工作经历1. .11-至今 副教授 华中科技大学
2. .7-.10 讲师 华中科技大学
3. .8-.2 博后 华中科技大学
研究论文18.Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin, Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search, IEEE Transactions on Information Forensics & Security, 10(9), pp. 1993-, .(中国计算机学会划定的A类期刊)
17.Peng Xu, Tengfei Jiao, Qianhong Wu,Wei Wang,Hai Jin, Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email,IEEE Transactions on Computers.(已录用,中国计算机学会划定的A类期刊)
16. Wei Wang, Peng Xu, Laurence Tianruo Yang, Hui Li,A Design for Cloud-Assisted Fair-Play ManagementSystem of Online Contests with Provable Security,Future Generation Computer Systems, 52, pp. 137-146, Nov. . (SCI期刊,影响因子2.459)
15. Wei Wang,Peng Xu, Hui Li, Laurence Tianruo Yang, Secure Hybrid-Indexed Search for High Efficiency over Keyword Searchable Ciphertexts, Future Generation Computer Systems. (已录用,SCI期刊,影响因子2.459)
14.Xu Peng, Chen Hongwu, Zou Deqing, Jin Hai, Fine-grained and Heterogeneous Proxy Re-Encryption for Secure Cloud Storage, Chinese Science Bulletin, 59(32), pp. 4201-4209, . (SCI期刊,影响因子1.319)
13.Xu Peng, Tang Yong, Jiang Wenbin, Jin Hai, Zou Deqing, Ciphertext-Policy Attribute-Based Encryption with Short Keys, Chinese Journal of Electronics, 23(4), pp. 655-660, . (SCI期刊)
12. Wei Wang, Peng Xu, Hui Li, Laurence Yang, A Secure Synchronized Reading System over Time-Critical Online Contests, IEEE ICC . (中国计算机学会划定的C类会议)
11.Peng Xu, Hai Jin, Qianhong Wu, Wei Wang, Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Schemeunder Keyword Guessing Attack, IEEE Transactions on Computers, 62(11), pp. 2266-2277, . (中国计算机学会划定的A类期刊)
10.陈亮, 崔永泉, 田苗苗, 付小青, 徐鹏, 对2个基于身份签名方案的伪造攻击, 通信学报, 34(2), 123-127页, .
9. Bing Zeng, Christophe Tartary, Peng Xu, Jiandu Jing, Xueming Tang, A Practical Framework for t-Out-of-n Oblivious Transfer with Security Against Covert Adversaries, IEEE Transactions on Information Forensics & Security, 7(2), pp. 465-479, . (中国计算机学会划定的A类期刊)
8.徐鹏, 金海, 邹德清, 加密数据云存储及其隐私保护, 中国计算机学会通信, 8(7), 22-27页, .
7.邹德清, 金海, 羌卫中, 徐鹏, 云计算安全挑战与实践, 中国计算机学会通信, 7(12), 55-62页, .
6.Peng Xu, Guo-Hua Cui, Feng-Yu Lei, Jing-Fang Xu, One-time encryption-key technique for the traditional DL-based encryption schene with anonymity, Information Sciences, 180(22), pp. 4420-4429, . (中国计算机学会划定的B类期刊)
5.Xu Peng, Cui GuoHua, Fu Cai, Tang XueMing, A more efficient accountable authority IBE scheme under the DL assumption, SCIENCE CHINA Information Sciences, 53(3), pp. 581-592, . (中国计算机学会划定的B类期刊)
4.徐鹏, 崔国华, 付才, 汤学明, DL假设下一种更高效的第三方权利受约束的IBE方案, 中国科学: 信息科学, 40(2), 285-297, .
3.徐鹏, 崔国华, 雷凤宇, 汤学明, 陈晶, 标准模型下一种实用的和可证明安全的IBE方案, 计算机学报, 33(2), 335-344, .
2.徐鹏, 崔国华, 郑明辉, 高效抗阻断攻击的非认证组密钥协商方案, 通信学报, 30(10), 75-80, .
1.徐鹏, 崔国华, 雷凤宇, 非双线性映射下一种实用和可证明安全的IBE方案, 计算机研究与发展, 45(10), 1687-1695, .
科研项目与获奖主持:
1.“抗量子密码分析的基于身份加密研究”,国家自然科学青年基金,No.**,-.
2.“结构化可搜索公钥加密及其应用研究”,国家自然科学面上基金,No.**,-.
参与:
1.“云计算安全基础理论与方法研究”,国家重点基础研究发展计划(973项目),No. CB340600,-.
获奖:
1.第十五届湖北省自然科学优秀学术论文三等奖,.
华中科技大学有计算机科学与技术学院导师 华中科技大学计算机科学与技术学院导师简介-徐鹏...