删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

福建师范大学数学与计算机科学学院研究生导师简介-XinyiHuang'sHomePage(黄欣沂的个人主页

福建师范大学 免费考研网/2014-04-28

电子邮件:xyhuang81@gmail.com,xyhuang@fjnu.edu.cn
通信地址:福建省福州市福建师范大学旗山校区数学与计算机科学学院350108
个人简介:黄欣沂,男,汉族,1981年3月生,江苏仪征人,研究生学历、博士学位,硕士生导师。现为福建师范大学数学与计算机科学学院教授,福建省网络安全与密码技术重点实验室副主任,中国密码学会会员,2013年度“福建省高校杰出青年科研人才培育计划”入选者。教育经历:2006年-2009年,澳大利亚卧龙岗大学计算机科学和软件工程学院,博士(信息安全),指导老师:YiMu
2002年-2005年,南京师范大学数学与计算机科学学院,硕士(信息安全),指导老师:张福泰
1998年-2002年,南京师范大学数学与计算机科学学院,学士(数学与应用数学,师范类)工作经历:2012年2月-至今,福建师范大学数学与计算机科学学院,网络安全与密码技术福建省高校重点实验室
2011年2月-2011年11月,新加坡资讯通信研究院(I2R,Singapore)研究型科学家(ResearchScientist),合作老师:JianyingZhou
2010年2月-2011年2月,新加坡管理大学(SingaporeManagementUniversity)博士后研究人员,合作老师:RobertH.Deng
2009年11月-2010年1月,澳大利亚中央昆士兰大学(CentralQueenslandUniversity)博士后研究人员,合作老师:YangXiang

科研项目:
    “大规模网络安全身份认证协议若干问题研究”(项目负责人,国家自然科学基金青年基金,NSFC61202450,2013-2015)
    “大规模网络身份认证协议的安全性分析与设计”(项目负责人,教育部高等学校博士学科点专项科研基金新教师类,**001,2013-2015)
    “支持隐私保护的安全协议研究”(项目负责人,2013年度“福建省高校杰出青年科研人才培育计划”)
    “面向授权的数字签名方案的新型设计”(参与,国家自然科学基金,NSFC61003232,2011-2013)
    “基于证书密码体制研究”(参与,国家自然科学基金,NSFC60842002,2009)
    “高效无证书密码体制及其应用”(参与,国家自然科学基金,NSFC60673070,2007-2009)
    福建省高等学校“异构网络安全通信技术”创新团队(参与)
    福建师范大学“网络与信息安全”创新团队(参与)
学术兼职:国际学术期刊编辑
    Editor(编委),InternationalJournalofInformationSecurity(IJIS),Springer
    Editor(编委),InternationalJournalofSecurity,CRCPressGuestEditor(专刊编委),NSS2012SpecialIssueinSecurityandCommunicationNetworks(SCN)
    GuestEditor(专刊编委),INCOS2012SpecialIssueinConcurrencyandComputation:Practice&Experience(CPE)
国际会议主席
    GeneralCo-Chair,The8thInternationalConferenceonNetworkandSystemSecurity(NSS2014),Xi’an,China.
    ProgramCo-Chair,The10thInternationalConferenceonInformationSecurityPracticeandExperience(ISPEC2014),Fuzhou,China
    PublicityChair,The15thInternationalConferenceonInformationandCommunicationsSecurity(ICICS2013),Beijing,China
    ProgramCo-Chair,The7thInternationalConferenceonNetworkandSystemSecurity(NSS2013),Madrid,Spain
    ProgramCo-Chair,The5thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems(INCoS2013),Xi’an,China,2013
    GeneralChair,2012InternationalConferenceonDataandKnowledgeEngineering(ICDKE2012),WuYiShan,China
    WorkshopChair,TheFirstInternationalWorkshoponLarge-ScaleNetworkSecurity(LSNS2012),ROMANIA,2012
    TrackChair,The4thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems(INCoS2012),BUCHAREST,ROMANIA,2012
    PublicityChair,The10thInternationalConferenceonAppliedCryptographyandNetworkSecurity(ACNS2012),Singapore,2012
    PublicityChair,The6thInternationalConferenceonNetworkandSystemSecurity(NSS2012),WuYiShan,China,2012
国际会议程序委员会委员
    8thInternationalConferenceonProvableSecurity(ProvSec2014),13-14October2014,HongKong.
    19thEuropeanSymposiumonResearchinComputerSecurity(ESORICS2014),September7-112014,Wroclaw,Poland.
    The4thIEEEInternationalSymposiumonBiometrics&SecurityTechnologies(ISBAST2014),26-27August,2014,KualaLumpur,Malaysia
    The2014IEEEInternationalConferenceonCommunications,IEEEICC2014-CommunicationandInformationSystemsSecuritySymposium,10-14June2014,Sydney,Australia.
    The2014AsianConferenceonAvailability,ReliabilityandSecurity(AsiaARES2014)April14th-17th2014,Bali,Indonesia
    The19thAustralasianConferenceonInformationSecurityandPrivacy(ACISP2014),Wollongong,Australia
    TheThirdInternationalConferenceonSmartSystems,DevicesandTechnologies,SMART2014,July20-24,2014-Paris,France
    2013InternationalConferenceonConnectedVehicles&Expo,2-6December2013,LasVegas
    The34thInternationalConferenceonDistributedComputingSystems(ICDCS2014),Madrid,Spain
    TheSecondInternationalConferenceonSecurityinComputerNetworksandDistributedSystems(SNDS2014),March13-14,2014,Trivandrum,India
    The9thInternationalWorkshoponSecurityandTrustManagement(STM2013),Egham,U.K.,September09-13,2013
    2013InternationalConferenceonCloudComputingandBigData(CloudCom-Asia),Fuzhou,China,December16-18,2013
    The10thIEEEConsumerCommunicationsandNetworkingConference(CCNC2013)
    The12thIEEEInternationalConferenceonTrust,SecurityandPrivacyinComputingandCommunications,IEEETrustCom-13,July16-18,2013,Melbourne,Australia
    The5thInternationalSymposiumonCyberspaceSafetyandSecurity(CSS2013),Zhangjiajie,China,November13-15,2013
    The15thInternationalConferenceonInformationandCommunicationsSecurity(ICICS2013),Beijing,China
    TheSecondInternationalConferenceonSmartSystems,DevicesandTechnologies,SMART2013,June23-28,2013,Rome,Italy
    The9thInternationalConferenceonInformationSecurityPracticeandExperience(ISPEC2013),May12-14,2013,Lanzhou,China
    The3rdIEEEInternationalSymposiumonBiometrics&SecurityTechnologies(ISBAST2013),2-5July,2013,Chengdu,China
    The2013AsianConferenceonAvailability,ReliabilityandSecurity(AsiaARES2013).March25th-29th2013,GadjahMadaUniversity,Indonesia
    2013ACMAsiaPublic-KeyCryptographyWorkshop(AsiaPKC2013),May7,2013,Hangzhou,China
    The9thIEEEConsumerCommunicationsandNetworkingConference(CCNC2012),LasVegas,USA,2012
    The26thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA2012),Tokyo,Japan,2012
    The17thAustralasianConferenceonInformationSecurityandPrivacy(ACISP2012),Wollongong,Australia,2012
    The2012InternationalConferenceonSecurityandCryptography(SECRYPT2012),Rome,Italy,2012
    The2012InternationalConferenceonSecurityinComputerNetworksandDistributedSystems(SNDS-2012),Trivandrum,India,2012
    The11thIEEEInternationalConferenceonTrust,SecurityandPrivacyinComputingandCommunications(TrustCom-2012),Liverpool,England,UK,2012
    TheFirstInternationalConferenceonSmartSystems,DevicesandTechnologies(SMART2012),Stuttgart,Germany,2012
    The2012SummerFTRAInternationalSymposiumonAdvancesinCryptography,SecurityandApplicationsforFutureComputing(ACSA-Summer),2012
    The5thInternationalConferenceonProvableSecurity(ProvSec2011),Xi’an,China,2011
    The8thIEEEConsumerCommunicationsandNetworkingConference(CCNC11),LasVegas,USA,2011
    The9thAnnualConferenceonPrivacy,SecurityandTrust(PST2011),MontrealQuebec,Canada,2011
    The3rdInternationalWorkshoponCyberspaceSafetyandSecurity(CSS2011),Milan,Italy,2011
    The10thIEEEInternationalConferenceonTrust,SecurityandPrivacyinComputingandCommunications(TrustCom2011),Changsha,China,2011
    The6thInternationalConferenceonFrontierofComputerScienceandTechnology(FCST2011),Changsha,China,2011
    TheFirstInternationalWorkshoponSecurity&OptimizationforWirelessNetworks(SOWN2011),Beijing,China,2011
    The5thInternationalConferenceonNetworkandSystemSecurity(NSS2011),Milan,Italy,2011
    The9thIEEEInternationalConferenceonDependable,AutonomicandSecureComputing(DASC2011),Sydney,Australia,2011
    ThirdInternationalConferenceonIntelligentNetworkingandCollaborativeSystems(INCoS2011),FUKUOKA,JAPAN,2011
    The12thIEEEInternationalConferenceonHighPerformanceandCommunications(HPCC-10),Melbourne,Australia,2010
    The2009IEEEInternationalConferenceonNetworking,Architecture,andStorage(NAS2009),ZhangJiaJie,China,2009
论文发表情况:自2005年以来在《IEEEJournalonSelectedAreasinCommunications》、《IEEETransactionsofInformationForensicsandSecurity》、《IEEETransactionsonParallelandDistributedSystems》、《JournalofComputerScienceandTechnology》(《计算机科学技术学报》)、《电子学报》、PKC等国内外学术期刊和会议上发表(含录用)学术论文75篇,其中第一作者论文25篇,第一作者SCI收录论文14篇(其中一区1篇,二区1篇,三区3篇),第一作者EI收录论文21篇。根据“GoogleScholar”统计,所发表的论文被美国、加拿大、英国、西班牙、澳大利亚、日本、韩国、台湾等国家和地区的学者引用超过1000次,H-Index:20。(MyGoogleScholarCitations,MyDBLP)代表性论文
    XinyiHuang(黄欣沂),YangXiang,ElisaBertino,JianyingZhou,andLiXu.“RobustMulti-FactorAuthenticationforFragileCommunications”.IEEETransactionsonDependableandSecureComputing(IEEETDSC).(已录用,2013-12-22,10.1109/TDSC.2013.2297110)
    XinyiHuang(黄欣沂),XiaofengChen,JinLi,YangXiang,andLiXu.“FurtherObservationsonSmart-Card-BasedPassword-AuthenticatedKeyAgreementinDistributedSystems”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS).(已录用,2013-09-01,DOI:10.1109/TPDS.2013.230).
    XinyiHuang,YiMu,WillySusilo,WeiWu,andYangXiang.“OptimisticFairExchangewithStrongResolution-Ambiguity”.IEEEJournalonSelectedAreasinCommunications(IEEEJ-SAC)29(7):1491-1502,2011
    XinyiHuang,YiMu,WillySusilo,WeiWu,JianyingZhou,andRobertDeng.“PreservingTransparencyandAccountabilityinOptimisticFairExchangeofDigitalSignatures”.IEEETransactionsonInformationForensicsandSecurity(IEEETIFS)6(2):498-512,IEEESignalProcessingSociety,2011
    XinyiHuang,YiMu,WillySusilo,WeiWu,andYangXiang.“FurtherObservationsonOptimisticFairExchangeProtocolsintheMulti-userSetting”.In13thInternationalConferenceonPracticeandTheoryinPublicKeyCryptography,PKC2010.LectureNotesinComputerScience6056:124-141.Springer,2010
    XinyiHuang,YiMu,WillySusilo,DuncanS.Wong,andWeiWu.“CertificatelessSignatureRevisited”.InInformationSecurityandPrivacy,12thAustralasianConference,ACISP2007,LectureNotesinComputerScience4586:308-322.Springer,2007
    XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“OntheSecurityofCertificatelessSignatureSchemesfromAsiacrypt2003”.InCryptologyandNetworkSecurity,4thInternationalConference,CANS2005,LectureNotesinComputerScience3810:13-25.Springer,2005
    XinyiHuang,YangXiang,AshleyChonka,JianyingZhou,andRobertH.Deng.“AGenericFrameworkforThree-FactorAuthentication:PreservingSecurityandPrivacyinDistributedSystems”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS)22(8):1390-1397,IEEEComputerSocietyPress,2011
    XinyiHuang,WillySusilo,YiMu,andWeiWu.“SecureUniversalDesignatedVerifierSignaturewithoutRandomOracles”.InternationalJournalofInformationSecurity7(3):171-183.Springer,2008
主要学术论文-----2013-----
    ShaohuaTang,LinglingXu,NiuLiu,XinyiHuang(黄欣沂),JintaiDing,andZhimingYang.”ProvablySecureGroupKeyManagementApproachBaseduponHyper-Sphere”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS),IEEEComputerSociety.(InPress,Acceptedon2013-12-31)
    XinyiHuang(黄欣沂),YangXiang,ElisaBertino,JianyingZhou,andLiXu.“RobustMulti-FactorAuthenticationforFragileCommunications”.IEEETransactionsonDependableandSecureComputing(IEEETDSC).(SCI、EI,已录用,2013-12-22,10.1109/TDSC.2013.2297110)
    XiaofengChen,JinLi,XinyiHuang(黄欣沂),JingweiLi,YangXiang,andDuncanS.Wong.“SecureOutsourcedAttribute-basedSignatures”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS),IEEEComputerSociety.(InPress,Acceptedon2013-12-05)
    JiguoLi,HuiyunTeng,XinyiHuang(黄欣沂),YichenZhang,JianyingZhou.“AForward-SecureCertificate-BasedSignatureScheme”.TheComputerJournal(InPress,Acceptedon2013-11-07)
    JinLi,XinyiHuang(黄欣沂),JingweiLi,XiaofengChen,andYangXiang.“SecurelyOutsourcingAttribute-basedEncryptionwithCheckability”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS),IEEEComputerSociety.(InPress,Acceptedon2013-09-27)(SCI、EI)
    YuexinZhang,LiXu,YangXiang,andXinyiHuang(黄欣沂).“AMatrix-basedPairwiseKeyEstablishmentSchemeforWirelessMeshNetworksUsingPreDeploymentKnowledge”.IEEETransactionsonEmergingTopicsinComputing(IEEETETC),IEEEComputerSociety.(InPress,Acceptedon2013-09-27)
    XinyiHuang,XiaofengChen,JinLi,YangXiang,andLiXu.“FurtherObservationsonSmart-Card-BasedPassword-AuthenticatedKeyAgreementinDistributedSystems”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS).(已录用,2013-09-01).
    LanxiangChen,ShumingZhou,XinyiHuang,andLiXu.”DataDynamicsforRemoteDataPossessionCheckinginCloudStorage”.AcceptedbyComputers&ElectricalEngineering,Elsevier.
    Ai-JunGe,Xin-YiHuang,ChengChen,Chuan-GuiMaandRuiZhang."CryptanalysisofWang-Zhu-Feng-Yau's"Attribute-BasedSignaturewithPolicy-and-EndorsementMechanism"".AcceptedbyJOURNALOFCOMPUTERSCIENCEANDTECHNOLOGY,Springer.
    LiXu,XinyuChen,JieLi,XinyiHuang,andJianyinZhou.“CrosslayerDesigninWirelessMulti-hopNetwork:ABargainingGameTheoreticAnalysis”.AcceptedbyTelecommunicaitonSystem,Springer.
    YanlingLian,XinyiHuang,andYiMu.“SA3:Self-AdaptiveAnonymousAuthenticationforDynamicAuthenticationPoliciesFutureGenerationComputerSystems”.FutureGenerationComputerSystems,Elsevier.2013.
    YanlingLian,LiXuandXinyiHuang.“Attribute-basedSignatureswithEfficientRevocation”InProceedingsofINCOS2013,IEEE,2013.
    ChuanYao,LiXuandXinyiHuang.“ASecureCloudStorageSystemfromThresholdEncryption”.InProceedingsofINCOS2013,IEEE,2013.
    YuexinZhang,LiXu,XinyiHuangandJieLi.“Matrix-basedPairwiseKeyEstablishmentwithPreandPostDeploymentKnowledgeforWirelessMeshNetworks”.AcceptedbyTheSeventhInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(IMIS-2013),IEEEComputationalIntelligenceSociety.
    YuexinZhang,LiXu,YangXiangandXinyiHuang.“Matrix-basedPairwiseKeyEstablishmentinWirelessMeshNetworksUsingDeploymentKnowledge”,IEEEICC2013-Ad-hocandSensorNetworkingSymposium.

    -----2012-----


    XinyiHuang,Cheng-KangChu,Hung-MinSun,JianyingZhou,andRobertH.Deng.“EnhancedAuthenticationforCommercialVideoServices”.SecurityandCommunicationNetworks5(11):1248–1259,2012.
    XinyiHuang,YiMu,WillySusilo,DuncanS.Wong,andWeiWu.“CertificatelessSignatures:NewSchemesandSecurityModels".TheComputerJournal55(4):457-474,2012.
    JiguoLi,XinyiHuang,MeixueHong,andYichenZhang.“Certificate-basedSigncryptionwithEnhancedSecurityFeatures”.ComputersandMathematicswithApplications64(6):1587-1601,2012.
    LiJi-Guo,QianNa,HuangXin-Yi,andZhangYi-Chen.“Certificate-BasedStrongDesignatedVerifierSignatureScheme”.ChineseJournalofComputers35(8):1579-1587,2012.
    WeiWu,YiMu,WillySusilo,XinyiHuangandLiXu.“AProvablySecureConstructionofCertificate-BasedEncryptionfromCertificatelessEncryption”.TheComputerJournal55(10):1157-1168,2012.
    XuAnWang,XinyiHuang,XiaoyuanYang,LongfeiLiu,andXuguangWu.“FurtherObservationonProxyRe-encryptionwithKeywordSearch”.JournalofSystemsandSoftware85(3):643-654,2012.
    RaylinTso,XinyiHuang,WillySusilo.“StronglySecureCertificatelessShortSignatures”.JournalofSystemsandSoftware85(6)1409–1417,2012.
    JiguoLi,XinyiHuang,YichenZhang,andLizhongXu.“AnEfficientShortCertificate-basedSignatureScheme”,JournalofSystemsandSoftware85(2):314-322,2012.
    YuexinZhang,LiXuandXinyiHuang.“PolynomialbasedKeyPredistributionSchemeinWirelessMeshNetworks”.JournalofComputationalInformationSystem8(6):2539-2550,2012.
    TszHonYue,JosephK.Liu,XinyiHuang,ManHoAu,WillySusiloandJianyingZhou.“ForwardSecureAttribute-BasedSignatures”.ICICS2012,LectureNotesinComputerScience7618:167-177,2012,Springer
    YunmeiZhang,JosephLiu,XinyiHuang,ManHoAuandWillySusilo.“EfficientEscrow-FreeIdentity-BasedSignature”.Provsec2012,LectureNotesinComputerScience7496:161-174,2012,Springer
    Cheng-KangChu,JosephK.Liu,XinyiHuang,andJianyingZhou.“Verifier-LocalRevocationGroupSignatureswithTime-BoundKeys”.InAsiaCCS2012:26-27,2012,ACM
    ShermanS.M.Chow,Cheng-KangChu,XinyiHuang,JianyingZhou,andRobertH.Deng.“DynamicSecureCloudStoragewithProvenance”.LectureNotesinComputerScience6805:442-464,2012,Springer

    -----2011-----


    XinyiHuang,YiMu,WillySusilo,WeiWu,andYangXiang."OptimisticFairExchangewithStrongResolutionAmbiguity".IEEEJournalonSelectedAreasinCommunications29(7):1491-1502,2011.
    XinyiHuang,YiMu,WillySusilo,WeiWu,JianyingZhou,andRobertDeng.“PreservingTransparencyandAccountabilityinOptimisticFairExchangeofDigitalSignatures”.IEEETransactionsonInformationForensicsandSecurity6(2):498-512,IEEESignalProcessingSociety,2011.
    XinyiHuang,YangXiang,AshleyChonka,JianyingZhou,andRobertH.Deng.“AGenericFrameworkforThree-FactorAuthentication:PreservingSecurityandPrivacyinDistributedSystems”.IEEETransactionsonParallelandDistributedSystems22(8):1390-1397,IEEEComputerSocietyPress,2011.
    RaylinTso,XunYi,andXinyiHuang.“EfficientandShortCertificatelessSignaturesSecureAgainstRealisticAdversaries”.JournalofSupercomputing55(2):173-191,2011.
    WeiWu,YiMu,WillySusilo,andXinyiHuang.“ProvablySecureServer-AidedVerificationSignatures”.ComputersandMathematicswithApplications61(7):1705-1723,2011.

    -----2010-----


    JiguoLi,XinyiHuang,YiMu,WillySusilo,andQianhongWu.“ConstructionsofCertificate-BasedSignatureSecureagainstKeyReplacementAttacks”.JournalofComputerSecurity18(3):421-449,2010.
    HongYuan,FutaiZhang,XinyiHuang,YiMu,WillySusiloandLeiZhang.“CertificatelessThresholdSignatureSchemefromBilinearMaps”.InformationSciences180(23):4714-4728,2010.
    LiXu,SishengCheng,XinyiHuang,andYiMu.“BloomFilterbasedSecureandAnonymousDSRProtocolinWirelessAdHocNetworks”.InternationalJournalofSecurityandNetwork5(1):35-44,2010.
    FutaiZhang,SujuanLi,SongqinMiao,YiMu,WillySusilo,andXinyiHuang.“CryptanalysisonTwoCertificatelessSignatureSchemes”.InternationalJournalofComputers,Communications&Control,Vol.V,No.4,pp.586-591,2010.
    XinyiHuang,YiMu,WillySusilo,WeiWu,andYangXiang.“FurtherObservationsonOptimisticFairExchangeProtocolsintheMulti-userSetting”.In13thInternationalConferenceonPracticeandTheoryinPublicKeyCryptography,PKC2010.LectureNotesinComputerScience6056:124-141.Springer,2010.

    -----2009-----


    YongYu,ChunxiangXu,XinyiHuang,andYiMu.“AnEfficientAnonymousProxySignatureSchemewithProvableSecurity”.ComputerStandards&Interfaces31(2):348-353,2009.
    LeiZhang,FutaiZhang,andXinyiHuang.“ASecureandEfficientCertificatelessSignatureSchemeUsingBilinearPairing”.TheChineseJournalofElectronics18(1):145-148,2009.
    WeiWu,YiMu,WillySusilo,andXinyiHuang.“Certificate-basedSignaturesRevisited”.JournalofUniversalComputerScience15(8):1684-1659,2009.
    AijunGe,ShaozhenChen,andXinyiHuang.“AConcreteCertificatelessSignatureSchemewithoutPairings”.In2009InternationalConferenceonMultimediaInformationNetworkingandSecurity,MINES2009:374-377.IEEEComputerSociety,2009.
    WeiWu,YiMu,WillySusilo,andXinyiHuang.“Certificate-BasedSignatures:NewDefinitionsandAGenericConstructionfromCertificatelessSignatures”.InInformationSecurityApplications,9thInternationalWorkshop,WISA2008,LectureNotesinComputerScience5379:99-114.Springer,2009.
    XuanWang,XinyiHuang,andXiaoyuanYang.“FurtherObservationsonCertificatelessPublicKeyEncryption”.InInformationSecurityandCryptology,4thSKLOISConference,Inscrypt2008.LectureNotesinComputerScience5487:217-239.Springer,2009.

    -----2008-----


    XinyiHuang,WillySusilo,YiMu,andWeiWu.“SecureUniversalDesignatedVerifierSignaturewithoutRandomOracles”.InternationalJournalofInformationSecurity7(3):171-183.Springer,2008.
    XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“ShortDesignatedVerifierSignatureSchemeandItsIdentity-basedVariant”.InternationalJournalofNetworkSecurity6(1):82-93,2008.
    JiguoLi,XinyiHuang,YiMu,andWeiWu.“CryptanalysisandImprovementofAnEfficientCertificatelessSignatureScheme”.JournalofCommunicationsandNetworks10(1):10-17,2008.
    DongdongSun,XinyiHuang,YiMu,andWillySusilo.“Identity-BasedOn-line/Off-lineSigncryption”.In2008IFIPInternationalConferenceonNetworkandParallelComputing,NPC2008:34-41.IEEEComputerSociety,2008.
    WeiWu,YiMu,WillySusilo,andXinyiHuang.“Server-AidedVerificationSignatures:DefinitionsandNewConstructions”.InProvableSecurity,SecondInternationalConference,ProvSec2008,LectureNotesinComputerScience5324:141-155.Springer,2008.
    WeiWu,YiMu,WillySusilo,andXinyiHuang.“ConvertibleUndeniableProxySignatures:SecurityModelsandEfficientConstruction”.InInformationSecurityApplications,8thInternationalWorkshop,WISA2007,LectureNotesinComputerScience4867:16-29.Springer,2008.
    WeiWu,YiMu,WillySusilo,andXinyiHuang.“ProvablySecureIdentity-BasedUndeniableSignatureswithSelectiveandUniversalConvertibility”.InInformationSecurityandCryptology,ThirdSKLOISConference,Inscrypt2007,LectureNotesinComputerScience4990:25-39.Springer,2008.
    RaylinTso,XunYi,andXinyiHuang.“EfficientandShortCertificatelessSignature”.InCryptologyandNetworkSecurity,7thInternationalConferenceCANS2008,LectureNotesinComputerScience5339:64-79.Springer,2008.

    -----2007-----


    XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“BreakingandRepairingTrapdoor-FreeGroupSignatureSchemesfromAsiacrypt'2004”.JournalofComputerScienceandTechnology22(1):71-74.Springer,2007.
    XinyiHuang,YiMu,WillySusilo,andWeiWu.“ProvablySecurePairing-BasedConvertibleUndeniableSignaturewithShortSignatureLength”.InPairing-BasedCryptography-Pairing2007,FirstInternationalConference,LectureNotesinComputerScience4575:367-391.Springer,2007.
    XinyiHuang,YiMu,WillySusilo,DuncanS.Wong,andWeiWu.“CertificatelessSignatureRevisited”.InInformationSecurityandPrivacy,12thAustralasianConference,ACISP2007,LectureNotesinComputerScience4586:308-322.Springer,2007.
    XinyiHuang,YiMu,WillySusilo,andWeiWu.“AGenericConstructionforUniversally-ConvertibleUndeniableSignatures”.InCryptologyandNetworkSecurity,6thInternationalConference,CANS2007,LectureNotesinComputerScience4856:15-33.Springer,2007.
    WeiWu,YiMu,WillySusilo,JenniferSeberry,andXinyiHuang.“Identity-BasedProxySignaturefromPairings”.InAutonomicandTrustedComputing,4thInternationalConference,ATC2007,LectureNotesinComputerScience4610:22-31.Springer,2007.JiguoLi,XinyiHuang,YiMu,WillySusilo,andQianhongWu.“Certificate-BasedSignature:SecurityModelandEfficientConstruction”.InPublicKeyInfrastructure,4thEuropeanPKIWorkshop:TheoryandPractice,EuroPKI2007,LectureNotesinComputerScience4582:110-125.Springer,2007.YongYu,BoYang,XinyiHuang,andMingwuZhang.“EfficientIdentity-BasedSigncryptionSchemeforMultipleReceivers”.InAutonomicandTrustedComputing,4thInternationalConference,ATC2007,LectureNotesinComputerScience4610:13-21.Springer,2007.DennisY.W.Liu,DuncanS.Wong,XinyiHuang,GuilinWang,QiongHuang,YiMu,andWillySusilo.“FormalDefinitionandConstructionofNominativeSignature”.InInformationandCommunicationsSecurity,9thInternationalConference,ICICS2007,LectureNotesinComputerScience4861:57-68.Springer,2007.

    -----2006-----

    LiSujuan,ZhangFutai,andHuangXinyi.“AnEfficientDesignated-verifierProxySignatureScheme”.ComputerEngineering32(23):148-150,2006.XinyiHuang,FutaiZhang,andWeiWu.“Identity-basedRingSigncryptionScheme”(inChinese),TienTzuHsuehPao/ActaElectronicaSinica34(2):263-266.2006.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“Short(Identity-Based)StrongDesignatedVerifierSignatureSchemes”.InInformationSecurityPracticeandExperience,SecondInternationalConference,ISPEC2006,LectureNotesinComputerScience3903:214-225.Springer,2006.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“RestrictedUniversalDesignatedVerifierSignature”.InUbiquitousIntelligenceandComputing,ThirdInternationalConference,UIC2006,LectureNotesinComputerScience4159:874-882.Springer,2006.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“CertificatelessDesignatedVerifierSignatureSchemes”.In20thInternationalConferenceonAdvancedInformationNetworkingandApplications,AINA2006:15-19.IEEEComputerSociety,2006.XinyiHuang,WillySusilo,YiMu,andWeiWu.“UniversalDesignatedVerifierSignatureWithoutDelegatability”.InInformationandCommunicationsSecurity,8thInternationalConference,ICICS2006,LectureNotesinComputerScience4307:479-498.Springer,2006.XinyiHuang,WillySusilo,YiMu,andWeiWu.“ProxySignatureWithoutRandomOracles”.InMobileAd-hocandSensorNetworks,SecondInternationalConference,MSN2006,LectureNotesinComputerScience4325:473-484.Springer,2006.

    -----2005-----

    YiMu,WillySusilo,andXinyiHuang.“EfficientBroadcastfromTrapdoorFunctions”.InThe4thInternationalWorkshopforAppliedPKI(IWAP'05):240-248.IOSPress,2005.WillySusilo,YiMu,andXinyiHuang.“SecureKeyExtractioninComputerNetworks”.InThe8thInternationalSymposiumonDSPandCommunicationSystems&4thWorkshopontheInternet,TelecommunicationsandSignalProcessing(DSPCS'2005&WITSP'2005),2005.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“OntheSecurityofCertificatelessSignatureSchemesfromAsiacrypt2003”.InCryptologyandNetworkSecurity,4thInternationalConference,CANS2005,LectureNotesinComputerScience3810:13-25.Springer,2005.XinyiHuang,YiMu,WillySusilo,FangguoZhang,andXiaofengChen.“AShortProxySignatureScheme:EfficientAuthenticationintheUbiquitousWorld”.InTheSecondInternationalSymposiumonUbiquitousIntelligenceandSmartWorlds,UISW2005,LectureNotesinComputerScience3823:480-489.Springer,2005.XinyiHuang,YiMu,WillySusilo,andFutaiZhang.“ShortDesignatedVerifierProxySignaturefromPairings”.InTheFirstInternationalWorkshoponSecurityinUbiquitousComputingSystems,SecUbiq2005,LectureNotesinComputerScience3823:835-844.Springer,2005.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“Identity-basedRingSigncryptionSchemes:CryptographicPrimitivesforPreservingPrivacyandAuthenticityintheUbiquitousWorld”.TheFirstInternationalWorkshoponUbiquitousSmartWorlds(USW2005),inconjunctionwiththe19thIEEEInternationalConferenceofAINA2005:649-654.IEEEComputerSociety,2005.
硕士研究生:2011级:连艳玲(与许力教授合作指导)
2012级:侯书权、李梦婷2013级:刘江华、杨旭


相关话题/数学