个人信息
常金勇
系所:计算机系
职称:副教授
职务:
学科:计算机科学与技术
电话:
电子邮箱: changjinyong@xauat.edu.cn

办公地点:

研究方向: 信息安全
教育背景
2000.9-2004.7 山西大学(本科)
2006.9-2009.7 首都师范大学(硕士)
2012.9-2016.1中国科学院信息工程研究所(博士)
工作经历
2018.3-至今 西安建筑科技大学·信息与控制工程学院 副教授、硕导
2009.7-2012.9 长治学院·数学系 教师
2004.7-2006.9 长治学院·数学系 教师
主讲课程
网络与信息安全,数据结构,计算机新技术等
项目经历
(1)国家自然科学基金委员会, 青年科学基金项目, 61602061, 相关密钥安全性若干关键问题研究, 2017- 01-01 至 2019-12-31, 20万元, 结题, 主持
(2)信息安全国家重点实验室, 面上项目, 2021MS-04, 云数据完整性审计若干关键问题研究, 2021-05 至 2023-05, 3万元, 在研, 主持
(3)陕西省科技厅, 面上项目, 2022JM-365, 云雾一体化环境下物联网数据安全若干关键问题研究, 2022-01 至 2023-12, 5万元, 在研, 主持
(4)陕西省科技厅, 面上项目, 2019JM18, 具有强安全性的同态认证机制研究, 2019-01 至 2020-12, 3万元, 结题, 主持
(5)中国博士后基金委, 面上项目(一等资助), 2017M610021, 公钥加密算法的明文依赖密钥及相关密钥 安全性研究, 2017-01至 2018-04, 8万元, 结题, 主持
(6)国家自然科学基金委员会, 面上项目, 62072363, 面向不确定因素的天然气负荷预测及用户行为检测方法研究, 2021-01至2024-12, 56万元, 在研, 参与
(7)国家自然科学基金委员会,面上项目,61402414, 对依赖密钥的明文进行安全加密的性质研究,2015-01至2018-12,81万元,结题,参与
(8)国家自然科学基金委员会,青年项目,61402471,可证明安全的高效可搜索加密构造方法研究, 2015-01至2017-12,24万元,结题,参与
(9)国家自然科学基金委员会,青年项目,61402468,具有用户部分属性撤销功能的基于属性加密算法研究,2015-01至2017-12,25万元,结题,参与
(10)陕西省科技厅, 面上项目, 2020JM-486, 基于动力学传播行为的网络瓶颈与关键节点辨识, 2020-01 至 2021-12, 4万元, 结题, 参与
学术成果
[1] 常金勇著,公钥加密体制下的 KDM 加密方案和安全性研究,哈尔滨工业大学出版社,2020.4. (专著)
[2] Jinyong Chang, Yanyan Ji, Bilin Shao, Maozhi Xu, Rui Xue*, Certificateless Homomorphic Signature Scheme for Network Coding, IEEE/ACM Transactions on Networking, vol. 28(6), pp. 2615-2628, Dec., 2020. (CCF A)
[3] Jinyong Chang, Bilin Shao, Yanyan Ji*, Genqing Bian, Comment on a Tag Encoding Scheme against Pollution Attack to Linear Network Coding, IEEE Transactions on Parallel and Distributed System, vol. 3(11): 2618-2619, 2020. (CCF A)
[4] Jinyong Chang, Bilin Shao, Yanyan Ji*, Maozhi Xu and Rui Xue, Secure Network Coding from Secure Proof of Retrievability, SCIENCE CHINA Information Sciences, vol. 64: 229301, 2021. (CCF B)
[5] Jinyong Chang, Bilin Shao, Yanyan Ji, and Genqing Bian, Comment on A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage, IEEE Trans. on Services Computing, early access, DOI: 10.1109/TSC.2021.3056660. (CCF B)
[6] Jinyong Chang, Qiaochuan Ren, Yanyan Ji*, Maozhi Xu and Rui Xue, Secure Medical Data Management with Privacy-Preservation and Authentication Properties in Smart Healthcare System, Computer Networks, accepted. (CCF B)
[7] Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu, On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model, The Computer Journal, vol. 62(8), pp. 1232-1245, 2019. (CCF B) [8] Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue, General
Transformations from Single-Generation to Multi-Generation for Homomorphic Message Authentication Schemes in Network Coding, Future Generation Computer Systems, vol. 91, pp. 416-425, 2019. (一区Top期刊)
[9] Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian*, Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited, IEEE Communications Letters, vol. 24(12), pp. 2723-2727, Dec., 2020.
[10] Yanyan Ji, Bilin Shao, Jinyong Chang*, Genqing Bian, Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited, Applied Mathematics and Computation, vol. 386, ID: 125478, 2020. (一区top期刊)
[11] Jinyong Chang, Huiqun Wang, Fei Wang, Anling Zhang, Yanyan Ji, RKA Security for Identity-Based Signature Scheme, IEEE Access, vol. 8, pp. 17833-17841, 2020. (二区期刊)
[12] Jinyong Chang, Hui Ma*, Anling Zhang, Maozhi Xu, Rui Xue, RKASecurity of Identity-Based Homomorphic Signature Scheme, IEEE Access, 2019, 7: 50858-50868.
[13] Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang, Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size, The Computer Journal, Vol. 60(12), pp. 1785-1800, 2017. (CCF B)
[14] Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations, Information Sciences, vol. 486, pp. 450-473, 2019. (一区Top期刊,CCF B)
[15] Jinyong Chang, Honglong Dai, and Maozhi Xu, The KDM-CCA Security of REACT, ISPEC’2017, LNCS 10701, pp. 85-101, 2017 (CACR C).
[16] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Homomorphic Network Coding Signature Schemes against Related-Key Attack in the Random Oracle. The 19th Annual International Conference on Information Security and Cryptology (ICISC-2016), LNCS 10157, pp. 239-253, 2017. (CACR C).
[17] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Separations in Circular Security for Arbitrary Length Key Cycles-the CCA Case. Security and Communication Networks. Vol. 9(18), 2016. (SCI, EI)
[18] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Security Analysis of a TESLA-Based Homomorphic MAC Schemes for Authentication in P2P Live Streaming System. Security and Communication Networks, Vol. 9(16), pp. 3309-3313, Nov. 2016. (SCI, EI)
[19] Jinyong Chang and Rui Xue, Practical Key-Dependent Message Chosen-Ciphertext Security Based on Decisional Composite Residuosity and Quadratic Residuosity Assumptions. Security and Communication Networks, Vol. 8(8), pp. 1525-1536, May, 2015. (SCI, EI)
[20] Jinyong Chang and Rui Xue, The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.4, pp. 1032-1037, April, 2015. (SCI, EI)
[21] Jinyong Chang and Rui Xue, A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding. Journal of Communications. Vol. 10(1), pp. 43-47, January, 2015. (EI)
[22] Honglong Dai, Ding Wang, Jinyong Chang, and Mazhi Xu, On the RCCA Security of Hybrid Signcryption for Internet of Things. Wireless Communications and Mobile Computing, 2018. (SCI 三区)
[23] Honglong Dai, Jinyong Chang, Zhenduo Hou, and Maozhi Xu, Relaxing Enhanced Chosen-Ciphertext Security, IEICE Trans. Fund. Vol. E101-A, 2018. (SCI, EI)
[24] Yanyan Ji, Jinyong Chang, Honglong Dai, and Maozhi Xu, On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme, IEICE Trans. Fund. Vol. E101-A, 2018. (SCI, EI)
[25] Honglong Dai, Luxuan, Zhang, Yanyan Ji, Jinyong Chang, and Maozhi Xu, On the Key Dependent Message Security of DHIES, ICAIT 2017, pp. 322-328. (EI)
[26] Honglong Dai, Jinyong Chang, Zhenduo Hou, and Maozhi Xu, The ECCA Security of Hybrid Encryptions, SocialSec 2017, pp. 847-859. (EI)
[27] Yu Chen, Jiang Zhang, Yi Deng, and Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations. IACR Cryptology ePrint Archive 2016: 1020.
[28] Bei Liang, Hongda Li and Jinyong Chang, Constrained Verfiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015. (EI)
[29] Bei Liang, Hongda Li and Jinyong Chang, The Generic Construction of Adaptively Secure Identity-Based Aggregate Signatures in the Random Oracle Model from Standard Signatures. CANS 2015. (EI)
[30] Bei Liang, Hongda Li and Jinyong Chang, The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015. (EI)
[31] Haidong Liu, Zhaoli Liu and Jinyong Chang, Existence and Uniqueness of Positive Solutions of Nonlinear Schrodinger Systems. Proceedings of the Royal Society of Edinburgh, 145A, 365-390, 2015. (SCI)
[32] Fei Tang, Hongda Li and Jinyong Chang, Multi-Use Unidirectional Proxy Re-Signatures of Constant Size Without Random Oracles. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.3, pp. 898-905, 2015. (SCI, EI)
[33] Fei Tang, Hongda Li and Jinyong Chang, Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.2, pp. 762-766, 2015. (SCI, EI)
[34] Jinyong Chang and Rui Xue, KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. In 11th International Conference on Security and Cryptography, SECRYPT 2014, pp. 299-306, Vienna, Austria. (EI)
[35] Jinyong Chang and Rui Xue, On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E97-A, No.11, pp. 2267-2271, November, 2014. (SCI, EI)
[36] Meihua Wei, Jinyong Chang and Lan Qi, Existence and Statility of Positive Steady-State Solutions for a Lotka-Volterra System with Intraspecific Competition. Advances in Difference Equations. May 30, 2014. (SCI)
[37] Jinyong Chang and Rui Xue, General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications. Journal of Software. Vol. 9(10), pp. 2557-2563, October, 2014.
[38] 常金勇,薛锐,史涛,ElGamal加密方案的KDM安全性. 密码学报,1(3): 235-243, 2014. (CSCD)
[39] Jinyong Chang, Note on Ground States of a Nonlinear Schrodinger System. Journal of Mathematical Analysis and Applications. 381(2), pp. 957-962, September, 2011. (SCI 二区)
[40] Jinyong Chang and Zhaoli Liu, Ground States of Nonlinear Schrodinger Systems. Proceedings of the American Mathematics Society. 138(2), pp. 687-693, Feb. 2010. (SCI 三区)
[41] 常金勇; 邵必林; 边根庆; 籍艳艳; 段东立; 任乔川; 陈怡心; 管学宁; 赵宇博 ; 一种应用于智慧医疗系统的高效数据管理方法, 2021-11-16, 中国, 202111146688.0 (专利)
[42] 常金勇; 邵必林; 边根庆; 籍艳艳; 贾雷刚; 张维琪; 张翔; 叶娜 ; 一种适用于多副本-多云情形下的无证书云审计方法, 2020-8-31, 中国, 202010366211.2 (专利)
[43] 常金勇; 边根庆; 邵必林; 籍艳艳; 贾雷刚; 段东立; 张维琪; 张翔; 胡珍; 胡晓丽 ; 一种适用于第三方审计的高效云数据完整性验证方法, 2019-10-19, 中国, 201910996223.0 (专利)
[44] 常金勇(3/4); 多机理耦合的复杂系统临界相变分析及抗毁性评估, 陕西省教育厅, 陕西省高等学校科学技术研究优秀成果奖, 省部二等奖, 2022。(科研奖励)
社会兼职
(1)自2015年11月起担任中国保密协会隐私保护专委会委员。
(2)自2020年11月起成为中国密码学会会员。
(3)担任MobiSec’2019, ICCEAI’2022等国际会议的Program Committee。 担任IEEE/ACM Trans. Netw., IEEE Trans. on Circuits and Systems I, Computer Networks, Applied Math. Comp., Information Sciences, Computer Journal, TETT, IEICE Trans. on Fund., 西电学报,密码学报,信息安全学报,计算机研究与发展等诸多期刊的审稿人。
个人信息
姓 名: 常金勇 民 族: 籍 贯: 山西
职 称: 副教授 职 务: 政治面貌: 群众
部 门: 计算机系 电子邮箱: changjinyong@xauat.edu.cn
所属学科: 计算机科学与技术
硕士培养方向: 计算机科学与技术、电子信息
研究方向: 信息安全
教育背景
2000.9-2004.7 山西大学(本科)
2006.9-2009.7 首都师范大学(硕士)
2012.9-2016.1中国科学院信息工程研究所(博士)
工作经历
2018.3-至今 西安建筑科技大学·信息与控制工程学院 副教授、硕导
2009.7-2012.9 长治学院·数学系 教师
2004.7-2006.9 长治学院·数学系 教师
主讲课程
网络与信息安全,数据结构,计算机新技术等
项目经历
(1)国家自然科学基金委员会, 青年科学基金项目, 61602061, 相关密钥安全性若干关键问题研究, 2017- 01-01 至 2019-12-31, 20万元, 结题, 主持
(2)信息安全国家重点实验室, 面上项目, 2021MS-04, 云数据完整性审计若干关键问题研究, 2021-05 至 2023-05, 3万元, 在研, 主持
(3)陕西省科技厅, 面上项目, 2022JM-365, 云雾一体化环境下物联网数据安全若干关键问题研究, 2022-01 至 2023-12, 5万元, 在研, 主持
(4)陕西省科技厅, 面上项目, 2019JM18, 具有强安全性的同态认证机制研究, 2019-01 至 2020-12, 3万元, 结题, 主持
(5)中国博士后基金委, 面上项目(一等资助), 2017M610021, 公钥加密算法的明文依赖密钥及相关密钥 安全性研究, 2017-01至 2018-04, 8万元, 结题, 主持
(6)国家自然科学基金委员会, 面上项目, 62072363, 面向不确定因素的天然气负荷预测及用户行为检测方法研究, 2021-01至2024-12, 56万元, 在研, 参与
(7)国家自然科学基金委员会,面上项目,61402414, 对依赖密钥的明文进行安全加密的性质研究,2015-01至2018-12,81万元,结题,参与
(8)国家自然科学基金委员会,青年项目,61402471,可证明安全的高效可搜索加密构造方法研究, 2015-01至2017-12,24万元,结题,参与
(9)国家自然科学基金委员会,青年项目,61402468,具有用户部分属性撤销功能的基于属性加密算法研究,2015-01至2017-12,25万元,结题,参与
(10)陕西省科技厅, 面上项目, 2020JM-486, 基于动力学传播行为的网络瓶颈与关键节点辨识, 2020-01 至 2021-12, 4万元, 结题, 参与
学术成果
[1] 常金勇著,公钥加密体制下的 KDM 加密方案和安全性研究,哈尔滨工业大学出版社,2020.4. (专著)
[2] Jinyong Chang, Yanyan Ji, Bilin Shao, Maozhi Xu, Rui Xue*, Certificateless Homomorphic Signature Scheme for Network Coding, IEEE/ACM Transactions on Networking, vol. 28(6), pp. 2615-2628, Dec., 2020. (CCF A)
[3] Jinyong Chang, Bilin Shao, Yanyan Ji*, Genqing Bian, Comment on a Tag Encoding Scheme against Pollution Attack to Linear Network Coding, IEEE Transactions on Parallel and Distributed System, vol. 3(11): 2618-2619, 2020. (CCF A)
[4] Jinyong Chang, Bilin Shao, Yanyan Ji*, Maozhi Xu and Rui Xue, Secure Network Coding from Secure Proof of Retrievability, SCIENCE CHINA Information Sciences, vol. 64: 229301, 2021. (CCF B)
[5] Jinyong Chang, Bilin Shao, Yanyan Ji, and Genqing Bian, Comment on A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage, IEEE Trans. on Services Computing, early access, DOI: 10.1109/TSC.2021.3056660. (CCF B)
[6] Jinyong Chang, Qiaochuan Ren, Yanyan Ji*, Maozhi Xu and Rui Xue, Secure Medical Data Management with Privacy-Preservation and Authentication Properties in Smart Healthcare System, Computer Networks, accepted. (CCF B)
[7] Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu, On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model, The Computer Journal, vol. 62(8), pp. 1232-1245, 2019. (CCF B) [8] Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue, General
Transformations from Single-Generation to Multi-Generation for Homomorphic Message Authentication Schemes in Network Coding, Future Generation Computer Systems, vol. 91, pp. 416-425, 2019. (一区Top期刊)
[9] Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian*, Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited, IEEE Communications Letters, vol. 24(12), pp. 2723-2727, Dec., 2020.
[10] Yanyan Ji, Bilin Shao, Jinyong Chang*, Genqing Bian, Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited, Applied Mathematics and Computation, vol. 386, ID: 125478, 2020. (一区top期刊)
[11] Jinyong Chang, Huiqun Wang, Fei Wang, Anling Zhang, Yanyan Ji, RKA Security for Identity-Based Signature Scheme, IEEE Access, vol. 8, pp. 17833-17841, 2020. (二区期刊)
[12] Jinyong Chang, Hui Ma*, Anling Zhang, Maozhi Xu, Rui Xue, RKASecurity of Identity-Based Homomorphic Signature Scheme, IEEE Access, 2019, 7: 50858-50868.
[13] Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang, Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size, The Computer Journal, Vol. 60(12), pp. 1785-1800, 2017. (CCF B)
[14] Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations, Information Sciences, vol. 486, pp. 450-473, 2019. (一区Top期刊,CCF B)
[15] Jinyong Chang, Honglong Dai, and Maozhi Xu, The KDM-CCA Security of REACT, ISPEC’2017, LNCS 10701, pp. 85-101, 2017 (CACR C).
[16] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Homomorphic Network Coding Signature Schemes against Related-Key Attack in the Random Oracle. The 19th Annual International Conference on Information Security and Cryptology (ICISC-2016), LNCS 10157, pp. 239-253, 2017. (CACR C).
[17] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Separations in Circular Security for Arbitrary Length Key Cycles-the CCA Case. Security and Communication Networks. Vol. 9(18), 2016. (SCI, EI)
[18] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Security Analysis of a TESLA-Based Homomorphic MAC Schemes for Authentication in P2P Live Streaming System. Security and Communication Networks, Vol. 9(16), pp. 3309-3313, Nov. 2016. (SCI, EI)
[19] Jinyong Chang and Rui Xue, Practical Key-Dependent Message Chosen-Ciphertext Security Based on Decisional Composite Residuosity and Quadratic Residuosity Assumptions. Security and Communication Networks, Vol. 8(8), pp. 1525-1536, May, 2015. (SCI, EI)
[20] Jinyong Chang and Rui Xue, The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.4, pp. 1032-1037, April, 2015. (SCI, EI)
[21] Jinyong Chang and Rui Xue, A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding. Journal of Communications. Vol. 10(1), pp. 43-47, January, 2015. (EI)
[22] Honglong Dai, Ding Wang, Jinyong Chang, and Mazhi Xu, On the RCCA Security of Hybrid Signcryption for Internet of Things. Wireless Communications and Mobile Computing, 2018. (SCI 三区)
[23] Honglong Dai, Jinyong Chang, Zhenduo Hou, and Maozhi Xu, Relaxing Enhanced Chosen-Ciphertext Security, IEICE Trans. Fund. Vol. E101-A, 2018. (SCI, EI)
[24] Yanyan Ji, Jinyong Chang, Honglong Dai, and Maozhi Xu, On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme, IEICE Trans. Fund. Vol. E101-A, 2018. (SCI, EI)
[25] Honglong Dai, Luxuan, Zhang, Yanyan Ji, Jinyong Chang, and Maozhi Xu, On the Key Dependent Message Security of DHIES, ICAIT 2017, pp. 322-328. (EI)
[26] Honglong Dai, Jinyong Chang, Zhenduo Hou, and Maozhi Xu, The ECCA Security of Hybrid Encryptions, SocialSec 2017, pp. 847-859. (EI)
[27] Yu Chen, Jiang Zhang, Yi Deng, and Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations. IACR Cryptology ePrint Archive 2016: 1020.
[28] Bei Liang, Hongda Li and Jinyong Chang, Constrained Verfiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015. (EI)
[29] Bei Liang, Hongda Li and Jinyong Chang, The Generic Construction of Adaptively Secure Identity-Based Aggregate Signatures in the Random Oracle Model from Standard Signatures. CANS 2015. (EI)
[30] Bei Liang, Hongda Li and Jinyong Chang, The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015. (EI)
[31] Haidong Liu, Zhaoli Liu and Jinyong Chang, Existence and Uniqueness of Positive Solutions of Nonlinear Schrodinger Systems. Proceedings of the Royal Society of Edinburgh, 145A, 365-390, 2015. (SCI)
[32] Fei Tang, Hongda Li and Jinyong Chang, Multi-Use Unidirectional Proxy Re-Signatures of Constant Size Without Random Oracles. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.3, pp. 898-905, 2015. (SCI, EI)
[33] Fei Tang, Hongda Li and Jinyong Chang, Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.2, pp. 762-766, 2015. (SCI, EI)
[34] Jinyong Chang and Rui Xue, KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. In 11th International Conference on Security and Cryptography, SECRYPT 2014, pp. 299-306, Vienna, Austria. (EI)
[35] Jinyong Chang and Rui Xue, On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E97-A, No.11, pp. 2267-2271, November, 2014. (SCI, EI)
[36] Meihua Wei, Jinyong Chang and Lan Qi, Existence and Statility of Positive Steady-State Solutions for a Lotka-Volterra System with Intraspecific Competition. Advances in Difference Equations. May 30, 2014. (SCI)
[37] Jinyong Chang and Rui Xue, General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications. Journal of Software. Vol. 9(10), pp. 2557-2563, October, 2014.
[38] 常金勇,薛锐,史涛,ElGamal加密方案的KDM安全性. 密码学报,1(3): 235-243, 2014. (CSCD)
[39] Jinyong Chang, Note on Ground States of a Nonlinear Schrodinger System. Journal of Mathematical Analysis and Applications. 381(2), pp. 957-962, September, 2011. (SCI 二区)
[40] Jinyong Chang and Zhaoli Liu, Ground States of Nonlinear Schrodinger Systems. Proceedings of the American Mathematics Society. 138(2), pp. 687-693, Feb. 2010. (SCI 三区)
[41] 常金勇; 邵必林; 边根庆; 籍艳艳; 段东立; 任乔川; 陈怡心; 管学宁; 赵宇博 ; 一种应用于智慧医疗系统的高效数据管理方法, 2021-11-16, 中国, 202111146688.0 (专利)
[42] 常金勇; 邵必林; 边根庆; 籍艳艳; 贾雷刚; 张维琪; 张翔; 叶娜 ; 一种适用于多副本-多云情形下的无证书云审计方法, 2020-8-31, 中国, 202010366211.2 (专利)
[43] 常金勇; 边根庆; 邵必林; 籍艳艳; 贾雷刚; 段东立; 张维琪; 张翔; 胡珍; 胡晓丽 ; 一种适用于第三方审计的高效云数据完整性验证方法, 2019-10-19, 中国, 201910996223.0 (专利)
[44] 常金勇(3/4); 多机理耦合的复杂系统临界相变分析及抗毁性评估, 陕西省教育厅, 陕西省高等学校科学技术研究优秀成果奖, 省部二等奖, 2022。(科研奖励)
社会兼职
(1)自2015年11月起担任中国保密协会隐私保护专委会委员。
(2)自2020年11月起成为中国密码学会会员。
(3)担任MobiSec’2019, ICCEAI’2022等国际会议的Program Committee。 担任IEEE/ACM Trans. Netw., IEEE Trans. on Circuits and Systems I, Computer Networks, Applied Math. Comp., Information Sciences, Computer Journal, TETT, IEICE Trans. on Fund., 西电学报,密码学报,信息安全学报,计算机研究与发展等诸多期刊的审稿人。

上一条:唐颖
下一条:梁宁静