河海大学计算机科学与技术博士生导师李继国简介

2014-07-14 09:04:00来源:网络

主要论文论著:

[1] Jiguo Li, Zhiwei Wang, Yichen Zhang. Provably Secure Certificate-Based Signature Scheme without Pairings. Information Sciences, 2013, 233(6): 313-320. DOI information: 10.1016/j.ins.2013.01.013 (SCI, IDS Number: 125NI, 5-Year Impact Factor: 2.984,中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊)

[2] Jiguo Li, Haiting Du, Yichen Zhang, Tao Li, and Yuexin Zhang. Provably Secure Certificate-based Key-Insulated Signature Scheme. Concurrency and Computation Practice and Experience, 2013. DOI: 10.1002/cpe.3019(SCI, Impact Factor: 0.845)

[3] Huiling Qian, Jiguo Li and Yichen Zhang. Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. ICICS 2013, S. Qing et al. (Eds.): ICICS 2013, LNCS 8233, pp. 363–372, 2013. (中国计算机学会推荐国际学术刊物与会议(信息安全)C类会议)

[4] Jiguo Li, Yanqiong Li and Yichen Zhang. Provably Secure Forward Secure Certificateless Proxy Signature Scheme. KSII Transactions on Internet and Information Systems, 2013, 7(8): 1972-1988. (SCI, Impact Factor: 0.560)

[5] Ji Yao, Jiguo Li and Yichen Zhang. Certificate-Based Encryption Scheme without Pairing. KSII Transactions on Internet and Information Systems, 2013, 7(6): 1480-1491. (SCI, Impact Factor: 0.560)

[6] Lu Yang and Li Jiguo. New forward-secure public-key encryption without random oracles. International Journal of Computer Mathematics. 2013, DOI: 10.1080/00207160.2013.807915(SCI, Impact Factor: 0.542)

[7] Lu Yang and Li Jiguo. Efficient Certificate-Based Encryption Scheme Secure against Key Replacement Attacks in the Standard Model. Journal of Information Science and Engineering. 2013, Accepted. (SCI, Impact Factor: 0.299)

[8] Jiguo Li, Yanqiong Li and Yichen Zhang. Forward Secure Certificateless Proxy Signature Scheme. J. Lopez, X. Huang, and R. Sandhu (Eds.): NSS 2013, LNCS 7873, pp. 350-364, 2013.

[9] Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu. An Efficient Short Certificate-based Signature Scheme. Journal of Systems and Software, 2012, 85(2): 314-322. DOI: http://dx.doi.org/10.1016/j.jss.2011.08.014 (SCI: 893WH, 5-Year Impact Factor: 1.117, 中国计算机学会推荐国际学术刊物(软件工程方向)中的B类期刊)

[10] Jiguo Li, Xinyi Huang, Meixue Hong,Yichen Zhang. Certificate-based Signcryption with Enhanced Security Features. Computers and Mathematics with Applications. 2012, 64(6) : 1587-1601, http://dx.doi.org/10.1016/j.camwa.2012.01.006 (SCI, 012PD, 5-Year Impact Factor: 1.643)

[11] Zhang Yichen, Li Jiguo, Sun Chuanming. An Efficient Property-based Remote Attestation Scheme. China Communication, 2012,(10): 1-9 (SCI)

[12] Jiguo Li, Yichen Zhang and Huiyun Teng. A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. Y. Xiang et al. (Eds.): CSS 2012, LNCS 7672, pp. 362-376. Springer, Heidelberg (2012).

[13] Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, and Yuexin Zhang. Certificate-based Key-Insulated Signature. Y. Xiang et al. (Eds.): IDCS 2012 and ICDKE 2012, LNCS 7646, pp. 493-507, 2012.

[14] Lu Yang and Li Jiguo. Efficient Constructions of Certificate-Based Key Encapsulation Mechanism. Accepted by the special issue of the 7th International Conference on Frontier of Computer Science and Technology, 2012. Accepted.

[15] Yang Lu, Jiguo Li. Generic Construction of Forward-Secure Identity-Based Encryption. JCP 7(12): 3068-3074 (2012)

[16] 李继国, 杨海珊, 张亦辰. 标准模型下安全的基于证书密钥封装方案. 电子学报, 2012, 40 (8): 1577-1583(EI, 20124215582349).

[17] 李继国, 钱娜, 黄欣沂, 张亦辰. 基于证书强指定验证者签名方案. 计算机学报, 2012, 35 (8): 1579-1587 (EI, 20124415622447).

[18] 李继国, 杨海珊, 张亦辰. 带标签的基于证书密钥封装方案. 软件学报, 2012, 23(8): 2163-2172(EI, 20123815454316).

[19] Lu Yang and Li Jiguo. Constructing Certificate-Based Encryption Secure against Key Replacement Attacks. ICIC Express Letters, Part B: Applications, 2012, 3(1): 195-200. (EI)

[20] 李继国, 孙 刚, 张亦辰. 标准模型下可证安全的本地验证者撤销群签名方案. 电子学报, 2011, 20 (7): 1618-1623

[21] 李继国, 孙 刚, 张亦辰. 实用的本地验证者撤销群签名方案. 通信学报, 2011,32 (10): 67-77.

[22] Zhongmei Wan Xuejia Lai, Jian Weng and Jiguo Li. Certificateless Strong Key-Insulated Signature. ICIST 2011, pp.270-276

[23] Lu Yang and Li Jiguo. A Practical Forward-Secure Public Key Encryption Scheme. Journal of Networks, 2011, 6 (9): 1254-1261

[24] Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. Constructions of Certificate-Based Signature Secure against Key Replacement Attacks. Journal of Computer Security, 2010,18(3): 421-449(EI)

[25] ZHOU Yajian, PAN Anwei, LI Jiguo. An Authenticated Dynamic Key Management Scheme for Clustered Sensor Networks, China Communications, 2010,(10):7-17 (SCIE)

[26] Zhongmei Wan, Jian Weng, Jiguo Li. Security Mediated Certificateless Signatures Without Pairing. Journal of Computers. 2010, 5(12): 1862-1869

[27] 周亚建, 徐晨, 李继国. 基于改进CURE聚类算法的无监督异常检测方法. 通信学报.2010,31(7):18-23. (EI)

[28] Wang Aiqin, Li Jiguo, Wang Zhijian. A Provably Secure Proxy Signature Scheme from Bilinear Pairings. Journal of Electronics. 2010,27(3):298-304.

[29] Lu Yang and Li Jiguo. Forward-Secure Certificate-Based Encryption and its Generic Construction. Journal of Networks, 2010, 5(5): 527-534. (EI)

[30] Lu Yang, Li Jiguo, Constructing efficient certificate-based encryption scheme with pairing in the standard model, Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp 234-237 (EI)

[31] Lu Yang and Li Jiguo. An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles. In the 3rd International Symposium on Electronic Commerce and Security Workshops, pp. 22-25, 2010. (EI)

[32] Lu Yang, Li Jiguo and Xiao Junmo. Forward-secure Certificate-based Encryption. The Fifth International Conference on Information Assurance and Security, Xian, China, pp.57-60, 2009.

[33] Lu Yang, Li Jiguo and Xiao Junmo. Forward-secure Certificate-based Encryption: Definition and Generic Construction. In the 2009 International Conference on e-Business and Information System Security, Wuhan, China, pp.30-34, 2009.

[34] Weijia Jiang, Jiguo Li. Authenticated Tree Based Group Key Agreement. CIS2009, 251-255.

[35] 李继国, 姜平进. 一种基于身份的数字签名方法. 专利申请号:200910027375.6, 授权公告号:101562524B

[36] 李继国, 徐晨. 基于改进CURE聚类算法的无监督异常检测方法和系统. 专利申请号:200910027374.1, 公开号: CN101561878, 授权公告号:101561878B

[37] 李继国, 姜平进. 标准模型下可证安全的基于身份的高效签名方案. 计算机学报, 2009,11(11):2130-2136

[38] Jiguo Li, Lizhong Xu and Yichen Zhang. Provably Secure Certificate-based Proxy Signature Schemes. Journal of Computers. 2009, 4(6): 444-452 (EI)

[39] Lu Yang, Li Jiguo and Xiao Junmo. Threshold Certificate-based Encryption. Journal of software. 2009, 4(3): 210-217 (EI)

[40] Lu Yang and Li Jiguo. Generic Construction of Certificate-based Encryption in the Standard Model. In the Second International Symposium on Electronic Commerce and Security, Nanchang, China, pp.25-29, 2009.

[41] Lu Yang, Li Jiguo and Xiao Junmo. Threshold Certificate-based Encryption: Definition and Concrete Construction. 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, vol1, 278-282.

[42] Yang Lu, Jiguo Li, and Junmo Xiao. Constructing Efficient Certificate-based Encryption with Paring. Journal of Computers. 2009, 4 (1): 19-26. (EI)

[43] Jiguo Li, Xinyi Huang, Yi Mu, Wei Wu. Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme. Journal of Communications and Networks. 2008, 10(1): 10-17. (SCI, 000254805800003)

[44] Lu Yang, Li Jiguo and Xiao Junmo. Generic Construction of Certificate-based Encryption. In the 9th International Conference for Young Computer Scientists, Zhangjiajie, China, pp. 1589-1594, 2008 (EI&ISTP)

[45] Lu Yang, Li Jiguo and Xiao Junmo. Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. In the 2008 International Symposium on Electronic Commerce and Security, Guangzhou, China, pp. 296-300, 2008. (EI)

[46] Lu Yang and Li Jiguo. A General and Secure Certificate-based Encryption Construction. In the 3rd ChinaGrid Annual Conference, Dunhuang, China, pp. 182-189, 2008. (EI)

[47] Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI’07, LNCS 4582, 2007,110-125. (EI)

[48] Jiguo Li, Shuhong Wang. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-Certified Public Key. International Journal of Network Security, 2007, 2(4): 193-200

[49] 王爱芹, 李继国, 马春光, 王志坚. 一种基于身份的代理盲签名方案的安全性分析. 通信学报, 2006, 27, (12A): 16-19.

[50] Li Jiguo, Liang Zhenghe, Zhu Yuelong and Zhang Yichen. Improvement of Some Proxy Signature Schemes. Chinese Journal of Electronics, 2005, 14(3): 407-411 (SCI,945NP, EI)

[51] 李继国,曹珍富,李建中. 代理签名的现状与进展. 通信学报. 2003, 24(10): 114-124

[52] 曹珍富, 李继国, 李建中. 一个新的具有指定接收者(t,n)门限签名加密方案. 通信学报. 2003, 24(5): 8-13

[53] LI Jiguo, LI Jianzhong, CAO Zhenfu and Zhang Yichen. Nonrepudiable Threshold Proxy Signcryption Scheme with Known Proxy Agent. Journal of Software(软件学报英文版). 2003,14(12): 2021-2027 (EI)

[54] 李继国, 曹珍富, 李建中. 具有指定接收组(t,n)门限共享验证签名加密方案. 电子学报. 2003, 31(7): 1086-1088 (EI)

[55] 李继国, 曹珍富, 张亦辰, 李建中. 代理多重签名方案的密码分析与修改. 高技术通讯. 2003, 13(4): 1-5 (EI)

[56] Li Jiguo, Cao Zhenfu and Zhang Yichen. Nonrepudiable Proxy Multi-Signature Schemes. Journal of Computer Science and Technology. 2003, 18(3): 399-402 (SCI, EI)

[57] Li Jiguo, Cao Zhenfu and Zhang Yichen. Improvement of M-U-O and K-P-W Proxy Signature Schemes. Journal of Harbin Institute of Technology. 2002, 9(2): 145-148 (EI)

[58] 曹珍富, 李继国. 基于ElGamal体制的门限密钥托管方案. 计算机学报. 2002,25(4): 346-350 (EI)

[59] 李继国, 曹珍富. 一个门限代理签名方案的改进. 计算机研究与发展. 2002, 39 (11): 1513-1518(EI)

在研项目

国家自然科学基金项目"可证明安全的基于证书密码体制及其拓展研究"(61272542)

以上内容由新东方在线编辑,更多招生单位博士生导师信息请持续关注新东方在线考博频道。

本文关键字: 李继国

关注新东方在线服务号

回复【考博真题】领取备考必看真题集

更多资料
更多>>
更多内容
更多>>
更多好课>>
更多>>
更多资料