[7] Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi. Secure Independent-update Concise-expression Access Control for Video on Demand in Cloud. Information Science, 2016. DOI: 10.1016/j.ins.2016.08.018 (SCI收录, CCF B类)
[8] Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE International Conference on Sensing, Communication, and Networking(SECON 2015). 2015 (CCF B类)
[9] Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing. IEEE Transactions on Cloud Computing. 2016
[10] Jing Chen, Lihong Zhang, Kun He, Ruiying Du. Lina Wang. Message-Locked Proof of Ownership and Retrievability with Remote Repairing in Cloud. Security and Communication Networks. 2016 (SCI收录, CCF C类)
[11] Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du. A r-Strawman privacy-preserving scheme in weighted social networks. Security and Communication Networks. 2016 (SCI收录, CCF C类)
[12] Yu Fajiang, Chen Jing, Xiang Yang, Zhu Jiacheng, Zhao Yangdi. An efficient anonymous remote attestation scheme for trusted computing based on improved CPK. Electronic Commerce Research. 2014 (SSCI收录,corresponding author)
[13] Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia, 2013:58-64 (CCF,C类)
[14] Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
[15] Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks. China Communication. 2012,9(10): 23-32 (SCI收录)
[16] Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
[17] Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network. China Communication. 2011,8(4): 125-131 (SCI收录)
[18] 张宇,陈晶,杜瑞颖,周庆,郑明辉. 适于车载网通信的高效签密方案. 2015, 43(3):512-517 (权威期刊, corresponding author)
[19] Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of Security Network Coding toward Various Attacks. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
[20] Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on Reputation for Spectrum Allocation in Wireless Networks. Computer Communications. 2010, 33(14): 1623-1631 (SCI收录)
[21] 陈晶, 杜瑞颖, 王丽娜, 田在荣. 网络环境下一种基于概率密度的信任博弈模型. 电子学报.2010,38(2): 427-433 (权威期刊)
[22] 沙乐天,傅建明,陈晶,黄诗勇. 一种面向敏感信息处理的敏感度度量方法 [J]. 计算机研究与发展, 2014, 51(5): 1050-1060. (权威期刊)
[23] 李拴保,傅建明,张焕国,陈晶,王晶,任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报. 2014, 35(9): 99-111 (权威期刊)
[24] Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications. 2014 (SCI收录)
[25] Wei Liu, Wei Du, Jing Chen, Wei Wang, Guosun Zeng. Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters. Journal of Network and Computer Applications. 2013. (SCI收录)
[26]Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui. An Efficient Fair UC-Secure Protocol for Two-Party Computation, Security and Communication Networks. 2013 (SCI收录)
[27] Fu Cai, Gao Xiang, Chen Jing etc. GRAP: Grey Risk Assessment based on Projection in Ad Hoc networks. Journal of Parallel and Distributed Computing. 2011.71(9): 1249-1260. (CCF B类)
[28] Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution scheme using network coding for mobile ad hoc network. Security and Communication Networks. 2011.3 (SCI收录)
[29] 徐鹏, 崔国华, 陈晶. 标准模型下一种实用的和可证明安全的IBE方案. 计算机学报. 2010.2(33): 335-344 (权威期刊)
[30] Minghui Zheng, Jing Chen. Provably Secure Two-party Explicit Authenticated Key Agreement Protocol. In proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom). 2012: 1299-1303 (CCF C类)
[31] 张宇, 陈晶, 杜瑞颖,等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 第3期(03):512-517. (权威期刊)
资料下载
【必看】考博英语词汇10000例精解
发布时间:2020-09-02关注新东方在线服务号
回复【10000】免费获取
医学考博英语作文核心基础词汇整理
发布时间:2020-04-15关注新东方在线服务号
回复【医学考博】获取
医学考博英语阅读理解练习资料
发布时间:2020-04-15关注新东方在线服务号
回复【医学考博】获取
法学考博英语高频词汇word版
发布时间:2020-04-15关注新东方在线服务号
回复【医学考博】获取
医学博士英语统考真题及解析
发布时间:2019-12-26关注新东方在线服务号
回复【考博真题】获取
全国医学博士外语统一考试真题
发布时间:2019-12-26关注新东方在线服务号
回复【考博真题】获取
中科院考博英语复习备考实战经验分享
发布时间:2019-12-26关注新东方在线服务号
回复【考博经验】获取
中科院考博英语真题练习资料
发布时间:2019-12-26关注新东方在线服务号
回复【考博真题】获取
关注新东方在线服务号
关注新东方在线服务号,
免费获取考博必看干货资料
推荐阅读
更多>>沈阳工业大学2023年博士研究生导师一览表
来源 : 沈阳工业大学 2022-12-26 15:53:36 关键字 : 2023博士研究生导师一览表
哈尔滨工业大学2023年博士研究生招生学科及招生导师学科代码、名称及研究方向指导教师联系方式备注航天学院0801 力学1 力学、复合材料
来源 : 哈尔滨工业大学 2022-09-05 12:15:14 关键字 : 2023博士招生学科及导师
安徽大学2022博士导师一览表 1、哲学学院:http: zxxnew ahu edu cn 15533 list htm 王金柱、丁常春 等 2、数学科学学院:
来源 : 新东方在线整理 2022-01-11 16:48:45 关键字 : 安徽大学2022博士导师一览表
2021年博士研究生招生入学考试工作已经展开,新东方在线考博频道将为广大2021考博考生发布转载各博士招生单位发布的2021年博士研究生招
来源 : 西南石油大学 2021-05-17 11:19:18 关键字 : 博士研究生导师
2021年博士研究生招生入学考试工作已经展开,新东方在线考博频道将为广大2021考博考生发布转载各博士招生单位发布的2021年博士研究生招
考博好课推荐
更多>>基础薄弱,备考迷茫,送纸质资料
价格 : ¥2280元
资深教师,教学简明,直接有效!
价格 : 0元
资料下载
更多>>关注新东方在线服务号
回复【10000】免费获取
关注新东方在线服务号
回复【医学考博】获取
关注新东方在线服务号
回复【医学考博】获取
关注新东方在线服务号
回复【医学考博】获取
关注新东方在线服务号
回复【考博真题】获取
关注新东方在线服务号
回复【考博真题】获取
关注新东方在线服务号
回复【考博经验】获取
关注新东方在线服务号
回复【考博真题】获取
阅读排行榜
相关内容