删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

电子科技大学计算机科学与工程学院导师教师师资介绍简介-汪小芬

本站小编 Free考研考试/2021-09-05

导师代码: 11276
导师姓名: 汪小芬
性别: 女
特称:

职称: 副教授
学位: 军事学博士学位
属性: 专职
电子邮件: wangxuedou@sina.com



学术经历: 担任IEEE Transactions on Information Forensics and Security,Secure Communication Networks, Transactions on Internet and Information Systems,电子科技大学学报等多个杂志的审稿人。担任The First EAI International Conference on Security and Privacy in New Computing Environments国际会议的程序委员会委员。


个人简介: 本人分别于2009年和2006年在西安电子科技大学获密码学博士和硕士学位。2003年毕业于电子科技大学,获计算机科学与技术学士学位。2014年8月至2015年8月在澳大利亚卧龙岗大学访问研究。曾在IEEE Transactions on Information Forensics and Security,Information Sciences,Journal of Computer Science and Technology等著名国际期刊,Australasian Conference on Information Security and Privacy (ACISP)著名国际会议发表论文共计23篇,出版重点大学信息安全专业规划教材《现代密码学》一部。研究方向是网络空间安全,主要集中于对密码学理论与技术、云安全、大数据安全、网络和系统安全进行研究。


科研项目: 1.**医疗信息化平台可验证的隐私保护数据搜索的研究国家自然科学基金2016.01-2018.1224.3512.2012-科-670×××研究与系统实现国家242信息安全计划2012.09-2013.095023.×××协同与决策技术***研究所2012.11-2013.103014.论坛POST数据特征分析江苏金陵科技集团有限公司2014.04-2015.03151


研究成果: Journal Papers1. One Round Secure Fair Meeting Location Determination Based on Homomorphic Encryption, Xiaofen Wang, Information Sciences, accepted, August 4, 2016. 2. An Efficient Privacy-Preserving Aggregation and Billing Protocol for Smart Grid, Xiaofen Wang, Yi Mu and Rongmao Chen, Security and Communication Networks, accepted, August 4, 2016. 3. Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group, Xiaofen Wang, Yi Mu, Rongmao Chen and Xiaosong Zhang, Journal of Computer Science and Technology, (to appear). Acceptance Date: 26 Jan. 2016. [url] 4. Privacy-Preserving Data Search and Sharing Protocol for Social Networks through Wireless Applications, Xiaofen Wang, Yi Mu and Rongmao Chen, Concurrency and Computation: Practice and Experience, (publish online). 5. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications, Xiaofen Wang, Yi Mu and Rongmao Chen, IEEE Transactions on Information Forensics and Security, 11(8): 1712-1721 (2016). [url]6. Certificate Based Anonymous Authentication Protocol for Vehicular Ad Hoc Network, Xiaofen Wang, Tang Liu and Guozhen Xiao, IETE Technical Review, 29(5): 388-393 (2012). [url]7. Improvement of McCullagh-Barreto key agreement with KCI-security, Wang Xiaofen, Dong Qingkuan, Zhou Yu and Guozhen Xiao, The journal of China university of posts and telecommunications, 16(2): 68-71(2008). [url]8. Online/offline Ciphertext Retrieval on Resource Constrained Devices, Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang and Qiaoyan Wen, The Computer Journal, Oxford, Publish Online (2015) 9. Server-Aided Public-Key Encryption With Keyword Search,Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang and Xiaofen Wang, IEEE Transactions on Information Forensics and Security, (to appear). Acceptance Date: 19 Jul. 2016. [url]10. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage,Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo and Xiaofen Wang, IEEE Transactions on Information Forensics and Security, 11(4): 789-798 (2016). [url] 11. SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds, Yong Yu, Jianbing Ni, Qi Xia, Xiaofen Wang, Haomiao Yang and Xiaosong Zhang, Concurrency and Computation: Practice and Experience, 28(10): 2877-2888 [url] 12. BL-MLE-PC: Block Level Message Locked Encryption with Polynomial Commitment for Deduplication, Ke Huang, Xiaosong Zhang and Xiaofen Wang, Journal of Information Science and Engineering (JISE), accepted. 13. Privacy-enhanced distance computation with applications, Xiaojuan Chen, Yi Mu, Xiaofen Wang and Runhua Shi, IJESDF 8(3): 234-249 (2016) [url]14. Security Flaw of an improved user authentication scheme with user anonymity for wireless communications, Hu Xiong, Xiaofen Wang and Fagen Li, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E95-A(1): 256-258 (2012).[url]15. An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages, Haomiao Yang, Hyunsung Kim, Hongwei Li and Xiaofen Wang, KSII Transactions on Internet and Information Systems, 7(10): 2544-2560 (2013). [url]16. EA-MTSP: Efficient Authentication for Multiple Third-Party Service Providers in Smart Grids, Haomiao Yang, Xiaofen Wang, Jiang Deng and Jing Zeng, IETE Technical Review, 31(2):143-152 (2014) [url]17. Research on the Energy Hole Problem Based on Non-uniform Node Distribution for Wireless Sensor Networks, Tang Liu, Jian Peng, Xiaofen Wang, Jin Yang and Bing Guo, TIIS, 6(9): 2017-2036 (2012).[url]Conference Publications1. Content-Based Encryption, Xiaofen Wang, Yi Mu, 20th Australasian Conference on Information Security and Privacy (ACISP), 2016: 57-72. 2. Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud, Xiaofen Wang, Xiaosong Zhang, Yi Mu, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015: 1024-1031. [url]3. Provably Secure Certificateless Authenticated Key Agreement Protocol in the Standard Model, Xiaofen Wang, Xiongda Li, 2010 First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA), 2010: 45-48. [url]4.Oblivious Keyword Search with Authorization, Peng Jiang, Xiaofen Wang,Jianchang Lai, Fuchun Guo and Rongmao Chen, ProvSec 2016, accepted. 5. A New General Framework for Secure Public Key Encryption with Keyword Search,Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo and Xiaofen Wang, 20th Australasian Conference on Information Security and Privacy (ACISP), 2015: 59-76. 6. Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem, Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang, CollaborateCom 2015: 243-256.


专业研究方向: 专业名称 研究方向 招生类别
083900网络空间安全 01密码理论与技术 硕士
083900网络空间安全 03大数据与人工智能安全 硕士
083900网络空间安全 04云计算与物联网安全 硕士
083900网络空间安全 06区块链理论与应用 硕士









相关话题/工程学院 计算机科学