扫描手机二维码

欢迎您的访问
您是第 位访客

开通时间:..

最后更新时间:..

  • 李发根 ( 教授 )

    的个人主页 http://faculty.uestc.edu.cn/lifagen/zh_CN/index.htm

  •   博士生导师

科学研究 当前位置: 中文主页 >> 科学研究
  •  


    发表的论文

    2023

    [106]

     

    Zhan Xie, Yong Chen, Ikram Ali, Chengwei Pan, Fagen Li, Wen He. Efficient and secure certificateless signcryption without pairing for edge computing-based internet of vehicles. IEEE Transactions on Vehicular Technology, 2023,72(5): 5642-5653.

    [105]

     

    Yuyang Zhou, Zhebin Hu, Fagen Li. Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Transactions on Cloud Computing, 2023, 11(1) :383-396, IEEE.

    [104]

     

    Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li. A group key agreement protocol based on ECDH and short signature. Journal of Information Security and Applications, 2023, 72:103388, Elsevier.

    2022

    [103]

     

    Ling Xiong, Fagen Li, Mingxing He, Zhicai Liu, Tu Peng. An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services. IEEE Transactions on Cloud Computing, 2022,10(4): 2309-2323, 

    [102]

     

    Xiangyu Pan, Yuqiao Jin, Ziqing Wang, Fagen Li. A pairing-free heterogeneous signcryption scheme for unmanned aerial vehicles. IEEE Internet of Things Journal,2022, 9(19):19426-19437, IEEE.

    [101]

     

    Yuyang Zhou,Liang Zhao,Yuqiao Jin, Fagen Li. Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Information Sciences,2022, 604:80-96, Elsevier.

    [100]

    Ziqing Wang, Zeyu Yang, Fagen Li. A two rounds dynamic authenticated group key agreement protocol based on LWE. Journal of Systems Architecture,2022, 133: 102756, Elsevier.

    [99]

    Mohammed Raouf Senouci, Ilyas Benkhaddra, Abdelkader Senouci, Fagen Li. A provably secure free-pairing certificateless searchable encryption scheme.Telecommunication Systems, 2022, 80: 383-395, Springer. 

    [98]

    Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher. A computationally efficient HMAC-based authentication scheme for network coding.Telecommunication Systems,2022,79(1):47-69, Springer.

    2021

    [97]

     

    Xuyang Ding, Shuai Zhang, Mengkai Song, Xiaocong Ding, Fagen Li. Towards invisible adversarial examples against DNN-based privacy leakage for Internet of things. IEEE Internet of Things Journal, 2021, 8(2): 802-812, IEEE

    [96]

    Nabeil Eltayieb,Rashad Elhabob,Alzubair Hassan,Fagen Li. Secure mobile health system supporting search function and decryption verification. Journal of Ambient Intelligence and Humanized Computing,2021,12(2), 2221-2231, Springer.

    [95]

    Ziqing Wang, Dianhua Tang, Haomiao Yang, Fagen Li. A public key encryption scheme based on a new variant of LWE with small cipher size. Journal of Systems Architecture, 2021, 117: 102165, Elsevier.

    [94]

    Tandoh Lawrence, Fagen Li, Ikram Ali, Michael Y. Kpiebaareh, Charles R. Haruna, Tandoh Christopher. An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification. Journal of Systems Architecture, 2021, 116: 102051, Elsevier.

    [93]

    Mengdi Ouyang, Ziqing Wang, Fagen Li. Digital signature with cryptographic reverse firewalls. Journal of Systems Architecture, 2021, 116: 102029, Elsevier.

    [92]

    Xiangyu Pan, Fagen Li. Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. Journal of Systems Architecture, 2021,115: 102075, Elsevier.

    2020

    [91]

     

    Ikram Ali, Tandoh Lawrence, Anyembe Andrew Omala, Fagen Li. An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs. IEEE Transactions on Vehicular Technology, 2020, 69(10): 11266-11280, IEEE

    [90]

    Fagen Li, Jiye Wang,Yuyang Zhou,Chunhua   Jin, SK Hafizul Islam. A heterogeneous user authentication and key establishment for mobile client-server environment.Wireless Networks, 2020, 26(2):913-924, Springer.

    [89]

    Ikram Ali, Fagen Li. An efficient conditional privacy-preserving authentication scheme for vehicle-to-infrastructure communication in VANETs.Vehicular Communications, 2020,22:100228, Elsevier.

    [88]

    Ikram Ali, Tandoh Lawrence, Fagen Li. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs. Journal of Systems Architecture, 2020,103:101692, Elsevier.

    [87]

    Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 2020,102:101653, Elsevier.

    [86]

    Yuyang Zhou, Jing Guo, Fagen Li. Certificateless public key encryption with cryptographic reverse firewalls. Journal of Systems Architecture, 2020,109:101754, Elsevier.

    [85]

    Tandoh Lawrence, Ikram Ali, Tandoh Christopher, Fagen Li. A bandwidth efficient HMAC-based authentication scheme for network coding. Journal of Information Security and Applications, 2020, 55: 102658. 

    [84]

    Mwitende Gervais, Ikram Ali, Nabeil Eltayieb, Baocang Wang, Fagen Li. Authenticated key agreement for blockchain-based WBAN. Telecommunication Systems, 2020,74:347-365, Springer

    [83]

    Gervais Mwitende, Yalan Ye, Ikram Ali, Fagen Li. Certificateless authenticated key agreement for blockchain-based WBANs. Journal of Systems Architecture, 2020,110:101777.

    [82]

    Xiaoyu Zheng, Yuyang Zhou, Yalan Ye, Fagen Li. A cloud data deduplication scheme based on certificateless proxy re-encryption. Journal of Systems Architecture, 20 20,102:101666, Elsevier.

    2019

    [81]

     

    Emmanuel Ahene, Zhangchi Qin, Akua Konadu Adusei, Fagen Li. Efficient signcryption with proxy re-encryption and its application in smart grid. IEEE Internet of Things Journal, 2019, 6(6):9722-9737, IEEE. 

    [80]

    Ikram Ali, Alzubair Hassan, Fagen Li. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 2019,16: 45-61, Elsevier.

    [79]

    Emmanuel Ahene, Chunhua Jin, Fagen Li. Certificateless deniably authenticated encryption and its application to e-voting system. Telecommunication Systems, 2019,70 (3):417-434, Springer.

    [78]

    Emmanuel Ahene, Junfeng Dai, Hao Feng, Fagen Li. A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid. Telecommunication Systems, 2019, 70(4): 491-510, Springer.

    [77]

    Erneste Uwizeye, Jiye Wang, Zhihua Cheng, Fagen Li. Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Annals of Telecommunications, 2019, 74(7-8): 435-449, Springer

    [76]

    Jiaojiao Hong, Bo Liu, Qianyuan Sun, Fagen Li. A combined public-key scheme in the case of attribute-based for wireless body area networks. Wireless Networks, 2019, 25(2):845-859, Springer.

    [75]

    Alzubair Hassan, Anyembe Andrew Omala, Mohamed Ali, Chunhua Jin, Fagen Li. Identity-based user authenticated key agreement protocol for multi-server environment with   anonymity. Mobile Networks and Applications, 2019, 24(3): 890-902, Springer.

    [74]

    Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 2019,98:165-172, Elsevier.

    [73]

    Ikram Ali, Mwitende Gervais, Emmanuel Ahene, Fagen Li. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. Journal of Systems Architecture, 2019,99: 101636, Elsevier. 

    [72]

    Mwitende Gervais, Liang Sun, Ke Wang, and Fagen Li. Certificateless authenticated key agreement for decentralized WBANs. Frontiers in Cyber Security (FCS 2019), CCIS 1105, pp. 268-290, 2019.

    [71]

    Emmanuel Ahene, Yuanfeng Guan, Zhiwei Zhang, Fagen Li. CLIBDA: A deniable authentication scheme for pervasive computing environment. Frontiers in Cyber Security (FCS 2019), CCIS 1105, pp. 67-83, 2019.

    2018

    [70]

     

    Fagen Li, Yanan Han, Chunhua Jin. Cost-effective and anonymous access control for wireless body area networks. IEEE Systems Journal, 2018, 12(1):747-758, IEEE.

    [69]

    Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala. Practical deniable authentication for pervasive computing environments. Wireless Networks, 2018, 24 (1): 139-149, Springer.

    [68]

    刘波,周雨阳,胡飞,李发根.适用于移动客户端--多服务器环境的用户认证与密钥协商协议.密码学报. 2018, 5 (2): 111-125.

    [67]

    Xiaoguang Liu, Chunhua Jin, Fagen Li. An improved two-layer authentication scheme for wireless body area networks. Journal of Medical Systems, 2018, 42:143, Springer.

    [66]

    Anyembe Andrew Omala, Angolo Shem Mbandu, Kamenyi Domenic Mutiria, Chunhua Jin, Fagen Li. Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems, 2018, 42:108, Springer.

    [65]

    Yuyang Zhou, Zhaoqi Li, Fei Hu, Fagen Li. Identity-based combined public key schemes for signature, encryption and signcryption. Information Technology and Applied Mathematics, AISC 699, pp. 3-22, Springer-Verlag, 2018.

    [64]

    Anyembe Andrew Omala, Ikram Ali, Fagen Li. Heterogeneous signcryption with keyword search for wireless body area network Internet of Things. Security and Privacy, 1(5):e25, Wiley, 2018.

    [63]

    Alzubair Hassan,Nabeil Eltayieb,Rashad Elhabob,Fagen Li. An efficient certificateless user authentication and key exchange protocol for client-server environment. Journal of Ambient Intelligence and Humanized Computing, 2018,9 (6):1713-1727, Springer.

    [62]

    Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li. Fine-grained attribute-based encryption scheme supporting equality test. International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2018), LNCS 11337, pp.220-233, Springer-Verlag, 2018.

    2017

    [61]

     

    Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala. Efficient certificateless access control for industrial Internet of Things. Future Generation Computer Systems, 2017, 76: 285-292, Elsevier.

    [60]

     

    Fagen Li, Bo Liu, Jiaojiao Hong. An efficient signcryption for data access control in cloud computing. Computing, 2017, 99 (5): 465-479, Springer.

    [59]

    Fagen Li, Yanan Han, Chunhua Jin. Certificateless online/offline signcryption for the Internet of things. Wireless Networks, 2017, 23 (1): 145-158, Springer.

    [58]

    Anyembe Andrew   Omala,Kittur P. Kibiwott, Fagen Li. An efficient remote authentication scheme for wireless body area network, Journal of Medical Systems, 2017, 41 (2):25, Springer.

    [57]

    Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li. A Provably secure certificateless user authentication protocol for mobile client-server environment. Advances in Internetworking, Data & Web Technologies (EIDWT 2017), LNDECT 6, pp. 592-602, Springer-Verlag, 2017.

    2016

    [56]

    Fagen Li, Di Zhong, Tsuyoshi Takagi. Efficient deniably authenticated encryption and its application to e-mail. IEEE Transactions on Information Forensics and Security, 2016, 11 (11): 2477-2486, IEEE.

    [55]

    Fagen Li, Jiaojiao Hong. Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal, 2016, 16 (13): 5389-5396, IEEE.

    [54]

    Fagen Li, Yanan Han, Chunhua Jin. Practical access control for sensor networks in the context of the Internet of things. Computer Communications, 2016, 89-90:   154-164, Elsevier.

    [53]

    Fagen Li, Yanan Han, Chunhua Jin. Practical signcryption for secure communication of wireless sensor networks. Wireless Personal Communications, 2016, 89 (4): 1391-1412, Springer.

    [52]

    Fagen Li, Zhaohui Zheng, Chunhua Jin. Secure and efficient data transmission in the Internet of things. Telecommunication Systems, 2016, 62 (1): 111-122, Springer.

    [51]

    Fagen Li, Zhaohui Zheng, Chunhua Jin. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommunication Systems, 2016, 62 (4): 625-639, Springer.

    [50]

    Anyembe Andrew Omala, Niyifasha Robert, Fagen Li. A Provably-secure transmission scheme for wireless body area networks. Journal of Medical Systems, 2016, 40: 247, Springer.

    [49]

    韩亚楠,李发根.适用于智能电网的组合公钥密码体制研究.密码学报, 2016, 3(4): 340-351.

    2015

    [48]

    Weifeng Wu, Fagen Li. An Efficient identity-based deniable authenticated encryption scheme. KSII Transactions on Internet and Information Systems, 2015, 9(5): 1904-1919.

    2014

    [47]

    Fagen Li, Pan Xiong, Chunhua Jin. Identity-based deniable authentication for ad hoc networks. Computing, 2014, 96 (9): 843-853, Springer.

    2013

    [46]

    Fagen Li, Hui Zhang, Tsuyoshi Takagi. Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 2013, 7 (3): 420-429, IEEE.

    [45]

    Fagen Li, Pan Xiong. Practical secure communication for integrating wireless sensor networks into the Internet of things. IEEE Sensors Journal, 2013, 13 (10): 3677-3684, IEEE.

    [44]

    Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Certificateless hybrid signcryption. Mathematical and Computer Modelling, 2013, 57 (3-4): 324-343, Elsevier.

    [43]

    Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi. Lattice-based signcryption. Concurrency and Computation: Practice and Experience, 2013, 25 (14): 2112-2122, Wiley.

    [42]

    Fagen Li, Tsuyoshi Takagi. Secure identity-based signcryption in the standard model. Mathematical and Computer Modelling, 2013, 57 (11-12): 2685-2694,   Elsevier.

    [41]

    Fagen Li, Tsuyoshi Takagi. Cryptanalysis and improvement of robust deniable authentication protocol. Wireless Personal Communications, 2013, 69 (4): 1391-1398, Springer.

    [40]

    Fagen Li, Mingwu Zhang, Tsuyoshi Takagi. Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 2013, 58(1-2): 196-203, Elsevier.

    2012

    [39]

    Fagen Li, Muhammad Khurram Khan. A biometric identity-based signcryption scheme. Future Generation Computer Systems, 2012, 28 (1): 306-310, Elsevier.

    [38]

    Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi. Identity-based online/offline signcryption for low power devices. Journal of Network and Computer Applications, 2012, 35(1): 340-347, Elsevier.

    [37]

    Fagen Li, Mingwu Zhang, Tsuyoshi Takagi. Efficient signcryption in the standard model. Concurrency and Computation: Practice and Experience, 2012, 24 (17): 1977-1989, Wiley.

    [36]

    Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi. Further improvement of an identity-based signcryption scheme in the standard model. Computers and Electrical Engineering, 2012, 38 (2): 413-421, Elsevier.

    [35]

    Fagen Li, Di Zhong, Tsuyoshi Takagi. Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 2012, 1(6): 637-640, IEEE.

    2011

    [34]

    Fagen Li, Yongjian Liao, Zhiguang Qin. Analysis of an identity-based signcryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011, E94-A(1): 268-269.

    [33]

    Fagen Li, Muhammad Khurram Khan. A survey of identity-based signcryption. IETE Technical Review, 2011, 28(3): 265-272.

    [32]

    Fagen Li, Jiang Deng, Tsuyoshi Takagi. An Improved Authenticated Encryption Scheme. IEICE Transactions on Information and Systems, 2011, E94-D(11): 2171-2172.

    [31]

    Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi. Efficient Identity-Based Signcryption in the Standard Model. The Fifth International Conference on Provable Security (ProvSec 2011), LNCS 6980, pp.120-137, Springer-Verlag,   2011.

    2010

    [30]

    Fagen Li, Zhiguang Qin. Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem. IETE Technical Review, 2010, 27(3):266-269. (SCI)

    [29]

    李发根, SHIRASE Masaaki, TAKAGI Tsuyoshi. 对适用于移动通信的代理签名方案的安全性分析. 中国科学:信息科学, 2010, 40(6):   796-800.

    [28]

    Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Cryptanalysis of efficient proxy signature schemes for mobile communication. SCIENCE CHINA Information Sciences, 2010, 53(10):2016-2021.

    2009

    [27]

    Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Certificateless hybrid signcryption. The 5th Information Security Practice and Experience Conference (ISPEC 2009),   LNCS 5451, pp.112-123, Springer-Verlag, 2009.

    [26]

    Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Efficient multi-PKG ID-based signcryption for ad hoc networks. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 289-304,   Springer-Verlag, 2009.

    [25]

    Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Efficient signcryption key encapsulation without random oracles. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 47-59, Springer-Verlag, 2009.

    [24]

    Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Identity-based hybrid signcryption. Fourth International Conference on Availability, Reliability and Security (ARES 2009), pp. 534-539, IEEE Computer Society, Fukuoka, Japan, 2009.

    [23]

    Fagen Li, Hu Xiong, Yongjian Liao. A generic construction of identity-based signcryption. International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp. 291-295, IEEE Press, San Jose, USA , 2009.

    [22]

    Fagen Li, Hu Xiong, Xuyun Nie. A  new multi-receiver ID-based signcryption scheme for group communications. International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp.296-300, IEEE Press, San Jose, USA , 2009.

    2008

    [21]

    Fagen Li, Xiangjun Xin, Yupu Hu. Identity-based broadcast signcryption, Computer Standards and Interfaces, 2008, 30(1-2):89-94.

    [20]

    Fagen Li, Xiangjun Xin, Yupu Hu. Efficient certificate-based signcryption scheme from bilinear pairings. International Journal of Computers and Applications, 2008, 30(2):129-133.

    [19]

    Fagen Li, Shijie Zhou, Rong Sun. Cryptanalysis of an identity based proxy multi-signature scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008, E91-A(7):1820-1823.

    [18]

    Fagen Li, Xiangjun Xin, Yupu Hu. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks, 2008,   3(3):206-215.

    [17]

    Fagen Li, Chunxiang Xu, Shijie Zhou. Improvement of a proactive threshold signcryption scheme. International Journal of Computers and Applications, 2008, 30(4):345-347.

    [16]

    Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. On the security of online/offline signatures and multisignatures from ACISP’06. The 7th International Conference on Cryptology and Network Security (CANS 2008), LNCS 5339, pp. 108-119, Springer-Verlag, 2008.

    [15]

    Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Key management using certificateless public key cryptography in ad hoc networks. IFIP International Conference on Network and Parallel Computing (NPC 2008), LNCS 5245, pp.116-126, Springer-Verlag, 2008.

    [14]

    Fagen Li, Yong Yu. An efficient   and provably secure ID-based threshold signcryption scheme. International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.547-551, IEEE Press, Chengdu, China , 2008.

    [13]

    Fagen Li, Hu Xiong, Yong Yu. An efficient ID-based ring signcryption scheme. International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.542-546, IEEE Press, Chengdu, China , 2008.

    2007

    [12]

    Fagen Li, Yupu Hu. Security analysis of the pomykala-barabasz scheme. Fundamenta Informaticae, 2007, 80(4):453-462.

    [11]

    Fagen Li, Xiangjun Xin, Yupu Hu. A pairing-based signcryption scheme using self-certified public keys, International Journal of Computers and Applications, 2007,  29(3): 278-282.

    [10]

    Fagen Li, Xiangjun Xin, Yupu Hu. Key management in ad hoc networks using self-certified publey system, International Journal of Mobile Communication, 2007, 5(1):94-106.

    [9]

    Fagen Li, Yupu Hu, Chuanrong   Zhang. An identity-based signcryption scheme for multi-domain ad hoc networks. 5th International Conference on Applied Cryptography and Network Security (ACNS 2007), LNCS 4521, pp. 373-384, Springer-Verlag, 2007.

    [8]

    Fagen Li, Yupu Hu, Shuanggen Liu. ID-based (t, n) threshold proxy signcryption for multi-agent systems. International Conference on Computational   Intelligence and Security (CIS 2006), Revised Selected Papers, LNAI 4456, pp.406-416, Springer-Verlag, 2007.

    [7]

    Fagen Li, Chunxiang Xu. An improved identity-based KCDSA signcryption scheme. The First International Symposium on Data, Privacy, & E-Commerce (ISDPE 2007), pp. 230-232, IEEE   Computer Society, 2007.

    2006

    [6]

    李发根,胡予濮,李刚.一个高效的基于身份的签密方案.计算机学报,2006, 29(9):1641-1647.

    [5]

    Fagen Li,   Xiangjun Xin, Yupu Hu. ID-based signcryption scheme with (t, n) shared unsigncryption. International Journal of Network Security, 2006,   3(2):155-159.

    [4]

    Fagen Li, Yupu Hu, Jie Chen. Efficient ID-based signcryption scheme for multiple recipients. The 5th International Workshop for Applied PKC (IWAP 2006), Dalian, China , pp. 1-12, 2006.

    [3]

    Fagen Li, Yupu Hu, Shuanggen Liu. Security analysis of two ID-based threshold proxy signature schemes. The 5th International Workshop for Applied PKC (IWAP 2006), Dalian, China , pp. 13-20, 2006.

    [2]

    Fagen Li, Yupu Hu, Jie Chen. Efficient and provably secure signcryption scheme from bilinear pairings. The 9th China Cryptography Conference (ChinaCrypt 2006), Jinan, China , pp. 200-207, 2006.

    2005

    [1]

    Fagen Li, Juntao Gao, Yupu Hu. ID-based threshold unsigncryption scheme from pairings. SKLOIS Conference on Information Security and Cryptology (CISC 2005), LNCS 3822, pp. 242-253, Springer-Verlag, 2005.

     


  •  


    科研项目

    [19]

    国家自然科学基金面上项目:适用于标识密码的逆向防火墙设计与分析,2023.01-2026.12

    [18]

    国家重点研发计划子任务:多模态数据同步一致性检测模型研究,2022.10-2025.09

    [17]

    四川省科技厅重点研发项目:适用于无人机安全通信的异构密码体制研究,2021.04-2023.03

    [16]

    四川省科技厅成果转化项目:基于同态加密的漏洞扫描系统研发与产业化,2022.01-2023.12(合作单位负责人)

    [15]

    横向项目:公钥密码软件包升级研制,2021.06-2022.12

    [14]

    横向项目:全同态密码GPU加速适配开发与性能测试,2020.04-2020.12

    [13]

    国家自然科学基金面上项目:密码逆向防火墙研究,2019.01-2019.12

    [12]

    内江市科技局院()科技合作项目:安全可信私有云平台的研发与示范应用,2018.01-2019.12

    [11]

    江苏省物联网移动互联技术工程重点实验室:无线体域网中的安全与隐私保护技术研究,2017.09-2019.08

    [10]

    国家电网公司科学技术项目:提升信息系统可靠性保障能力应用研究,2017.01-2018.12(合作单位负责人)

    [9]

    中央高校基本科研业务费项目:异构密码体制研究,2017.01-2018.12

    [8]

    国家自然科学基金面上项目:组合公钥密码体制的设计与安全性分析,2013.01-2016.12

    [7]

    中央高校基本科研业务费项目:多密码算法协同应用的密钥安全性研究,2014.01-2015.12

    [6]

    国家自然科学基金面上项目:混合密码体制的设计与形式化分析,2011.01-2013.12

    [5]

    中央高校基本科研业务费项目:后量子签密体制的设计与安全性分析,2010.01-2011.12

    [4]

    网络安全与密码技术重点实验室(福建师大)开放课题:混合签密体制的设计与安全性分析,2009.04-2011.03

    [3]

    国家自然科学基金青年项目:可证明安全的签密体制研究,2009.01-2011.12

    [2]

    信息安全国家重点实验室开放课题:基于双线性对的签密体制研究,2008.07-2010.06

    [1]

    计算机网络与信息安全教育部重点实验室(西电)开放课题:基于身份的签密体制及其在Ad-Hoc网络中的应用.2007.12-2009.11



  • 专利申请

    [13]

    李发根,智妍妍,胡哲彬,欧阳梦迪.一种适用于一轮三方密钥协商的密码逆向防火墙方法,2021.06.01,中国,专利号: ZL202010152919.8

    [12]

    李发根,周雨阳. 一种适用于无证书加密的密码逆向防火墙方法, 2021.08.06, 中国,专利号: ZL202010152920.0

    [11]

    李发根, 胡哲彬, 欧阳梦迪,智妍妍. 一种适用于代理重加密的密码逆向防火墙方法, 2021.08.06, 中国,专利号: ZL202010152902.2.

    [10]

    李发根, 胡哲彬, 智妍妍, 欧阳梦迪. 一种适用于可搜索加密的密码逆向防火墙方法. 2021.08.06, 中国,专利号: ZL202010152905.6.

    [9]

    李发根, 欧阳梦迪, 智妍妍, 胡哲彬. 一种基于身份的数字签名密码逆向防火墙方法. 2021.08.06, 中国,专利号: ZL202010153556.X.

    [8]

    李发根,代强,郑啸宇,罗朝园,翟一晓. 一种基于无证书代理重加密的云数据去重方法, 2021.02.02,中国,专利号: ZL201910384969.6.

    [7]

    李发根,周雨阳,李朝琦,范泽宇. 一种无证书数字签名方法, 2020.08.11, 中国,专利号: ZL201810964271.7.

    [6]

    李发根,代强,范泽宇,罗朝园,王欣洲. 一种基于隐藏策略CP-ABE的高效可搜索访问控制方法, 2020.09.25, 中国,专利号: ZL201910375697.3

    [5]

    李发根,代强,朱梦迪,罗朝园,秦张弛. 一种高效无证书公钥加密方法, 2020.10.23, 中国,专利号: ZL201910348509.8

    [4]

    李发根,郑朝慧,洪娇娇,韩亚楠. 一种基于组合密码的无线传感器网络安全通信的方法, 2019.2.15,中国,专利号: ZL201510575668.3.

    [3]

    李发根,韩亚楠,洪娇娇,郑朝慧. 一种基于组合密码的智能电网安全通信方法, 2018.11.13,中国,专利号: ZL201510575551.5.

    [2]

    李发根,吴威峰. 一种从无证书环境到基于身份环境的签密方法, 2017.10.17,中国, 专利号: ZL201410495127.5.

    [1]

    李发根,吴威峰.一种从基于身份环境到无证书环境的签密方法, 2017.10.17,中国, 专利号: ZL201410490400.5.



  •                                                       学术服务

    Editor

    1.

    Journal of Systems Architecture, Elsevier, CCF B类期刊

    Leading Co-Editor

    1.

    Special Issue on New Frontiers in Cyber Security, Journal of Information Security and Applications

    Program Co-Chair

    1.

    The International Conference on Frontiers in Cyber Security (FCS), 2018/2022

    2.

    International Conference on Information Technology and Applied Mathematics (ICITAM 2017)

    PC Members

    1.

    International Conference on Mathematics and Computing (ICMC), 2017/2018/2019/2020/2021/2022/2023

    2.

    International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP ), 2021/2022

    3.

    Asia Joint Conference on Information Security (AsiaJCIS), 2014/2016/2017/2018/2019

    4.

    International Conference on Provable Security (Provable Security), 2012/2017

    5.

    International Conference on Frontiers in Cyber Security (FCS), 2019/2020/2021

    6.

    IEEE International Conference on Smart City and Informatization (iSCI), 2019/2020

    7.

    Annual International Conference on Privacy, Security, and Trust (PST), 2018/2019

    8.

    International Conference on Information Technology and Applied Mathematics (ICITAM), 2017/2019

    9.

    International Workshop on Smart Sensing and Computing (IWSSC), 2018

    10.

    International Conference on Parallel and Distributed Systems (ICPADS), 2018

    11.

    IEEE Conference on Dependable and Secure Computing (DSC), 2018

    12.

    International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT), 2013/2014/2017

    13.

    Chinese Conference on Trusted Computing and Information Security (CTCIS), 2017

    14.

    International Conference on Internet of Things and Machine Learning (IML), 2017

    15.

    International Workshop on Cyber Security(CS), 2015

    16.

    ACM Asia Public-Key Cryptography Workshop (AsiaPKC), 2013




     

  • 暂无内容
  • 暂无内容
  • 暂无内容
  • 暂无内容
  • 暂无内容
清水河校区:成都市高新区(西区)西源大道2006号 邮编: 611731  
沙河校区:成都市建设北路二段四号 邮编:610054
蜀ICP备 05006379 号   I 川公网安备 51019002000280 号