Skip to content Skip to navigation

Research

Cryptography and Cyberspace Security Team

Approval Year: 2016

Leader: Futai Zhang

Members: Bo Chen, Wanfeng Dou, Futai Zhang, Guoqiang Zhang, Qian Gao, Yinxia Sun, Yi Yin, Guiying Zhang, Limin Shen

Introduction

The group of “Cyberspace Security” mainly focuses on the study of the theories and technologies of network, cryptography, and cyberspace security. The research interests of the group include the architecture of future networks, high performance networks, network traffic optimization、network coding, distributed computation, parallel computing, social computing, cryptography, network security and information security. Presently, there are 3 professors, 3 associate professors, and 3 lecturers in the group. In the recent 5 year, the group members published more than 100 research papers (more than 50 papers were published in SCI or EI journals), have been authorized several invention patents, and have been granted more than 6 NSFC projects.

Research Content

Architecture of future networks

High performance networks

Network traffic optimization

Network coding

Distributed computation

Parallel computing

Social computing

Cryptography

Network security

Information security

 

Representative Achievements

[1] Guoqiang Zhang, Xin Chen, Yixia Lu, Qian Gao, Enabling tunneling in CCN, IEEE Communications Letters, accepted.

[2] Guoqiang Zhang, Zhiqu Xu, Combing CCN with network coding: an architectural perspective, Computer Networks.

[3] Shoushou Ren, Tao Lin, Wei An, Guoqiang Zhang, Dalei Wu, Laxmi Narayan Bhuyan and Zhen Xu, Design and analysis of cooperative EPC and RAN caching for LTE mobile networks, Computer Networks, accepted.

[4] Sha Yuan, Tao Lin, Guoqiang Zhang, Wei An, Yang Li, and Ci Song, A hybrid anycast network architecture and intelligent server selection strategy for multimedia services, Transactions on Emerging Telecommunications Technologies, 2014.

[5] Yuemei Xu, Yang Li, Tao Lin, Zihou Wang, Guoqiang Zhang, Hui Tang, and Song Ci, An adaptive per-application storage management scheme based on manifold learning in information centric networks, Elsevier Future Generation Computer Systems, 2014.

[6] Guoqiang Zhang, Yang Li, Tao Lin, Caching in Information Centric Networking: A Survey, Computer Networks, 57: 3128-3141,2013.

[7] Mingdong Tang, Guoqiang Zhang, Tao Lin, and Jianxun Liu, HDLBR: a name-independent compact routing scheme for power-law networks, Computer Communications, 36(3): 351-359, 2013.

[8] Wanfeng Dou, Jing Zhao, Kun Yang, Min Xu. Data parallel and scheduling mechanism based on petri nets. International Journal of Applied Mechanics and Materials. 2014, vol. 543-547:3264-3267

[9] Wanfeng Dou, Xiaoyan Guo, Yan Li. A Partition Method of Public Bicycle Scheduling Region Based on Graph Theory. International Workshop on Software Engineering and Management Information System, WIT Transaction on Information and Communication Technologies, 2014,vol.62(3):11870-1194

[10] Yanhong Liu, Futai Zhang, Jie Zhang. Attacks to some verifiable multi secret sharing schemes and two improved schemes. Information Sciences, 329 (2016): 524–539.

[11] Yinxia Sun, Futai Zhang, Limin Shen. Efficient revocable certificateless encryption against decryption key exposure, IET Information Security, 2015, 9 (3): 158-166 .

[12] Wenjie Yang, Futai Zhang, Limin Shen. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles. Security and Communication Networks, 2014, 7(2): 445-454, DOI: 10.1002/sec.826.

[13] Futai Zhang, Limin Shen, Ge Wu. Notes on the security of certificateless aggregate signature schemes. Information Sciences, 2014, 287: 32–37.

[14] Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu. On security of a certificateless signcryption scheme. Inf. Sci. 2013, 232(5): 475-481.