代表性论文或专著 1. Zihou Zhang, Jiangtao Li*, Yufeng Li, Chenhong Cao, Zhenfu Cao, Hardware Secure Module based Lightweight Conditional Privacy-Preserving Authentication for VANETs, IEEE Transactions on Information Forensics and Security, vol. 19, pp. 6337-6350, 2024.(CCF-A) 2. Lei Zhang*, Jiangtao Li*, Yafang Yang*, Message Linkable Group Signature with Information Binding and Efficient Revocation for Privacy-Preserving Announcement in VANETs, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 6, pp. 5667-5680, Nov.-Dec. 2024. (CCF-A) 3. Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong*, Haifeng Qian*, Registered Functional Encryptions from Pairings, Eurocrypt 2024, LNCS 14652., pp. 373-402, 2024 (CCF-A) 4. Jiangtao Li, Zhaoheng Song, Zihou Zhang, Yufeng Li*, Chenhong Cao, In-Vehicle Digital Forensics for Connected and Automated Vehicles With Public Auditing, IEEE Internet of Things Journal , vol. 11, no. 4, pp. 6368-6383, Feb. 2024.(SCI一区) 5. Yufeng Li, Fengyu Yang, Qi Liu, Jiangtao Li*, Chenhong Cao, Light can be dangerous: Stealthy and effective physical-world adversarial attack by spot light, Computers & Security, vol. 132:103345, Sep. 2023.(CCF-B) 6. Jiangtao Li, Yufeng Li, Chenhong Cao, Kwok-Yan Lam, Conditional Anonymous Authentication with Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles, IEEE Internet of Things Journal, vol. 9, no. 11, pp. 8749 - 8762, Jun. 2022. (SCI一区) 7. Tingting Lu, Jiangtao Li*, Lei Zhang*, Kwok-Yan Lam, Group Signatures with Decentralized Tracing, Inscrypt 2019, LNCS 12020, pp. 435-442, 2019.(CCF-C) 8. Jiangtao Li, Junqing Gong*, Improved Anonymous Broadcast Encryptions: Tight Security and Shorter Ciphertext, ACNS 2018, LNCS 10892, pp. 497-515, 2018.(CCF-C) 9. Jiangtao Li, Lei Zhang*, Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol, Information Sciences, vol. 414, pp. 187-202, 2017. (SCI一区) 10. Jiangtao Li, Lei Zhang*, Joseph K. Liu, Haifeng Qian, Zheming Dong, Privacy-preserving public auditing protocol for low-performance end devices in cloud, IEEE Transactions on Information Forensics and Security, vol. 11, pp. 2572-2583, 2016. (CCF-A) |