服务热线: 029-81121637

陕西省高价值专利转移转化公共服务平台

请使用手机扫描二维码,登录网站手机版。

闫峥 职 教授

  • 2021-06-05
  • 37
  • 办公室
专业领域
高校院所及科研机构类
 工作经历
申请人获西安交通大学信息科学与工程学士学位,西安交通大学计算机组织与体系结构硕士学位和新加坡国立大学信息安全硕士学位,赫尔辛基工业大学(即现在的 Aalto 大学)网络技术副博士学位和电子工程博士学位。1997 年 8 月至 1999 年 3 月在新加坡 Kent Ridge Digital Labs(即现在的 I2R)担任研究学者,1999 年 3 月至 2000 年 7 月任新加坡 Singalab 公司软件工程师,2000 年 7月至 2011 年任芬兰诺基亚研究中心高级研究员。2011 年 7 月起任西安电子科技大学教授,同时任芬兰 Aalto 大学荣誉客座和访问教授,芬兰科学院 Academy Research Fellow, IET Fellow, IEEE高级会员。陕西省”百人计划”特聘专家。参与和领导了 30 多项科研项目,其中主持项目 20 多项,包括两项跨国合作项目、欧盟信息技术高端项目、芬兰科学院资助项目、芬兰国家技术 CXJ(TEKES)研究项目、科技部重点研发项目(子课题负责)、NSFC 项目、中国教育部项目、陕西省自然科学基金重大基础研究项目、诺基亚重大项目、长期研究项目、国际标准支持项目和诺基亚与大学合作项目及技术向产品转换项目。主要研究领域为信任管理和可信计算、信息与网络安全、隐私保护、社交网络、数据挖掘、普适计算和云计算等。发表论文 300 余篇,其中有 240 多篇论文被 SCI 或EI 检索,单篇论文最高他引量为 1000+。独立编著一本关于信任模型和管理的英文专著,独立撰写一部关于实用自治信任管理的英文专著,编辑会议录 9 部。37 项国际发明专利及 50 项 PCT 专利,其中独立发明 30 项。若干授权国际专利已被国际标准采纳,大部分专利技术被工业界采纳或收购,一些专利技术已经被广泛使用。在国际会议及欧美等知名高校特邀报告 30 余次,介绍自己在信任管理和可信计算方面的研究成果。担任 IEEE IoT Journal (中科院 1 区),Information Fusion (中科院 1 区), IEEE Network Magazine (中科院 1 区), Information Sciences (中科院 2 区), JNCA (中科院 2 区), IEEE Access (中科院 3 区), Soft Computing (中科院 3 区), SCN (Wiley), KSII TIIS, 网络与信息安全学报, 信息网络安全等 15 种期刊领域主编、副主编或编委,曾任 IEEE TII, IEEE JBHI, IEEE TNSE, IEEE Systems Journal, ACM TOMM, Future Generation Computer Systems, Computers & Security IJCS (Wiley), ACM/Springer MONET, IET Information Security 等 30 多个个国际期刊客座编委,及30 多个国际期刊(如 IEEE TDSC,IEEE TPDS, IEEE TIFS, IEEE TNSM, ACM TIST,IEEE Security & Privacy, IEEE Computer, IEEE Networking, Information Sciences, IEEE Communications Magazine, IEEE Journal of Cloud Computing 等)稿件评阅人。作为指导委员会共同主席发起 IEEE Blockchain 国际会议,作为大会主席或程序委员会主席主办 IFIP Networking 2021, IEEE Blockchain 2018, IEEE TrustCom / BigDataSE / ISPA-2015, EAI MobiMedia2016, IEEE CIT2014, CSS2014, IEEE DASC2012 , IEEE CIT2017, NSS2017, ICA3PP2017 ,TrustID2011/2012/2013, IEEE/IFIP DMIoT2013/2014/2015 等国际会议。担任 40+个国际会议的组织委员会委员和 70+国际会议 TPC 委员。担任国家科技发明奖网络评委、”863 计划”和 NSFC 项目评委,加拿大自然科学基金和波兰自然科学基金评委。受邀担任海外高校博士答辩委员会主席或委员。与芬兰、加拿大、新加坡、美国、澳大利亚等国家的多位学者有密切的学术合作。最近荣获 2021 N2Women: Stars in Computer Networking and Communications、诺基亚卓越发明人奖(2020)、AALTO ELEC Impact Award (2020)、2017 年 IEEE ComSoc TBD 最佳期刊论文奖、2017 年和 2018 年 IEEE Access 期刊杰出编委、SpaCCS2019 最佳论文奖。连续两年入选爱思唯尔中国高被引学者。

 主要成果
主要成果 1:普适社交网匿名信任认证和访控系统实现可信且隐私保护的本地和全局信任评估,保护信任相关数据提供者隐私,抗恶语、开关和矛盾行为等攻击,支持异构网络;支持自适应于信任关系、社交场景和网络载体的社交数据访问控 制(手机端加解密时间<70 毫秒);提供中心化、半中心化和去中心化的匿名信任认证,在保护社交对象身份隐私的情况下,认证其信任等级,解决了隐私保护与信任证明的矛盾;可以应用于多种场景,如基于信任的群聊、位置分享、服务访问和提供等。相关论文、专利和软件著作权情况如下:
已发表论文:
1. W. X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access
Control”, IEEE Transactions on Dependable and Secure Computing, Vol. 17, No. 2, pp. 363-376,
March/April, 2020.
2. W. X. Ding, Z. Yan*, R.H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”,
Information Sciences, Vol. 409-410, pp. 35-55, October, 2017.
3. W. X. Ding, R. Hu, Z. Yan*, X. R. Qian, R. H. Deng, L. T. Yang, M. X. Dong, “An Extended
Framework of Privacy-Preserving Computation with Flexible Access Control”, IEEE Transactions
on Network and Service Management, Vol. 17, Issue 2, pp. 918-930, June 2020.
4. W. X. Ding, X. R. Qian, R. Hu, Z. Yan*, R. H. Deng, “Flexible Access Control over
Privacy-Preserving Cloud Data Processing”, book chapter of Innovation in Cybersecurity
Education, edited by Kevin Daimi and Guillermo Francia III, 2020.
5. R. Hu, W. X. Ding*, Z. Yan, “Privacy-preserving Computation over Encrypted Vectors”, IEEE
GLOBECOM 2020, December 7-11, Taipei, Taiwan.
6. W. X. Ding, Z. Yan, X. R. Qian, R. H. Deng, “Computing Maximum and Minimum with Privacy.
Preservation and Flexible Access Control”, IEEE GLOBECOM 2019, Waikoloa, Hawaii, USA,
December 9–13, 2019.
7. X. X. Yu, Z. Yan*, A. V. Vasilakos, “A Survey of Verifiable Computation”, Mobile Networks and
Applications, Springer, 22(3), pp. 438-453, June 2017.
8. A. T. Li, Y. Chen, Z. Yan*, X. K. Zhou, S. Shimizu, “A Survey on Integrity Auditing for Data Storage
in Cloud: from Single Copy to Multiple Replicas”, IEEE Transactions on Big Data, 2020. Doi:
10.1109/TBDATA.2020.3029209
9. Z. Yan*, X. X. Yu, W. X. Ding, “Context-Aware Verifiable Cloud Computing”, IEEE Access, Vol. 5,
pp. 2211 – 2227, Feb. 9 2017.
10. X. X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”,
Information Sciences, Vol. 479, pp. 372-385, April 2019.
11. Y. X. Chen*. Q. H. Zheng, Z. Yan, D. Liu, “QShield: Protecting Outsourced Cloud Data Queries
with Multi-user Access Control Based on SGX”, IEEE Transactions on Parallel and Distributed
Systems, Vol. 32, Issue 2, pp. 485-499, Feb. 2021. Doi: 10.1109/TPDS.2020.3024880
12. J. W. Wang, X. Y. Jing, Z. Yan*, Y. L. Fu, W. Pedrycz, L. T. Yang, “A Survey on Trust Evaluation
Based on Machine Learning”, ACM Computing Surveys, 53, 5, Article 107, August 2020, 36
pages.
13. S.S. Liu, L.F. Zhang, Z. Yan*, “Predict Pairwise Trust based on Machine Learning in Online Social
Networks: A Survey”, IEEE Access, vol. 6, issue 1, pp. 51297-51318, December 2018.
14. Z. Yan*, X.Y. Jing, W. Pedrycz, “Fusing and Mining Opinions for Reputation Generation”,
Information Fusion, Vol. 36, pp. 172-184, July 2017.
15. Z. Yan*, L. Peng, W. Feng, L. T. Yang, “Social-Chain: Decentralized Trust Evaluation Based on
Blockchain in Pervasive Social Networking”, ACM Transactions on Internet Technology, 2020.
(accepted)
16. W. Feng, Z. Yan*, L. T. Yang, Q. H. Zheng, “Anonymous Authentication on Trust in
Blockchain-Based Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2020. Doi:
10.1109/JIOT.2020.3018878
17. Zheng Yan*, Method and Apparatus for Decentralized Trust Evaluation in a Distributed
Network, Patent Application No. PCT/CN2018/089497, Filed Date 1-June-2018. Nokia code:
105235.
18. P. Wang, N. Wang, M. Dabaghchian, K. Zeng, Z. Yan, “Optimal Resource Allocation for Secure
Multi-User Wireless Powered Backscatter Communication with Artificial Noise”, IEEE INFOCOM
2019, Paris, France, April 29 - May 2, 2019.
19. C. Y. Huang, Z. Yan*, N. Li, M. J. Wang, “Secure Pervasive Social Communications Based on Trust
in a Distributed Way”, IEEE Access, vol. 4, pp. 9225 – 9238, Jan. 4, 2017.
20. N. Li, Z. Yan*, M. J. Wang, L. T. Yang, “Securing Communication Data in Pervasive Social
Networking Based on Trust with KP-ABE”, ACM Transactions on Cyber-Physical Systems, Vol. 3,
Issue 1, 23 pages, article 9, September 2018.
21. M. J. Wang, Z. Yan*, V. Niemi, “UAKA-D2D: Universal Authentication and Key Agreement
Protocol in D2D Communications”, Mobile Networks and Applications, 22(3), pp. 510-525, June
2017.
22. Z. Yan*, H. M. Xie, P. Zhang, B. B. Gupta, “Flexible Data Access Control in D2D
Communications”, Future Generation Computer Systems, 2017. Doi:
10.1016/j.future.2017.08.052
23. M. J. Wang, Z. Yan*, “Privacy-Preserving Authentication and Key Agreement Protocols for D2D
Group Communications”, IEEE Transactions on Industrial Informatics, Vol. 14, Issue 8, pp.
3637-3647, August 2018.
24. W. Feng, Z. Yan*, H. M. Xie, “Anonymous Authentication on Trust in Pervasive Social
Networking Based on Group Signature”, IEEE Access, Vol. 5, Issue 1, pp. 6236-6246, 2017.
25. Z. Yan*, P. Wang, W. Feng, “A Novel Scheme of Anonymous Authentication on Trust in
Pervasive Social Networking”, Information Sciences, Vol. 445-446, pp. 79-96, June 2018.
26. P. Wang, L. M. He, Z. Yan* and W. Feng, “AnonyTrust: an Anonymous Trust Authentication
System for Pervasive Social Networking”, International Conference on Security and Privacy in
Digital Economy, QuZhou, Zhejiang, China, Oct. 30 – Nov. 1, 2020.
27. Z. Yan*, W.Y. Shi, “CloudFile: A Cloud Data Access Control System based on Mobile Social Trust”,
Journal of Network and Computer Applications, Vol. 86, pp. 46-58, May 15, 2017.
28. Z. L. Wang, G. Guang, “Discrete Fourier Transform of Boolean Functions over the Complex Field
and Its Applications”, IEEE Transactions on Information Theory, 2018.4, 64(4): 3000~3009.
29. Z. Yan*, C. Z. Wu, W. Feng, Z. L. Wang, “可信普适社交通信综述” (A Survey on Trustworthy
Pervasive Social Networking), Chinese Journal of Network and Information Security 网络与信息安全学报, 2(2), 2016.
已申请/授权专利:
30. Wenxiu Ding, Zheng Yan*, Schemes of Homomorphic Re-encryption, Application No.
PCT/CN2015/097013, Filed Date 2015-12-10. Grant Country: United States, Grant No.
US10778657, Grant Date: 2020-09-15.
31. Zheng Yan*, Method and Apparatus for Privacy-Enhanced Evidence Evaluation, Patent
application No. PCT/CN2013/081824, Filed Date 2013-08-20. Grant Country: United States,
Grant No. US10158649, Grant Date: 2018-12-18.
32. Wenxiu Ding, Zheng Yan*, Privacy-Preserving Maximum and Minimum Computations,
Application No. PCT/CN2018/074627, Filed Date 2018-01-30.
33. 刘丹,陈亚兴,郑庆华,闫峥,丁文秀*,董博,一种面向 SGX 的轻量级的外包数据访问
控制方法及控制系统 (A Lightweight Outsourced Data Access Control System Based on SGX),
申请号 201910345813.7,申请日期:2019-04-26.
34. 丁文秀*,闫峥,胡蕊,钱薪任,一种支持灵活访问控制的隐私保护大数据处理方法及系
统 (Privacy-Preserving Big Data Processing with Flexible Access Control) ,申请 号
201910261510.7,申请日期:2019-04-02.
35. 丁文秀*,闫峥,胡蕊,钱薪任,一种支持溢出检测和大整数运算的信息处理方法及应用 (A
Method of Overflow Detection and Big Integer Computation),申请号 201811318036.9,申请
日期:2018-11-07.
36. Zheng Yan*, Context-aware Verifiable Computing, Patent application No. PCT/CN2014/073050,
Filed Date 2014-03-07, Nokia Code: 84370. Grant Country: Japan, Grant No. JP6234607, Grant
Date: 2017-11-02.
37. Xixun Yu, Zheng Yan*, Verifiable Outsourced Data Computation, Application No.
PCT/CN2017/089216, Filed Date 2017-06-20.
38. Zheng Yan*, Wei Sun, Wenxiu Ding, An Efficient and Secure Method for Verifiable Computation
with Intel SGX, Application No. PCT/CN2019/101427, Filed Date: 2019-08-19.
39. Zheng Yan*, A Hybrid Method to Flexibly Secure Pervasive Social Networking Based on
2-Dimentional Trust Levels, Application No. PCT/CN2012/073415, Filed Date 2012-3-31. Grant
Country: United States, Grant No. US10045208, Grant Date: 2018-08-07.
40. Zheng Yan*, Preservation of User Data Privacy in a Network, Application No.
PCT/IB2010/051626, Filed Date 2009-12-7. Grant Country: United States, Grant No.
US9077690, Grant Date: 2015-07-07.
41. Zheng Yan*, Methods, Apparatuses, and Computer-Readable Storage Media for Securely
Accessing Social Networking Data, priority patent application number: PCT/CN2012/071982,
Application Date: 2012-03-06. Grant Country: United States, Grant No. US9465950, Grant Date:
2016-10-11.
42. Zheng Yan*, Method and Apparatus of Secure Recognization for Pervasive Face-to-Face Social
Communications, priority patent application number: PCT/CN2012/075172, Filed Date
2012-5-8. Grant Country: United States, Grant No. US9509835, Grant Date: 2016-11-29.
43. Zheng Yan*, Method and Apparatus for Data Access Control, priority patent application
number: PCT/CN2012/083601, Filed Date 2012-10-26. Grant Country: United States, Grant No.
US9602480, Grant Date: 2017-03-21.
44. Zheng Yan*, Systems, Methods, and Apparatuses for Facilitating Determination of a Message
Recipient, Application No. PCT/IB2009/055561, Filed Date 2010-4-15. Country of Grant: United
States, Grant No. US9686219, Grant Date: 2017-6-20.
45. Zheng Yan*, Method and Apparatus for Providing Access Control to Shared Data Based on Trust
Level, PCT/CN2012/081761, Filed Date 2012-9-21. Grant Country: United States, Grant No.
US9769124, Grant Date: 2017-09-19.
46. Mingjun Wang, Zheng Yan*, Privacy Preserving Authentication and Key Agreement Protocol
(PPAKA) for Group Device-to-Device (D2D) Communications, Application No.
PCT/CN2016/093624, Filed Date 2016-08-05. Grant Country: United States, Grant No.
US10757569, Grant Date: 2020-08-25.
47. Zheng Yan*, A Method of Anonymous and Trustworthy Authentication in Pervasive Social
Networking, Patent application No. PCT/CN2013/077856, Filed Date 2013-06-25. Grant
Country: United States, Grant No. US10291587, Grant Date: 2019-05-14.
48. Mingjun Wang, Zheng Yan, Secure and Privacy-Preserving Authentication and Key Agreement
for D2D Relay, Patent Application No. PCT/CN2019/084334, Filed Date 2019-04-25. Nokia code:
316008.
已申请软件著作权:
49. 王普,闫峥*,史汪洋,藺华庆,李宁,FlexiFile:个人云数据访问控制系统仿真软件,
2017-03-01, 软件著作权 No. 2017SR362395.
50. 徐坤,闫峥,具有隐私保护功能的移动应用推荐系统,V1.0, 19.07.2018, 软件著作权 No.
2018SR565202.
51. 吴宸梓,闫峥,普适社交网安全匿名认证聊天测试平台,V1.0, 01.02.2018, 软件著作权 No.
2018SR185041.
52. 贺丽梅,闫峥*,DogChat 可信匿名社交软件 V1.0,2019-02-20, 软件著作权 No.
2019SR0273226.
主要成果 2:终端软件信任评估、安全推荐和恶意软件检测系统
基于用户信任行为对移动 App 进行信任/信誉评估,克服信任主观性难以客观表达和推荐可信
性难衡量等挑战,抗恶语、开关和矛盾行为等攻击;信任评估过程中保护用户使用 App 的行为隐
私;提供基于信任评估和使用行为的个性化 App 推荐以及 App 安全配置推荐,比默认配置的危险
度降低 2 倍;采用 SGX 和半同态加密两条技术路线,基于系统函数调用链异常/正常模版,通过压
缩数据匹配实现高效和隐私保护的外包恶意软件检测。相关论文、专利和软件著作权情况如下:
已发表论文:
53. K. Xu, W. D. Zhang, Z. Yan*, “A Privacy-Preserving Mobile Application Recommender System
Based on Trust Evaluation”, Journal of Computational Science, 26, pp. 87-107, May 2018.
54. L. F. Wei, W. Q. Luo, J. Weng, Y. J. Zhong, X. Q. Zhang, and Z. Yan, “Machine Learning-based
Malicious Application Detection of Android”, Vol. 5, No. 1, pp. 25591-25601, IEEE Access, 2017.
55. P. Yan, Z. Yan*, “A Survey on Dynamic Mobile Malware Detection”, Software Quality Journal,
Vol. 26, No. 3, pp. 0963-9314, 2018.
56. Y. L. Fu*, Z. Yan, J. Cao, O. Kone, X. F. Cao, "An Automata Based Intrusion Detection Method for
Internet of Things", Mobile Information Systems, Vol. 2017, Article ID 1750637, 13 pages,
2017.
57. F. Tong, Z. Yan*, “A Hybrid Approach of Mobile Malware Detection in Android”, Journal of
Parallel and Distributed Computing, Vol. 103, pp. 22-31, May 2017.
58. L. Chen, Z. Yan*, W. D. Zhang, R. Kantola, “TruSMS: a Trustworthy SMS Spam Control System
Based on Trust Management”, Future Generation Computer Systems, Vol. 49, August 2015, pp.
77–93.
59. J. Z. Wang, Z. Yan, L. T. Yang, B. X. Huang, “An Approach to Rank Reviews by Fusing and Mining
Opinions Based on Review Pertinence”, Information Fusion, 23 (2015), pp. 3–15, 2015.
60. Z. Yan*, Y. Chen, Y. Shen, “PerContRep: A Practical Reputation System for Pervasive Content
Services”, Supercomputing, Springer, Vol. 70, Issue 3 (2014), pp.1051-1074, 2014.
61. Z. Yan*, Y. Chen, Y. Shen, “A Practical Reputation System for Pervasive Social Chatting”, Journal
of Computer and System Sciences, Elsevier, Vol. 79, Issue 5, pp. 556-572, 2013.
62. Z. Yan*, C. H. Liu, V. Niemi, G. L. Yu, “Exploring the Impact of Trust Information Visualization on
Mobile Application Usage”, Journal of Personal and Ubiquitous Computing, Springer, Vol. 17,
Issue 6, pp. 1295-1313, 2013.
63. Z. Yan*, Y. Dong, V. Niemi, G. L. Yu, “Exploring Trust of Mobile Applications Based on User
Behaviors: An Empirical Study”, Journal of Applied Social Psychology, Vol. 43, No. 3, pp.
638-659, 2013.
64. Z. Yan*, P. Zhang, R. H. Deng, “TruBeRepec: A Trust-Behavior-Based Reputation and
Recommender System for Mobile Applications”, Journal of Personal and Ubiquitous
Computing, Springer, Vol. 16, Issue 5, pp. 485-506, 2012.
65. Z. Yan*, C. Prehofer, “Autonomic Trust Management for a Component Based Software System”,
IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, pp. 810-823, 2011.
66. 姚震,张卫东,党田力,闫峥* (Z. Yan*),“基于信任行为的移动应用信任系统的实现”
(Implementation of a Mobile App Trust Management System Based on Trust Behavior),信息网络安全[J], 2018 第 6 期.
67. 程艳晓,闫峥* (Z. Yan*),王普,“PermitRec: 基于信任管理的移动终端安全设置推荐系 统” (PermitRec: a Mobil App Security Configuration Recommender System Based on Trust
Management),中国科技论文[J], 2017.
68. Z. Yan*, Y. X. Cheng, P. Yan, R. H. Deng, “Trust Management in Mobile Platforms”, Handbook of
Digital Banking and Internet Finance, David Lee and Robert Deng (ed.), Elsevier, pp. 83-114,
2018.
69. Y. X. Cheng, Z. Yan*, “PerRec: A Permission Configuration Recommender System for Mobile
Apps”, the 4th International Workshop on Data, Text, Web, and Social Network Mining
(DTWSM 2017), in the 17th International Conference on Algorithms and Architectures for
Parallel Processing (ICA3PP-2017), Helsinki, Finland, August 21-23, 2017.
70. K. Xu, Z. Yan*, “Privacy Protection in Mobile Recommender Systems: A Survey”, The 9th
International Conference on Security, Privacy and Anonymity in Computation, Communication
and Storage (SpaCCS 2016), LNCS, Springer, Zhangjiajie, China, pp. 305-318, Nov. 16-18, 2016.
71. W. Tang, Z. Yan*, “CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive
QoS Management”, IEEE TrustCom/BigDataSE/ISPA, Vol. 1, pp. 9-16, Helsinki, Finland, August
20-22, 2015.
72. T. L. Dang, Z. Yan*, F. Tong, W. D. Zhang, P. Zhang, “Implementation of a Trust-Behavior based
Reputation System for Mobile Applications”, in Proc. of the 2014 Ninth International
Conference on Broadband and Wireless Computing, Communication and Applications, pp.
221-228, Guangzhou, China, November 8-10, 2014.
73. L. Chen, Z. Yan*, W. D. Zhang, R. Kantola, “Implementation of an SMS Spam Control System
Based on Trust Management”, in Proc. of IEEE CPSCom 2013, Beijing, China, pp. 887-894,
August 20-23, 2013.
已申请/授权专利:
74. Zheng Yan, A Method for Mobile Malware Detection, Nokia Code: 84270, Patent application
No. PCT/CN2013/090887, Filed Date 2013-12-30. Grant Country: Japan, Grant No. JP6188956,
Grant Date: 2017-08-10.
75. 闫峥* (Z. Yan*),程艳晓,一种基于信任管理的移动应用安全设置推荐系统 (A Permission
Configuration Recommender System for Mobile App Based on Trust Management),申请号
201710197948.4,申请日期:2017-03-29,主分类号 G06F 21/51, Grant Country: China,
Application No. 201710197948.4, Granted Date: 2019-12-09,Patent No. 授权公告号
CN107122655B.
76. 闫峥* (Z. Yan*),徐坤,云服务下具有隐私保护功能的移动应用推荐系统及方法
(Privacy-Preserving Mobile App Recommender System Based on Cloud Computing),申请号
201710405983.0,申请日期:2017-08-21,授权日期:2020-05-07,Patent No. 授权公告号
CN107248980B.
77. 徐坤,闫峥* (Z. Yan*),基于信任融合与过滤的具有隐私保护的移动应用推荐方法
(Privacy-Preserving Mobile App Recommendation Based on Trust Fusion and Filtering),申请号
201810092156.5,申请日期:2018-01-31, 授权日期:2021-04-09,Patent No. 授权公告号
CN108430050B.
78. 王静雯,闫峥* (Z. Yan*),于熙洵,彭立,魏文涛,具有隐私保护的多恶意软件混合检测
方法、系统、装置(A Hybrid Privacy-preserving Method for Malware Detection),申请号:
202010097900.8,申请日期:2020.02.17. 授权日期:2022-4-12, 授权号:CN11417121B.
79. 魏文涛,闫峥* (Z. Yan*),王静雯,隐私保护移动恶意软件检测方法、系统、存储介质及
应用 (A Method, System, and Application of Privacy-preserving Mobile Malware Detection),
申请号:202010078081.2,申请日期:2020.02.02.
80. 徐坤,闫峥* (Z. Yan*),基于信任融合与过滤的具有隐私保护的移动应用推荐方法
(Privacy-Preserving Mobile App Recommendation Based on Trust Fusion and Filtering),申请号
201810092156.5,申请日期:2018-01-31.
已申请软件著作权:
81. 徐坤,闫峥* (Z. Yan*),具有隐私保护功能的移动应用推荐系统 (Privacy-Preserving MobileApp Recommender System) , V1.0, 2018-07-19, Software Copyright Registration No.
2018SR565202.
82. 姚震,闫峥* (Z. Yan*),基于可信数据采集的软件定义网络应用的信任管理软件 (SDN App
Layer Trust Management System Based on Trustworthy Data Collection) V1.0,2018-03-07,
Software Copyright Registration No. 2018R11L636013.
83. 吴宸梓,闫峥* (Z. Yan*),普适社交网安全匿名认证聊天测试平台 (Anonymous
Authentication System for Pervasive Social Networking) V1.0, 2018-02-01, Software Copyright
Registration No. 2018SR185041.
84. 程艳晓,闫峥* (Z. Yan*),基于信任管理的移动终端安全设置推荐系统软件 V1.0 (Trust
Management based Mobile App Permission Configuration Recommender System Software
V1.0),2017-06-01, Software Copyright Registration No. 2017SR424745.
85. 徐坤,闫峥* (Z. Yan*),党田力,基于用户信任行为的 App 信任值生成仿真软件(TruBeRepec
客户端) V1.0 (TruBeRepec Mobile App Trust Evaluation SW),2017-04-10, Software Copyright
Registration No. 2017SR393160.
86. 赵 思 慧 , 闫 峥 * (Z. Yan*) , RecClient: 基 于 个 体 声纹挑战 身份认证 软 件
(Voiceprint-Challenge-Based Authentication System Software), 2017-04-01, Software Copyright
Registration No. 2017SR434242.
主要成果 3:移动众包去中心化信任管理系统
在零信任模型下,构建了基于区块链构建移动众包去中心化信任管理体系,通过”信任证明” 达成区块共识,确保活性、去中心化、去分叉、收益均衡,容错率达到 56%;根据主观反馈和客观 行为,利用 SGX 进行去中心化可信和隐私保护的信任评估,抗恶语、女巫等攻击;利用 SGX 在区
块链上实现匿名信任认证,个性化匿名更新,新匿名与信任值的秘密无缝链接,彻底解决了身份隐
私保护与信任评估的矛盾;采用由信任驱动的、基于拍卖的多目标激励机制,实现众包用户利益最 大化、社会福利最大化、社会信任最大化和社会资源消耗最小化,并激励各类实体的参与。相关论
文和专利情况如下:
已发表论文:
87. X. Q. Liang, Z. Yan*, K. Raimo, “GAIMMO: A Grade-driven Auction-based Incentive Mechanism
with Multiple Objectives for Decentralized Crowdsourcing”, IEEE Internet of Things Journal,
2022. Doi: 10.1109/JIOT.2022.3155631
88. G. Liu, Z. Yan*, W. Feng, X. Y. Jing, Y. X. Chen, M. Atiquzzaman, “SeDID: An SGX-enabled
Decentralized Intrusion Detection Framework for Network Trust Evaluation”, Information
Fusion, Vol. 70, pp. 100-114, June 2021.
89. W. Feng, Z. Yan*, L. T. Yang, Q. H. Zheng, “Anonymous Authentication on Trust in
Blockchain-Based Mobile Crowdsourcing”, IEEE Internet of Things Journal, 2020. Doi:
10.1109/JIOT.2020.3018878
90. Z. Yan*, L. Peng, W. Feng, L. T. Yang, “Social-Chain: Decentralized Trust Evaluation Based on
Blockchain in Pervasive Social Networking”, ACM Transactions on Internet Technology (TOIT),
Vol. 21, Issue 1, pp. 1-28, 2021.
91. J. W. Wang, X. Y. Jing, Z. Yan*, Y. L. Fu, W. Pedrycz, L. T. Yang, “A Survey on Trust Evaluation
Based on Machine Learning”, ACM Computing Surveys, 53, 5, Article 107, August 2020, 36
pages.
92. W. Feng, Y. F. Li, X. T. Yang, Z. Yan*, L. Chen, “Blockchain Based Data Transmission Control for
Tactical DataLink”, Digital Communications and Networks, Vol. 7, No. 3, pp. 285-294, August
2021.
93. L. Peng, W. Feng, Z. Yan*, Y. F. Li, X. K. Zhou, S. Shimizu, “Privacy Preservation in Permissionless
Blockchain: A Survey”, Digital Communications and Networks, Vol. 7, Issue 3, pp. 295-307,
August 2021.
94. G. Liu, H. D. Dong, Z. Yan*, X. K. Zhou, S. Shimizu, “B4SDC: A Blockchain System for Security
Data Collection in MANETs”, IEEE Transactions on Big Data, Vol. 7, No. 6, pp. 5329-5344, June
2020.
95. Y. F. Wang, Z. Yan*, W. Feng, S. S. Liu, “Privacy Protection in Mobile Crowd Sensing: A Survey”,
World Wide Web Journal, Vol. 23, No. 1, pp. 421-452, 2020.
96. W. Feng, Z. Yan*, “MCS-Chain: Decentralized and Trustworthy Mobile Crowdsourcing Based on
Blockchain”, Future Generation Computer Systems, Vol. 95, pp. 649-666, June 2019.
97. Z. Yan*, L. Peng, “Trust Evaluation Based on Blockchain in Pervasive Social Networking,” IEEE
Blockchain Technical Briefs, Sept. 2018.
98. W. Feng, Z. Yan*, H. R. Zhang, K. Zeng, Y. Xiao, T. Hou, “A Survey on Security, Privacy and Trust
in Mobile Crowdsourcing”, IEEE Internet of Things Journal, Vol. 5 No. 4, pp. 2971-2992, August
2018.
已申请/授权专利:
99. 冯伟,闫峥* (Z. Yan*),基于区块链的数据链信息流转控制系统及方法 (Data Link
Information Control Based of Blockchain),申请号 201811189926.4,申请日期:2018-10-12.
授权日期:2021-09-28, 授权号:CN109450856B.
100. 闫峥 (Z. Yan*),冯伟,一种去中心移动众包对信任的匿名认证方法及系统 (A Method or
System of Anonymous Authentication on Trust in Decentralized Mobile Crowdsourcing),申请
号 : 202010828585.1 ,申请 日 期 : 2020.08.18. 授 权 日 期 : 2021-09-24, 授 权号:
CN112187712B.
101. 李想,闫峥 (Z. Yan),支持属性隐私保护的去中心化众包方法、系统及终端,申请号:
202210334273.4,申请日期:2022.04.01.
102. 李想,闫峥 (Z. Yan),支持高效隐私保护的去中心化众包方法、系统及终端,申请号:
202210321790.8,申请日期:2022.03.30.
103. 闫峥 (Z. Yan),冯伟*,基于区块链的移动众包数据采集与处理系统及方法 (Mobile
Crowdsourcing Based on Blockchain),申请号 201811189392.5,申请日期:2018-10-12.
主要成果 4:基于高效可逆概要结构的网络异常分析检测系统
针对网络异常检测效率低、难溯源等难题,基于中国剩余定理和网络异常特性,提出二维可逆 概要结构和自适应异常检测算法,突破独立于协议的异常检测技术,实现大规模网络环境下的准确 高效的异常检测。针对海量网络数据分布式并行处理效率低,不能同时识别多种超级主机并溯源等 难题,设计三维可逆概要结构,提出多类别超级主机并行高效识别方法,突破多种流量信息的同时
采集和高效存储技术,实现多种主机基数的高效高精度分布式并行计算和多种超级主机同时识别和
溯源。针对现有 Sketch 面对海量数据依然存储效率低、不能自适应调节、分析精度差等难题,基
于网络流量的分布特点,提出可扩展可逆概要结构,突破自适应与流量大小的 Sketch 扩展和超级
主机溯源技术,实现对所有类型主机基数的内存高效、高精度度量和超级主机识别。相关论文和专
利情况如下:
已发表论文:
104. H. Han, Z. Yan*, X. Y. Jing, W. Pedrycz, “Applications of Sketches in Network Traffic
Measurement: A Survey”, Information Fusion, Vol. 82, pp. 58-85, 2022.
105. X. Y. Jing, Z. Yan*, H. Han, W. Pedrycz, “ExtendedSketch: Fusing Network Traffic for Super Host
Identification with a Memory Efficient Sketch”, IEEE Transactions on Dependable and Secure
Computing, 2021. Doi: 10.1109/TDSC.2021.3111328.
106. X. Y. Jing, H. Han, Z. Yan*, W. Pedrycz, “SuperSketch: A Multi-Dimensional Reversible Data
Structure to Compress Network Traffic for Super Host Identification”, IEEE Transactions on
Dependable and Secure Computing, 2021. Doi: 10.1109/TDSC.2021.3072295
107. J. J. Zhao, X. Y. Jing, Z. Yan*, W. Pedrycz, “Network Traffic Classification for Data Fusion: A
Survey”, Information Fusion, Vol. 72, pp. 22-47, August 2021.
108. X. Y. Jing, Z. Yan*, Y. H. Shen, W. Pedrycz, J. Yang, “A Group-based Distance Learning Method for
Semi-supervised Fuzzy Clustering”, IEEE Transactions on Cybernetics, 2020. Doi:
0.1109/TCYB.2020.3023373.
109. X. Y. Jing, J. J. Zhao, Q. H. Zheng, Z. Yan*, W. Pedrycz, “A Reversible Sketch-based Method for
Detecting and Mitigating Amplification Attacks”, Journal of Network and Computer
Applications, Vol. 142, pp. 15-24, September 2019.
110. X. Y. Jing, Z. Yan*, W. Pedrycz, “Security Data Collection and Data Analytics in the Internet: A
Survey”, IEEE Communications Surveys and Tutorials, Vol. 21, Issue 1, pp. 586-618, first quarter
2019.
111. X. Y. Jing, Z. Yan*, X. Q. Liang, W. Pedrycz, “Network Traffic Fusion and Analysis against DDoS
Flooding Attacks with a Novel Reversible Sketch”, Information Fusion, Vol. 51, pp. 100-113,
November 2019.
已申请/授权专利:
112. Xuyang Jing, Zheng Yan, A Reversible Sketch-based Method for Detecting Amplification Attacks,
Application No. PCT/CN2018/077036, Filed Date 2018-02-23.
113. Xuyang Jing, Zheng Yan, Method, Device, and System for Network Traffic Analysis. Application
No. PCT/CN2018/097300, Filed Date 2018-07-27. Nokia code: 105763.
114. Xuyang Jing, Zheng Yan, SuperSketch: A Multi-Dimensional Reversible Data Structure to
Measure Host Cardinality for Network Anomaly Detection, Application No.
PCT/CN2019/084693, Filed Date: 2019-04-26. Nokia code: 315383.
115. 靖旭阳,赵晶晶,闫峥* (Z.Yan*),维托尔德·佩德里茨 (Witold Pedrycz), 一种基于约束模
糊聚类和粒计算的网络流量分类方法 (Network Traffic Classification Using Constrained
Fuzzy Clustering and Granular Computing),申请号 202010465413.2,申请日期:2020-05-28.
116. 靖旭阳,闫峥* (Z. Yan*), 韩慧,网络流量测量方法、系统、计算机设备、存储介质及应用,
申请号:202111065220. 9,申请日期:2021.09.11.
117. 张文铭,靖旭阳,闫峥* (Z. Yan*),网络异常流量检测方法、系统、存储介质、终端及应 用 (Abnormal Network Traffic Detection Method, System, Storage and Application),申请号:
202110155011.7,申请日期:2021.02.04.
主要成果 5:基于区块链的一体化异构融合网络端对端安全通信
针对大规模异构融合网络端对端安全通信需求,构建基于区块链的去中心化高效安全通信架
构,快速支持域内和跨域端对端通信安全;实现了高效和隐私保护的的 UE 和服务网络的双向互认 证、由可信运行环境 SGX 支撑的轻量级会话密钥生成和分发;抗主动和被动攻击,包括泄漏攻击、 中间人攻击、假冒攻击和重放攻击,支持前向和后向安全;对端对端通信安全协议进行理论和形式
化分析,证明了其安全性和隐私保护性。相关论文、专利和软件著作权情况如下:
已发表论文:
118. J. L. Zhang, Z. Yan*, S. F. Fei, M. J. Wang, T. Y. Li, H. G. Wang, “Is Today’s End-to-End
Communication Security Enough for 5G and Its Beyond?”, IEEE Network Magazine, Vol. 36, No.
1, pp. 105-112, Jan./Feb. 2022.
119. S. F. Fei, Z. Yan*, W. X. Ding, H. M. Xie, “Security Vulnerabilities of SGX and Countermeasures: A
Survey”, ACM Computing Surveys, Vol. 54, Issue 6, article No. 126, pp. 1-36, July 2021.
120. D. S. Zhao, Z. Yan, M. J. Wang*, P. Zhang, B. Song, “Is 5G Handover Secure and Private? A
Survey”, IEEE Internet of Things Journal, Vol. 8, Issue 16, pp. 12855-12879, August 2021.
已申请/授权专利:
121. 王明君,赵东昇,闫峥(Z. Yan),王海光,李铁岩,通信的方法和装置,申请号:
202210160801.9,申请日期:2022.02.23.
122. 刘高,闫峥* (Z. Yan*), 王海光,李铁岩,一种基于区块链的网络节点控制方法、系统及共
识节点 (A Network Node Control Method Based on Blockchain),申请号:202111092096.5,
申请日期:2021.09.18.
123. 张家蕾,闫峥* (Z. Yan*),一种异构融合网络的无缝可信跨域路由系统及其控制方法
(Seamless and Credible Cross-domain Routing System and Control Method in Integrated
HetNets),申请号:202110530588. 1,申请日期:2021.05.15.
已申请软件著作权:
124. 赵东昇,王明君,闫峥* (Z. Yan*),D2D 安全通信软件 V1.0.0,2019-07-03, Software Copyright
Registration No. 2021SR0820667.
主要成果 6:一体化外包数据存储优化、处理、灵活访控和验证系统
构建集外包数据安全存储优化、处理、多用户灵活访控和公开零知识验证的一体化云服务平台, 实现了数据全生命期的隐私保护,增强了外包计算的可信性;实现由数据拥有者、云或两者共同控 制的数据安全去重,与由信任管控的云数据访问兼容,提供数据重复和完整性验证,抗恶意用户和 恶意云双重攻击;通过理性博弈制定了落地实施的激励方案;设计了同态重加密算法,灵活控制多
用户对密文处理结果的访问,实现了多类型数据(包括整数、分数、定点数、向量)的安全外包计
算(包括加减乘除、向量运算、天际线查询);支持可验证外包计算、可验证多用户查询、可验证
top-k 查询、可验证空间锁定的 top-k 查询、可验证数据去重。相关论文、专利和软件著作权情况
如下:
已发表论文:
125. X. X. Yu, H. Bai, Z. Yan*, R. Zhang, “VeriDedup: A Verifiable Cloud Data Deduplication Scheme with
Integrity and Duplication Proof”, IEEE Transactions on Dependable and Secure Computing, 2021. Doi:
10.1109/TDSC.2022.3141521
126. X. Q. Liang, Z. Yan*, R. H. Deng, Q. H. Zheng, “Investigating the Adoption of Hybrid Encrypted
Cloud Data Deduplication with Game Theory”, IEEE Transactions on Parallel and Distributed
Systems, Vol. 32, Issue 3, pp. 587-600, 2020.
127. X. Q. Liang, Z. Yan*, X. F. Chen, L. T. Yang, W. J. Lou, Y. T. Hou, “Game Theoretical Analysis on
Encrypted Cloud Data Deduplication”, IEEE Transactions on Industrial Informatics, Vol. 15, Issue
10, pp. 5778-5789, October 2019.
128. Y. X. Chen*. Q. H. Zheng, Z. Yan, D. Liu, “QShield: Protecting Outsourced Cloud Data Queries
with Multi-user Access Control Based on SGX”, IEEE Transactions on Parallel and Distributed
Systems, Vol. 32, Issue 2, pp. 485-499, Feb. 2021.
129. A. T. Li, Y. Chen, Z. Yan*, X. K. Zhou, S. Shimizu, “A Survey on Integrity Auditing for Data Storage
in Cloud: from Single Copy to Multiple Replicas”, IEEE Transactions on Big Data, 2020. Doi:
10.1109/TBDATA.2020.3029209
130. X. Q. Liang, Z. Yan*, R. H. Deng, "Game Theoretical Study on Client-Controlled Cloud Data
Deduplication", Computers and Security, Vol. 91, April 2020, 101730.
131. W. Wang, P. Xu, D. L. Liu, L. T. Yang, Z. Yan, “Lightweighted Secure Searching over Public-key
Ciphertexts for Edge-Cloud Assisted Industrial IoT Devices", IEEE Transactions on Industrial
Informatics, Vol. 16, Issue 6, pp. 4221-4230, 2019.
132. W. X. Ding, R. Hu, Z. Yan*, X. R. Qian, R. H. Deng, L. T. Yang, M. X. Dong, “An Extended
Framework of Privacy-Preserving Computation with Flexible Access Control”, IEEE Transactions
on Network and Service Management, Vol. 17, Issue 2, pp. 918-930, June 2020.
133. D. Liu, Z. Yan, W.X. Ding*, M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge
Computing”, IEEE Internet of Things Journal, Vol. 6, No. 3, pp. 4946-4967, June 2019.
134. R. Hu, Z. Yan*, W.X. Ding, L. T. Yang, “A Survey on Data Provenance in IoT”, World Wide Web
Journal, Vol. 32, No. 2, pp. 1441-1463, 2020.
135. W. X. Ding, X. Y. Jing, Z. Yan*, L. T. Yang, “A Survey on Data Fusion in Internet of Things: Towards
Secure and Privacy-Preserving Fusion”, Information Fusion, Vol. 51, pp. 129-144, 2019. Doi:
10.1016/j.inffus.2018.12.001 (IF: 10.716) (invited paper) (ESI Hot Paper)
136. X. X. Yu, Z. Yan*, R. Zhang, “Verifiable Outsourced Computation over Encrypted Data”,
Information Sciences, Vol. 479, pp. 372-385, April 2019.
137. H. R. Yuan, X. F. Chen*, T. Jiang, X. Y. Zhang, Z. Yan, Y. Xiang, “DedupDUM: Secure and Scalable
Data Deduplication with Dynamic User Management”, Information Sciences, 2018. DOI:
10.1016/j.ins.2018.05.024
138. W. X. Ding, Z. Yan*, R. H. Deng, “Privacy-Preserving Data Processing with Flexible Access
Control”, IEEE Transactions on Dependable and Secure Computing, Vol. 17, No. 2, pp. 363-376,
March/April, 2020.
139. W. X. Ding, Z. Yan*, R. H. Deng, “Encrypted Data Processing with Homomorphic Re-Encryption”,
Information Sciences, Vol. 409-410, pp. 35-55, October 2017.
140. Z. Yan*, L. F. Zhang, W. X. Ding, Q. H. Zheng, “Heterogeneous Data Storage Management with
Deduplication in Cloud Computing”, IEEE Transactions on Big Data, Vol. 5, Issue 3, pp. 393-407,
September 2019.
141. X. X. Yu, Z. Yan*, A. V. Vasilakos, “A Survey of Verifiable Computation”, Mobile Networks and
Applications, Springer, Vol. 22, No. 3, pp. 438-453, June 2017. Doi: 10.1007/s11036-017-0872-3
142. Z. Yan*, X. X. Yu, W. X. Ding, “Context-Aware Verifiable Cloud Computing”, IEEE Access, Vol. 5,
pp. 2211 – 2227, February 9, 2017.
143. L. J. Gao, Z. Yan*, L. T. Yang "Game Theoretical Analysis on Acceptance of a Cloud Data Access
Control System Based on Reputation", IEEE Transactions on Cloud Computing, Vol. 8, No. 4, pp.
1003-1017, October-December, 2020.
144. Z. Yan*, W. X. Ding, X. X. Yu, H. Q. Zhu, R. H. Deng, “Deduplication on Encrypted Big Data in
Cloud”, IEEE Transactions on Big Data, Vol. 2, No. 2, pp. 138-150, April-June 2016.
145. Z. Yan*, X. Y. Li, M. J. Wang, A. V. Vasilakos, “Flexible Data Access Control Based on Trust and
Reputation in Cloud Computing”, IEEE Transactions on Cloud Computing, Vol. 5, Issue 3, pp.
485-498, July-Sept 2017.
146. Z. Yan*, M. J. Wang, Y. X. Li, A. V. Vasilakos, “Encrypted Data Management with Deduplication
in Cloud Computing”, IEEE Cloud Computing Magazine, Vol. 3, No. 2, pp. 28-35, 2016.
147. Z. Yan*, X. Y. Li, R. Kantola, “Controlling Cloud Data Access Based on Reputation", Mobile
Networks and Applications, Springer, Volume 20, Issue 6, pp. 828-839, December 2015.
148. X. Q. Liang, Z. Yan*, R. H. Deng, R. Kantola, W. X. Ding, X. X. Yu, Q. H. Zheng, “Game-theoretic
Analysis of Encrypted Cloud Data Deduplication”, Data Deduplication Approaches: Concepts,
Strategies and Challenges, edited by Tin Thein Thwel and G R Sinha, Elsevier, 2020. (accepted)
149. W. X. Ding, X. R. Qian, R. Hu, Z. Yan*, R. H. Deng, “Flexible Access Control over
Privacy-Preserving Cloud Data Processing”, book chapter of Innovation in Cybersecurity
Education, edited by Kevin Daimi and Guillermo Francia III, Springer, pp. 231-255, 2020.
150. X. Q. Liang, Z. Yan*, “Deduplication of Encrypted Data”, Encyclopedia of Cryptography, Security
and Privacy, edited by Sushil Jajodia, Pierangela Samarati and Moti Yung, 2021. (invited) DOI:
https://doi.org/10.1007/978-3-642-27739-9_1463-1
151. Z. Yan, X. Q. Liang*, W. X. Ding, X. X. Yu, M. J. Wang, R. H. Deng, “Encrypted Big Data
Deduplication in Cloud Storage”, Chapter in Book Smart Data: State-of-the-Art and Perspectives
in Computing and Applications, ed. By Kuan-Ching Li, Qingchen Zhang, Laurence T. Yang and
Beniamino DiMartin, published by Taylor and Francis, pp. 63-92, 2019.
152. Z. Yan*, X. Y. Li, R. Kantola, “Heterogeneous Data Access Control Based on Trust and Reputation
in Mobile Cloud Computing”, book chapter of Advances in Mobile Cloud Computing and Big
Data under the 5G Era, Constandinos Mavromoustakis, George Mastorakis and Ciprian Dobre
(ed.), Springer, pp. 65-113, 2016.
153. X. X. Yu, Y. D. Hu, R. Zhang, Z. Yan, Y. C. Zhang, “Secure Outsourced Top-$k$ Selection Queries
against Untrusted Cloud Service Providers”, 2021 IEEE/ACM 29th International Symposium on
Quality of Service (IWQOS), Japan, June 25-28, 2021.
154. W. X. Ding, Z. Yan, X. R. Qian, R. H. Deng, “Computing Maximum and Minimum with Privacy
Preservation and Flexible Access Control", IEEE GLOBECOM 2019, Waikoloa, Hawaii, USA,
December 9 – 13, 2019.
155. X. Q. Liang, Z. Yan*, W. X. Ding, R. H. Deng, “Game Theoretical Study on a Client-Controlled
Deduplication Scheme”, IEEE UIC2019, Leicester UK, August 19-23, pp. 1154-1161, 2019.
156. W. X. Ding, Z. Yan*, R. H. Deng, “Secure Encrypted Data Deduplication with Ownership Proof
and User Revocation”, the 17th International Conference on Algorithms and Architectures for
Parallel Processing (ICA3PP-2017), Helsinki, Finland, August 21-23, 2017.
157. H. Q. Lin, Z. Yan*, R. Kantola, “CDController: A Cloud Data Access Control System Based on Rep

评论

验证码

全部评论

共{{commentCount}}条
  • {{i+1}}楼
    {{rs.Msg_Sender}}{{rs.Msg_Datetime}}

    {{rs.Msg_Content}}