首页
科学研究
研究领域
论文成果
专利
著作成果
科研项目
科研团队
教学研究
教学资源
授课信息
教学成果
获奖信息
招生信息
我的相册
教师博客
扫描手机二维码
欢迎您的访问
您是第
位访客
开通时间:
.
.
最后更新时间:
.
.
登录
|
山东大学
|
English
|
手机版
徐秋亮
( 教授 )
赞
个人主页 http://faculty.sdu.edu.cn/xuqiuliang/zh_CN/index.htm
教授 博士生导师 硕士生导师
性别:
男
毕业院校:
山东大学
学历:
博士研究生毕业
学位:
理学博士学位
在职信息:
在职
所在单位:
软件学院
办公地点:
软件学院行政楼426
论文成果
当前位置:
中文主页
>>
科学研究
>>
论文成果
[226] 蒋瀚 and 徐秋亮. Practical Server-Aided k-out-of-n Oblivious Transfer Protocol. Green,Pervasive, and Cloud Computing,EI: 20162102417369, 2016.
[227] 林丰波 and 徐秋亮. Improved power analysis attack based on the preprocessed power traces. 11th International Conference on Green, Pervasive and Cloud Computing, GPC 2016, EI: 20162102417370, 11, 278, 2016.
[228] 徐秋亮. Rational computing protocol based on fuzzy theory. Soft Comput, SCI: WOS 000372297200002, 20, 429, 2016.
[229] 徐秋亮 and 蒋瀚. cut-and-choose双向不经意传输. 《软件学报》, 2016.
[230] 徐秋亮 and 王伊蕾. Achieving fairness by sequential equilibrium in rational two-party computation under incomplete i.... Security and Communication Networks, CCF-C, SCI, WOS 000367922500032, 8, 3690, 2015.
[231] 徐秋亮. Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor no.... SECURITY AND COMMUNICATION NETWORKS Vo.8, No.18, CCF-C, 8, 2015.
[232] 徐秋亮 and 蒋瀚. Efficient ORAM Based on Binary Tree Without Data Overflow and Evictions. The 7th International Symposium on Intelligence Computation and Application, 2015.
[233] 徐秋亮 and 胡程瑜. Weak-leakage resilient extractable hash proof system and construction for weak-leakage resilient .... International Journal of Embedded Systems, 7, 216, 2015.
[234] 徐秋亮 and 蒋瀚. 实用安全多方计算协议关键技术研究进展. 《计算机研究与发展》, 52, 2247, 2015.
[235] 徐秋亮 and 蒋瀚. Cut-and-Choose Bilateral Oblivious Transfer and Its Application. TrustCom-15,EI,CCF C类, 2015.
[236] 徐秋亮 and 蒋瀚. several Oblivious Transfer Variants in Cut-and-Choose Scenario. International Journal of Information Security and Privacy, 2015.
[237] 徐秋亮. Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. Springer, LNCS V.9048,CT-RSA 2015, CCF-C,EI:20152300922720, 9048, 181, 2015.
[238] 徐秋亮. Fair two-party computation with rational parties holding private types. Security and Communication Networks,v8, n2, January 25, Pages: 284-297, 2015,SCI, CCF-C类: WOS:000346704500017, 8, 284, 2015.
[239] 胡程瑜 and 徐秋亮. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks. Mobile Information Systems, SCI,WOS:000350912600001, 2015, 1, 2015.
[240] 徐秋亮. Primary exploration of reliability evaluation of computer live forensics model on physical memory.... Journal of Harbin Institute of Technology (New Series), v 21, n 4, p 121-128, August 1, 2014, EI, Accession number: 201442103258, 21, 121, 2014.
共296条 16/20
首页
上页
下页
尾页
页
版权所有 ©山东大学 地址:中国山东省济南市山大南路27号 邮编:250100
查号台:(86)-0531-88395114
值班电话:(86)-0531-88364731 建设维护:山东大学信息化工作办公室