Current location - Education and Training Encyclopedia - Graduation thesis - Chen Jing's main argument
Chen Jing's main argument
He has published more than 30 papers in international conferences such as China Communication, Computer Communication, China Computer Magazine and Electronics Magazine.

[1],,, Xue, Du Ruiying,,,. Batch identification of invalid signatures based on game theory in wireless mobile networks. In progress. International Conference on Computer Communication (infocom 20 15)

[2], Du Ruiying, Yang Xiang. Routing based on dominating set and network coding in wireless mesh networks. IEEE transactions on parallel and distributed systems. 20 14 (CCFA course).

[3], Du Ruiying,. Mucar: code-aware routing based on greedy multi-stream in wireless networks. inproc。 IEEE international conference on sensing, communication and networking (secon) .20 15 (CCFB level).

[4],, Du Ruiying,,,,. Multi-objective optimization model based on immune algorithm in wireless mesh network. International Journal of Communication Systems.2014 (included in SCI).

[5] Zhang Yu, Du Ruiying, Zheng Minghui. An efficient signcryption scheme suitable for vehicle networking communication. 2015,43 (3): 512-517 (authoritative journal, corrected author) [6] Yu, Zhu Jiacheng, Zhao. An anonymous remote proof scheme based on improved CPK. E-commerce research. 20 14 (communication author SSCI).

[7], Du Ruiying, Qian Wang, Yao Shixiong. Secure routing based on network coding in wireless sensor networks. Proceedings of the 2nd International Conference on Truth, Security and Privacy in IEEE Computing and Communication (IEEE trustcom- 13). Melbourne, Australia, 20 13: 58-64 (CCF, Class C).

[8], Du Ruiying, Yang Xiang, Zhou Qing. A flexible and efficient access control scheme for cloud computing. In progress. International Conference on Trust, Security and Privacy in IEEE Computing and Communication (trustcom- 14). China, 20 14.

[9], Du Ruiying, Zhang. Intrusion detection model based on incomplete information game in wireless mesh network. China Communication.2012,9 (10): 23-32 (included by SCI).

[10] Du Ruiying, Langdon,,, Zheng Minghui. Proof of ownership and retrievability in cloud storage. In progress. International Conference on Trust, Security and Privacy in IEEE Computing and Communication (trustcom- 14). China, 20 14.

Chen Jing, thomas lee, Du Ruiying. Efficient and reliable opportunistic network coding based on mixed stream in wireless networks. China Communication.2011,8 (4):125-131(included in SCI).

Yao Shixiong, Du Ruiying, Wang Chiheng. Overview of secure network coding against various attacks. In progress. International Conference on Trust, Security and Privacy in IEEE Computing and Communication (trustcom- 14). China, 20 14.

[13], Lian, Du Ruiying. A hybrid game model of spectrum allocation in wireless networks based on replication. Computer Communication.2010,33 (14):1623-163/kloc

Chen Jing, Du Ruiying, Wang Lina, Tian Zairong. Trust game model based on probability density in network environment. Acta Electronica Sinica.20 20 10/0,38 (2): 427-433 (authoritative journal)

[15] Sha Letian, Fu Jianming, Chen Jing, Huang Shiyong. A sensitivity measurement method for sensitive information processing [J]. Computer research and development, 2014,51(5):1050-1060.

Li Shuanbao, Fu Jianming, Zhang,,, Ren Bijun. User identity attribute protection scheme based on ring signcryption in cloud environment. Journal of Communication.2014,35 (9): 99-11.

[17],, Tang,, Shao Huizhu. Two-factor anonymous remote authentication protocol based on elliptic curve cryptosystem. Wireless personal communication.2014 (included in SCI).

[18],,,, Guo Sunzeng. Adaptive energy-saving scheduling algorithm for parallel tasks on homogeneous clusters. Journal of network and computer application. (included in sci)

Ou Ruan,,, Yong. An efficient and fair UC-Secure protocol for two-party computing, security and communication networks.2013 (included in SCI).

[20] Fu Cai, Gao Xiang, Chen Jing, etc. Grey risk assessment based on projection in network. Journal of parallel and distributed computing. 20 1 1.7654 38+0 (9): 1249- 1260.(CCFB)

Liu Jianwei, Du Ruiying, and He Kun. A key distribution scheme for mobile ad hoc networks based on network coding. Security and communication network.2011.3 (included in sci).

[22] Xu Peng, Cui Guohua, Chen Jing. A practical and provable IBE scheme under the standard model. Chinese journal of computers, China.2010.2 (33): 335-344 (authoritative journal)

[23] Zheng Minghui,. Provable secure two-party explicit authentication key agreement protocol. In progress. 2012:1299-1303 of the International Conference on Trust, Security and Privacy in IEEE Computing and Communication (trustcom)