第一作者论文:
[1].A Redactable Blockchain for Privacy-Preserving of Federated Learning in Industrial Internet-of-Things. IEEE Internet of Things Journal. 2022 (SCI, 中科院一区)
[2].An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things. IEEE Transactions on Industrial Informatics. 17(1): 617-626 (2021) (SCI, 中科院一区)
[3].ComonAccountable and Privacy-Enhanced Access Control in Wireless Sensor Networks. IEEE Transactions on Wireless Communications. 2016,15(4) (CCF B类期刊, SCI,中科院一区,)
[4].Anonymous Proxy Signature with Hierarchical Traceability. Computer Journal. Sep. 2015,59(4): 559~569 (SCI, CCF B类期刊)
[5].Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags. 20th-International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE WOWMOM 2019, JUNE 9-12, 2019 - WASHINGTON DC, UNITED STATES. (CCF推荐国际会议)
[6].A Privacy-Preservin Fog Computing Framework for Vehicular Crowdsensing Networks. IEEE Access, 2018 (SCI,中科院二区)
[7].A New Generic Construction of Deniable and Designated Verifier Signature for Fair Exchange. International Journal of Computer Mathematics. 2016 (SCI,中科院三区)
[8].Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications. Wireless Personal Communications. 2017, (SCI, 中科院三区,CCF推荐期刊)
[9].Anonymous Proxy Signature with Restricted Traceability, 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, IEEE. (CCF推荐国际会议)
[10].k-time Proxy Signature: Formal Definition and Efficient Construction. Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science, Springer. (CCF推荐国际会议)