,2022.10-2025.09 |
[17] |
四川省科技厅重点研发项目:适用于无人机安全通信的异构密码体制研究,2021.04-2023.03 |
[16] |
四川省科技厅成果转化项目:基于同态加密的漏洞扫描系统研发与产业化,2022.01-2023.12(合作单位负责人) |
[15] |
横向项目:公钥密码软件包升级研制,2021.06-2022.12 |
[14] |
横向项目:全同态密码GPU加速适配开发与性能测试,2020.04-2020.12 |
[13] |
国家自然科学基金面上项目:密码逆向防火墙研究,2019.01-2019.12 |
[12] |
内江市科技局院(校)科技合作项目:安全可信私有云平台的研发与示范应用,2018.01-2019.12 |
[11] |
江苏省物联网移动互联技术工程重点实验室:无线体域网中的安全与隐私保护技术研究,2017.09-2019.08 |
[10] |
国家电网公司科学技术项目:提升信息系统可靠性保障能力应用研究,2017.01-2018.12(合作单位负责人) |
[9] |
中央高校基本科研业务费项目:异构密码体制研究,2017.01-2018.12 |
[8] |
国家自然科学基金面上项目:组合公钥密码体制的设计与安全性分析,2013.01-2016.12 |
[7] |
中央高校基本科研业务费项目:多密码算法协同应用的密钥安全性研究,2014.01-2015.12 |
[6] |
国家自然科学基金面上项目:混合密码体制的设计与形式化分析,2011.01-2013.12 |
[5] |
中央高校基本科研业务费项目:后量子签密体制的设计与安全性分析,2010.01-2011.12 |
[4] |
网络安全与密码技术重点实验室(福建师大)开放课题:混合签密体制的设计与安全性分析,2009.04-2011.03 |
[3] |
国家自然科学基金青年项目:可证明安全的签密体制研究,2009.01-2011.12 |
[2] |
信息安全国家重点实验室开放课题:基于双线性对的签密体制研究,2008.07-2010.06 |
[1] |
计算机网络与信息安全教育部重点实验室(西电)开放课题:基于身份的签密体制及其在Ad-Hoc网络中的应用.2007.12-2009.11 |
专利申请 |
|
[13] |
李发根,智妍妍,胡哲彬,欧阳梦迪.一种适用于一轮三方密钥协商的密码逆向防火墙方法,2021.06.01,中国,专利号: ZL202010152919.8 |
[12] |
李发根,周雨阳. 一种适用于无证书加密的密码逆向防火墙方法, 2021.08.06, 中国,专利号: ZL202010152920.0 |
[11] |
李发根, 胡哲彬, 欧阳梦迪,智妍妍. 一种适用于代理重加密的密码逆向防火墙方法, 2021.08.06, 中国,专利号: ZL202010152902.2. |
[10] |
李发根, 胡哲彬, 智妍妍, 欧阳梦迪. 一种适用于可搜索加密的密码逆向防火墙方法. 2021.08.06, 中国,专利号: ZL202010152905.6. |
[9] |
李发根, 欧阳梦迪, 智妍妍, 胡哲彬. 一种基于身份的数字签名密码逆向防火墙方法. 2021.08.06, 中国,专利号: ZL202010153556.X. |
[8] |
李发根,代强,郑啸宇,罗朝园,翟一晓. 一种基于无证书代理重加密的云数据去重方法, 2021.02.02,中国,专利号: ZL201910384969.6. |
[7] |
李发根,周雨阳,李朝琦,范泽宇. 一种无证书数字签名方法, 2020.08.11, 中国,专利号: ZL201810964271.7. |
[6] |
李发根,代强,范泽宇,罗朝园,王欣洲. 一种基于隐藏策略CP-ABE的高效可搜索访问控制方法, 2020.09.25, 中国,专利号: ZL201910375697.3 |
[5] |
李发根,代强,朱梦迪,罗朝园,秦张弛. 一种高效无证书公钥加密方法, 2020.10.23, 中国,专利号: ZL201910348509.8 |
[4] |
李发根,郑朝慧,洪娇娇,韩亚楠. 一种基于组合密码的无线传感器网络安全通信的方法, 2019.2.15,中国,专利号: ZL201510575668.3. |
[3] |
李发根,韩亚楠,洪娇娇,郑朝慧. 一种基于组合密码的智能电网安全通信方法, 2018.11.13,中国,专利号: ZL201510575551.5. |
[2] |
李发根,吴威峰. 一种从无证书环境到基于身份环境的签密方法, 2017.10.17,中国, 专利号: ZL201410495127.5. |
[1] |
李发根,吴威峰.一种从基于身份环境到无证书环境的签密方法, 2017.10.17,中国, 专利号: ZL201410490400.5. |
学术服务 |
|
Editor |
|
1. |
Journal of Systems Architecture, Elsevier, CCF B类期刊 |
Leading Co-Editor |
|
1. |
Special Issue on New Frontiers in Cyber Security, Journal of Information Security and Applications |
Program Co-Chair |
|
1. |
The International Conference on Frontiers in Cyber Security (FCS), 2018/2022 |
2. |
International Conference on Information Technology and Applied Mathematics (ICITAM 2017) |
PC Members |
|
1. |
International Conference on Mathematics and Computing (ICMC), 2017/2018/2019/2020/2021/2022/2023 |
2. |
International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP ), 2021/2022 |
3. |
Asia Joint Conference on Information Security (AsiaJCIS), 2014/2016/2017/2018/2019 |
4. |
International Conference on Provable Security (Provable Security), 2012/2017 |
5. |
International Conference on Frontiers in Cyber Security (FCS), 2019/2020/2021 |
6. |
IEEE International Conference on Smart City and Informatization (iSCI), 2019/2020 |
7. |
Annual International Conference on Privacy, Security, and Trust (PST), 2018/2019 |
8. |
International Conference on Information Technology and Applied Mathematics (ICITAM), 2017/2019 |
9. |
International Workshop on Smart Sensing and Computing (IWSSC), 2018 |
10. |
International Conference on Parallel and Distributed Systems (ICPADS), 2018 |
11. |
IEEE Conference on Dependable and Secure Computing (DSC), 2018 |
12. |
International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT), 2013/2014/2017 |
13. |
Chinese Conference on Trusted Computing and Information Security (CTCIS), 2017 |
14. |
International Conference on Internet of Things and Machine Learning (IML), 2017 |
15. |
International Workshop on Cyber Security(CS), 2015 |
16. |
ACM Asia Public-Key Cryptography Workshop (AsiaPKC), 2013 |