电子科技大学(深圳)高等研究院


 
导师代码: 11276
导师姓名: 汪小芬
性    别:
特    称:
职    称: 副教授
学    位: 军事学博士学位
属    性: 专职
电子邮件: xfwang@uestc.edu.cn

学术经历:   担任IEEE Transactions on Information Forensics and Security,Secure Communication Networks, Transactions on Internet and Information Systems,电子科技大学学报等多个杂志的审稿人。担任The First EAI International Conference on Security and Privacy in New Computing Environments国际会议的程序委员会委员。

个人简介:   本人分别于2009年和2006年在西安电子科技大学获密码学博士和硕士学位。2003年毕业于电子科技大学,获计算机科学与技术学士学位。2014年8月至2015年8月在澳大利亚卧龙岗大学访问研究。曾在IEEE Transactions on Information Forensics and Security,Information Sciences,Journal of Computer Science and Technology等著名国际期刊,Australasian Conference on Information Security and Privacy (ACISP)著名国际会议发表论文近70篇,出版重点大学信息安全专业规划教材《现代密码学》一部。研究方向是网络空间安全,主要集中于对密码学理论与技术、人工智能安全、大数据安全、区块链技术、网络和系统安全进行研究。

科研项目:   主持的项目: 1. 国家自然科学基金项目 医疗信息化平台可验证的隐私保护数据搜索的研究 2016.01-2018.12 2. 国家自然科学基金项目 基于RFID的民航行李管理系统中关键密码技术的研究 2019.01-2021.12 3. 国家自然科学基金项目 基于区块链的医疗信息去中心化安全可靠的联邦学习技术的研究 2024.01-2027.12 4. 国家重点研发计划项目 网络边界XXXXX技术研究 2023.11-2025.03 (课题负责人) 5. 国家重点研发计划项目 基于智能图谱的XXXX与XX技术研究 2023.03-2025.03 (课题负责人) 6. 国家重点研发计划项目 ***网络管控技术 2019.01-2022.12 (子课题负责人) 7. 横向项目 基于区块链的XXXX协同与XX支援 2022.12-2024.12 8. 重点实验室项目 云环境下数据隐私保护安全可信的查询 2017.03-2018.12 9. 横向项目 论坛POST数据特征分析 2014.04-2015.12 10.横向项目 ××分析与系统实现 2014.03-2015.12 11.横向项目 ×××协同与决策技术 2012.11-2012.12

研究成果:   Journal Papers 1. One Round Secure Fair Meeting Location Determination Based on Homomorphic Encryption, Xiaofen Wang, Information Sciences, accepted, August 4, 2016. 2. An Efficient Privacy-Preserving Aggregation and Billing Protocol for Smart Grid, Xiaofen Wang, Yi Mu and Rongmao Chen, Security and Communication Networks, accepted, August 4, 2016. 3. Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group, Xiaofen Wang, Yi Mu, Rongmao Chen and Xiaosong Zhang, Journal of Computer Science and Technology, (to appear). Acceptance Date: 26 Jan. 2016. [url] 4. Privacy-Preserving Data Search and Sharing Protocol for Social Networks through Wireless Applications, Xiaofen Wang, Yi Mu and Rongmao Chen, Concurrency and Computation: Practice and Experience, (publish online). 5. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications, Xiaofen Wang, Yi Mu and Rongmao Chen, IEEE Transactions on Information Forensics and Security, 11(8): 1712-1721 (2016). [url] 6. Certificate Based Anonymous Authentication Protocol for Vehicular Ad Hoc Network, Xiaofen Wang, Tang Liu and Guozhen Xiao, IETE Technical Review, 29(5): 388-393 (2012). [url] 7. Improvement of McCullagh-Barreto key agreement with KCI-security, Wang Xiaofen, Dong Qingkuan, Zhou Yu and Guozhen Xiao, The journal of China university of posts and telecommunications, 16(2): 68-71(2008). [url] 8. Online/offline Ciphertext Retrieval on Resource Constrained Devices, Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang and Qiaoyan Wen, The Computer Journal, Oxford, Publish Online (2015) 9. Server-Aided Public-Key Encryption With Keyword Search, Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang and Xiaofen Wang, IEEE Transactions on Information Forensics and Security, (to appear). Acceptance Date: 19 Jul. 2016. [url] 10. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage, Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo and Xiaofen Wang, IEEE Transactions on Information Forensics and Security, 11(4): 789-798 (2016). [url] 11. SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds, Yong Yu, Jianbing Ni, Qi Xia, Xiaofen Wang, Haomiao Yang and Xiaosong Zhang, Concurrency and Computation: Practice and Experience, 28(10): 2877-2888 [url] 12. BL-MLE-PC: Block Level Message Locked Encryption with Polynomial Commitment for Deduplication, Ke Huang, Xiaosong Zhang and Xiaofen Wang, Journal of Information Science and Engineering (JISE), accepted. 13. Privacy-enhanced distance computation with applications, Xiaojuan Chen, Yi Mu, Xiaofen Wang and Runhua Shi, IJESDF 8(3): 234-249 (2016) [url] 14. Security Flaw of an improved user authentication scheme with user anonymity for wireless communications, Hu Xiong, Xiaofen Wang and Fagen Li, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E95-A(1): 256-258 (2012).[url] 15. An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages, Haomiao Yang, Hyunsung Kim, Hongwei Li and Xiaofen Wang, KSII Transactions on Internet and Information Systems, 7(10): 2544-2560 (2013). [url] 16. EA-MTSP: Efficient Authentication for Multiple Third-Party Service Providers in Smart Grids, Haomiao Yang, Xiaofen Wang, Jiang Deng and Jing Zeng, IETE Technical Review, 31(2):143-152 (2014) [url] 17. Research on the Energy Hole Problem Based on Non-uniform Node Distribution for Wireless Sensor Networks, Tang Liu, Jian Peng, Xiaofen Wang, Jin Yang and Bing Guo, TIIS, 6(9): 2017-2036 (2012).[url] 18. A Data Reporting Protocol with Revocable Anonymous Authentication for Edge-assisted Intelligent Transport Systems[J]. IEEE Transactions on Industrial Informatics. DOI: 10.1109/TII.2022.3226244 19.Device-oriented Keyword Searchable Encryption Scheme for Cloud-assisted Industrial IoT. IEEE Internet of Things Journal. DOI: 10.1109/JIOT.2021.3124807(2022) 20. Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities. IEEE Internet Things J.8(8):6425-6436(2021) 21. Lightweight Searchable Encryption Protocol for Industrial Internet of Things. IEEE Trans. Ind. Informatics 17(6): 4248-4259 (2021) 22.EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) 23. Secure and flexible economic data sharing protocol based on ID-based dynamic exclusive broadcast encryption in economic system. Future Generation Comp. Syst. 99: 177-185 (2019) Conference Publications 1. Content-Based Encryption, 20th Australasian Conference on Information Security and Privacy (ACISP), 2016: 57-72. 2. Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015: 1024-1031. 3.Oblivious Keyword Search with Authorization, ProvSec 2016. 4. A New General Framework for Secure Public Key Encryption with Keyword Search, 20th Australasian Conference on Information Security and Privacy (ACISP), 2015: 59-76. 5. Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem, CollaborateCom 2015: 243-256. 6.A Cloud-based IoMT Data Sharing Scheme with Conditional Anonymous Source Authentication. GLOBECOM 2022: 2915-2920

专业研究方向:
专业名称 研究方向 招生类别


学院列表
01  信息与通信工程学院
02  电子科学与工程学院
03  材料与能源学院
04  机械与电气工程学院
05  光电科学与工程学院
06  自动化工程学院
07  资源与环境学院
08  计算机科学与工程学院(网络空间安全学院)
09  信息与软件工程学院(示范性软件学院)
10  航空航天学院
11  数学科学学院
12  物理学院
13  医学院
14  生命科学与技术学院
15  经济与管理学院
16  公共管理学院
17  外国语学院
18  马克思主义学院
21  基础与前沿研究院
22  通信抗干扰全国重点实验室
23  电子科学技术研究院
28  电子科技大学(深圳)高等研究院
31  集成电路科学与工程学院(示范性微电子学院)
90  智能计算研究院