Welcome to Xiaofen Wang's Homepage!


Xiaofen Wang

Ph.D., Associate Professor
Centre for Cyber Security
Big Data Research Center
School of Computer Science and Engineering
University of Electronic Science and Technology of China

Email: xfwang AT uestc DOT edu DOT cn
Phone: (+86) 28 61830061
Address: No.2006, Xiyuan Ave, West Hi-Tech Zone, Chengdu, Sichuan, P.R.China


About Me


I am currently an associate professor of the School of Computer Science and Engineering at University of Electronic Science and Technology of China (UESTC), and have been with UESTC since Jan. 2010. I received my PhD degree (2009) and Master degree (2006) in cryptography from Xidian University, Xi'an, China, under the supervision of Prof. Guozhen Xiao, and Bechalor degree (2003) in computer science from University of Electronic Science and Technology of China. I was a visiting research fellow at University of Wollongong, working with Prof. Yi Mu from Aug. 2014 to Aug. 2015. My major research interests include Cryptography, Information Security, Network Security and Data Security, etc.

Teaching

Publications

Professional Activities


Teaching


  1. Design of Cryptographic Algorithm,
    For international graduate students.
  2. Multimedia Technology,
    For international graduate students.
  3. Information Theory and Coding,
    For bechalor students.

Publications



Journal Publications

  1. One Round Secure Fair Meeting Location Determination Based on Homomorphic Encryption,
    Xiaofen Wang,
    Information Sciences, accepted, August 4, 2016.
  2. An Efficient Privacy-Preserving Aggregation and Billing Protocol for Smart Grid,
    Xiaofen Wang, Yi Mu and Rongmao Chen,
    Security and Communication Networks, accepted, August 4, 2016.
  3. Anonymous Authentication Protocol with Batch Verification for E-Health System,
    Xiaofen Wang, Haomiao Yang, Xiaosong Zhang
    International Journal of Computer Systems Science and Engineering , accepted, September 20, 2016.
  4. Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group,
    Xiaofen Wang, Yi Mu, Rongmao Chen and Xiaosong Zhang,
    Journal of Computer Science and Technology, (to appear). 31(5): 1012-1027.
  5. Privacy-Preserving Data Search and Sharing Protocol for Social Networks through Wireless Applications,
    Xiaofen Wang, Yi Mu and Rongmao Chen,
    Concurrency and Computation: Practice and Experience, (publish online).
  6. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications,
    Xiaofen Wang, Yi Mu and Rongmao Chen,
    IEEE Transactions on Information Forensics and Security, 11(8): 1712-1721 (2016). [url]
  7. Certificate Based Anonymous Authentication Protocol for Vehicular Ad Hoc Network,
    Xiaofen Wang, Tang Liu and Guozhen Xiao,
    IETE Technical Review, 29(5): 388-393 (2012). [url]
  8. Improvement of McCullagh-Barreto key agreement with KCI-security,
    Wang Xiaofen, Dong Qingkuan, Zhou Yu and Guozhen Xiao,
    The journal of China university of posts and telecommunications, 16(2): 68-71(2008). [url]
  9. Online/offline Ciphertext Retrieval on Resource Constrained Devices,
    Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang and Qiaoyan Wen,
    The Computer Journal, Oxford, Publish Online (2015)
  10. Server-Aided Public-Key Encryption With Keyword Search,
    Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang and Xiaofen Wang,
    IEEE Transactions on Information Forensics and Security, (to appear). Acceptance Date: 19 Jul. 2016. [url]
  11. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage,
    Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo and Xiaofen Wang,
    IEEE Transactions on Information Forensics and Security, 11(4): 789-798 (2016). [url]
  12. SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds,
    Yong Yu, Jianbing Ni, Qi Xia, Xiaofen Wang, Haomiao Yang and Xiaosong Zhang,
    Concurrency and Computation: Practice and Experience, 28(10): 2877-2888 [url]
  13. BL-MLE-PC: Block Level Message Locked Encryption with Polynomial Commitment for Deduplication,
    Ke Huang, Xiaosong Zhang and Xiaofen Wang,
    Journal of Information Science and Engineering (JISE), accepted.
  14. Privacy-enhanced distance computation with applications,
    Xiaojuan Chen, Yi Mu, Xiaofen Wang and Runhua Shi,
    IJESDF 8(3): 234-249 (2016) [url]
  15. Security Flaw of an improved user authentication scheme with user anonymity for wireless communications,
    Hu Xiong, Xiaofen Wang and Fagen Li,
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E95-A(1): 256-258 (2012).[url]
  16. An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages,
    Haomiao Yang, Hyunsung Kim, Hongwei Li and Xiaofen Wang,
    KSII Transactions on Internet and Information Systems, 7(10): 2544-2560 (2013). [url]
  17. EA-MTSP: Efficient Authentication for Multiple Third-Party Service Providers in Smart Grids,
    Haomiao Yang, Xiaofen Wang, Jiang Deng and Jing Zeng,
    IETE Technical Review, 31(2):143-152 (2014) [url]
  18. Research on the Energy Hole Problem Based on Non-uniform Node Distribution for Wireless Sensor Networks,
    Tang Liu, Jian Peng, Xiaofen Wang, Jin Yang and Bing Guo,
    TIIS, 6(9): 2017-2036 (2012).[url]

Conference Publications

  1. Content-Based Encryption,
    Xiaofen Wang, Yi Mu,
    20th Australasian Conference on Information Security and Privacy (ACISP), 2016: 57-72.
  2. Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud,
    Xiaofen Wang, Xiaosong Zhang, Yi Mu,
    2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015: 1024-1031. [url]
  3. Provably Secure Certificateless Authenticated Key Agreement Protocol in the Standard Model,
    Xiaofen Wang, Xiongda Li,
    2010 First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA), 2010: 45-48. [url]
  4. Oblivious Keyword Search with Authorization,
    Peng Jiang, Xiaofen Wang,Jianchang Lai, Fuchun Guo and Rongmao Chen,
    ProvSec 2016, accepted.
  5. A New General Framework for Secure Public Key Encryption with Keyword Search,
    Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo and Xiaofen Wang,
    20th Australasian Conference on Information Security and Privacy (ACISP), 2015: 59-76.
  6. Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem,
    Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang,
    CollaborateCom 2015: 243-256. [url]

Professional Activities



Last Update: August 8, 2016.