+86-755-86534493 English

区块链智能硬件
区块链4.0入口

发表论文31篇,其中4SCI22EI4篇中文核心)

第一作者:

  1. Keke Wu, “Flexible Parallel Computing for Elliptic Curve Scalar Multiplication with Resistance against Simple Side-Channel Attacks”, Journal of Computers (Taiwan), Vol. 28, No. 6, December, 2017, pp. 64-78. ISSN: 1991-1599, doi:10.3966/199115992017122806006, Computer Society of the Republic of China. (EI期刊)

  2. Keke Wu, Huiyun Li, Dingju Zhu, “Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems”, Security and Communication Networks, Volume.5, Issue 6, pp.648–657, June 2012, Wiley-Blackwell, ISSN: 1939-0114. (SCI / EI)

  3. Keke Wu, Huiyun Li, Dingju Zhu, Fengqi Yu, “Efficient solution to secure ECC against side-channel attacks”, Chinese Journal of Electronics, Volume 20, Issue 3, 2011, pp. 471–475, Technology Exchange Limited Hong Kong, ISSN: 1022-4653. (SCI)

  4. Keke Wu, Huiyun Li, Xucheng Yin, Guoqing Xu, “Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks”, The 7th International Conference on Computational Intelligence and Security (CIS2011), December 3-4, 2011, Sanya, China, IEEE Computer Society Press. (EI / ISTP)

  5. 邬可可,李慧云,闫立军,“一种防御差分功耗分析的ECC同种映射模型”,《计算机工程》,2017年第10期,43(10)p.115-119。(北大中文核心期刊,中科院CSCD核心期刊)

  6. 邬可可,高月芳,闫立军,“一种抵御差分侧信道分析的椭圆曲线同构方法”,《计算机与现代化》,2017年第10期,266(10)p.105-110。(中国科技核心)

  7. 邬可可,黄国伟,孔令晶,“一种灵活的椭圆曲线密码并行化方法”,《计算机与现代化》,2018年第2期,270(2)p.71-75。(中国科技核心)

  8. 邬可可,李慧云,于峰崎,“可防御侧信道攻击的高效椭圆曲线标量乘方法”,《高技术通讯》,2011215, pp. 495–502国内刊号:CN 11-2770/N, ISSN: 1002-0470(EI /中文核心)

  9. Keke Wu, Huiyun Li, Fengqi Yu, “Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks”, Journal of Computers, Volume 5, Issue 12, 2010, pp. 1878–1884, ISSN: 1796-203X, Academy Publisher. (EI)

  10. 邬可可,李慧云,于峰崎,“对同步流密码设备的相关性功耗分析(CPA)攻击”,《高技术通讯》,20091911期,pp. 1142–1147国内刊号:CN 11-2770/N, ISSN: 1002-0470(EI /中文核心)

  11. Keke Wu, Dawei Li, Huiyun Li, Tingding Chen, Fengqi Yu, “Partitioned Computation to Accelerate Scalar Multiplication for Elliptic Curve Cryptosystems”, The Fifteenth International Conference on Parallel and Distributed Systems (ICPADS 2009), 2009.12.09- 12.11, IEEE Computer Society Press. (EI)

  12. Keke Wu, Huiyun Li, Tingding Chen, Fengqi Yu, “Electromagnetic Analysis on Elliptic Curve Cryptosystems: Measures and Counter-Measures for Smart Cards”, 2009 International Symposium on Intelligent Information Technology Application (IITA 2009), IEEE Computer Society Press. (EI / ISTP)

  13. Keke Wu, Huiyun Li, Tingding Chen, Fengqi Yu, “Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work”, The Second International Symposium on Electronic Commerce and Security (ISECS 2009), IEEE Computer Society Press. (EI)

  14. Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu, “Correlation Power Analysis Attack against Synchronous Stream Cipher”, The 9th International Conference for Young Computer Scientists (ICYCS 2008), IEEE Computer Society Press. (EI / ISTP)

  15. 邬可可,张平安,延霞,“椭圆曲线密码芯片安全与效率的博弈”,《深圳信息职业技术学院学报》,2014123期,pp.18-23

第二作者:

  1. 程东升,邬可可,刘志勇,“基于混沌伪随机匹配移位的图像加密算法”,《信息通信》,pp. 7-92016年第8期。

  2. Huiyun Li, Keke Wu, Fengqi Yu, “Enhanced Correlation Power Analysis Attack against Trusted Systems”, Security and Communication Networks; Volume.4, Issue 1, 2011, pp. 3–10, Wiley-Blackwell. (SCI / EI)

  3. 张翌维,邬可可,陈佳佩,“一种抵御侵入式分析的密码芯片存储总线”,小型微型计算机系统,第33卷,第4期,20124月,pp. 785-788, CN: 21-1106/TP, ISSN: 1000-1220。(中文核心)

  4. Huiyun Li, Keke Wu, Guoqing Xu, Hai Yuan and Peng Luo, “Simple Power Analysis Attacks Using Chosen Message against ECC Hardware Implementations”, World Congress on Internet Security (WorldCIS-2011), Feb 21-23, 2011, UK, IEEE Computer Society Press. (EI / ISTP)

  5. Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan, “Evaluation Metrics of Physical Non-Invasive Security”, Fourth Workshop in Information Security Theory and Practice (WISTP 2010): Security and Privacy of Pervasive Systems and Smart Devices, April 13-14, Passau, Germany, Springer: LNCS (EI)

  6. Huiyun Li, Keke Wu, Fengqi Yu, “Enhanced Correlation Power Analysis Attack on Smart Card”, The 9th International Conference for Young Computer Scientists (ICYCS 2008), IEEE Computer Society Press. (EI / ISTP)

第三作者:

  1. Lingjing Kong, Guowei Huang, Keke Wu, “Identification of Abnormal Network Traffic Using Support Vector Machine”, International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2017), Taipei Taiwan, December 18-20, 2017. (EI)

  2. Guowei Huang, Lingjing Kong, Keke Wu, Zhi Chen, “A Bandwidth Allocation Policy for Helpers in Cloud-assisted P2PVideo-on-demand Systems”, 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD 2017), August 13-16, Shanghai, China. (EI)

  3. Guowei Huang, Lingjing Kong, Keke Wu, Zhi Chen, “A Service Scheduling Policy for Improving Playback Quality of Mesh-based P2P VoD Systems”, The 16th IEEE International Conference on Ubiquitous Computing and Communications, December 12-15, 2017. (EI)

  4. Guowei Huang, Lingjing Kong, Keke Wu, “An Incentive scheme based on Bitrate Adaptation for Cloud-Assisted P2P Video-on-demand Streaming Systems”, the 3rd IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2018), April 20-22, 2018, Chengdu, China, ICCCBDA 2018 Conference Proceedings. (EI)

  5. Huiyun Li, Tingding Chen, Keke Wu, Fengqi Yu, “Quantitative Evaluation of Side-channel Security”, 2009 Asia-Pacific Conference on Information Processing (APCIP 2009), IEEE Computer Society Press. (EI / ISTP)

  6. Huiyun Li, Tingding Chen, Keke Wu, Fengqi Yu, “Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems”, 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication 2009 (ICASID 2009), IEEE Computer Society Press. (EI / ISTP)

  7. Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu, “Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure”, 2009 Asia-Pacific Conference on Information Processing (APCIP 2009), IEEE Computer Society Press. (EI / ISTP)

  8. Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu, “Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices”, 2009 International Conference on Computer and Communications Security (ICCCS 2009), IEEE Computer Society Press. (EI / ISTP)

第四作者:

  1. Ying Zhou, Jiahai Wang, Ziyan Wu, Keke Wu, “A multi-objective tabu search algorithm based on decomposition for multi-objective unconstrained binary quadratic programming problem”, Knowledge-Based Systems, Volume 141, 1 February 2018, Pages 18–30. (SCI)

  2. Jeng-Shyang Pan, Lijun Yan, Xingming Liu, Keke Wu, “Directional Derivative and Feature Line Based Subspace Learning Algorithm for Classification”, Journal of Information Hiding and Multimedia Signal Processing, Volume 7, Number 6, November 2016, ISSN 2073-4212, pp. 1337-1344. (EI)