Dr. Xiaochun Cheng
Swansea University, UK
Email: xiaochun.cheng@gmail.com
Qualifications
1996 Ph.D., Jilin University, China
1992 B.Sc., Jilin University, China
Publications (Selected)
-
2014, Degradation and Encryption for Outsourced PNG Image in
Cloud Storage.
-
International Journal of Grid and
Utility Computing, ISSN online: 1741-8488, ISSN print: 1741-847X. 2012, A
Security Design for Cloud Computing: An Implementation of an On Premises
Authentication with Kerberos and IPSec within a Network, International Journal
of Advanced Research in Computer Science, Volume 3, No. 1, Jan-Feb.
-
2010,
Efficient Identity-Based Broadcast Encryption without Random Oracles, Journal
of Computers, Vol. 5, No 3, 331-336.
-
2008,
Verifying Security Protocols by Knowledge Analysis, International Journal of
Security and Networks, Vo.3, No.3, pages.183-192.
-
2005, Formal
Verification of Merchant Registration Phase of Secure Electronic Transaction
Protocol, International Journal of Automation and Computing, ISSN 1476-8186,
Vol.2, No.2, pages155-162.
-
2013, Detection of Application Layer DDoS Attack with Clustering and
Likelihood Analysis, Globecomm 2013, International Workshop on Security and
Privacy in Big Data, GLOBECOM
Workshops 2013: 217-222.
-
2013,
Detection of Application Layer DDoS Attack with Clustering and Bayes Factors,
IEEE SMC 2013, http://www.smc2013.org/,
978-1-4799-0652-9/13, DOI: 10.1109/SMC.2013.34, pages 156-161.
-
2013, DNSsec
in Isabelle -- Replay Attack and Origin Authentication, IEEE SMC 2013, www.smc2013.org/,
978-1-4799-0652-9/13, DOI:10.1109/ SMC.2013.812, pages
4772-4777.
-
2013,
Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid
Cloud, 4TH International Conference on Emerging Intelligent Data and Web
Technologies, http://voyager.ce.fit.ac.jp/conf/eidwt/2013/index.html, EIDWT:
249-255.
-
2013,
Format-compliant Degradation and Encryption for PNG Image, 2013 4TH
International Conference on Emerging Intelligent Data and Web Technologies. http://voyager.ce.fit.ac.jp/conf/eidwt/2013/index.html, EIDWT:
720-723.
-
2012-2013,
Detection of HTTP-GET Attack with Clustering and Information Theoretic
Measurements. Foundations and Practice of Security - 5th International
Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, pp 45-61. Joaquín García-Alfaro,
FrédéricCuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi (Eds.): Lecture
Notes in Computer Science Volume 7743 Springer 2013, ISBN 978-3-642-37118-9, pp
45-61.
-
2011-2012,
Chapter 4: Improvement of an ID-Based Threshold Signcryption Scheme, Computer,
Informatics, Cybernetics and Applications, Proceedings of the CICA 2011, Editors: Xingui
He, ErtianHua, Yun Lin, Xiaozhu Liu, ISBN: 978-94-007-1838-8 (Print)
978-94-007-1839-5 (Online), Lecture Notes
in Electrical Engineering, Volume 107, 2012, pp 29-35.
-
2011-2012,
Chapter 69: Analysis of an ID-Based Threshold Signcryption Scheme, Proceedings
of the International Conference on Green Communications and Networks (GCN
2011), Yuhang Yang, Maode Ma, (Eds), ISBN: 978-94-007-2168-5 (Print)
978-94-007-2169-2 (Online), Green
Communications and Networks, Lecture Notes in Electrical
Engineering, Publisher: Springer; Volume 113, 2012, pp 585-592.
-
2010,
Format-Preserving Encryption for Date Time, 2010 IEEE International Conference
on Intelligent Computing and Intelligent Systems (ICIS 2010), ISBN: 978-1-4244-6582-8,
pages 201-205.
-
2009, TLS
Protocol Extensions for Web Applications of Identity-based Encryption, IEEE
International Conference on Machine Learning and Cybernetics, Vol. 6, pages 3595-3599.
-
2009, A
Chosen-Ciphertext Secure Identity-Based Broadcast Encryption Scheme, IEEE
International Conference on Machine Learning and Cybernetics, Vol. 6, Pages3556-3560.
-
2007, Voice
over Internet Protocol: Vulnerabilities and Countermeasure, pages:176-181,
Proceedings of IEEE SMC UK&RI 6th Conference on Cybernetic Systems 2007,
ISSN 1744-9170.
-
2007,
Security Issues in E-learning Systems, pages:170-175, Proceedings of IEEE SMC
UK&RI 6th Conference on Cybernetic Systems 2007, ISSN 1744-9170.
-
2006,
Syntax, Semantics and Type Theory of A Security Protocol Verification
Framework, IEEE SMC UK Annual Conference on Applied Cybernetics, ISSN
1744-9170, 148-153, Sheffield.
-
2006, A
Mobile Agent Transfer Method for Protecting the Integrity of Mobile Agents,
IEEE SMC UK Annual Conference on Applied Cybernetics, ISSN 1744-9170, 102-107,
Sheffield.
-
2006, Verifying
and Fixing Password Authentication Protocol, International Workshop on
Self-Assembling Wireless Networks , Yeong-Tae Song, Chao Lu, Roger Lee (Eds.): Seventh International Conference on Software Engineering, Artificial
Intelligence, Networking and Parallel/Distributed Computing (SNPD 2006), 19-20
June 2006, Las Vegas, Nevada, USA. IEEE Computer Society 2006, ISBN
0-7695-2611-X, 324-329.
-
2005,
Verifying Cardholder Registration Phase in SET Protocol, Proceedings of the
IEEE SMC UK-RI Chapter Conference on Applied Cybernetics, City University,
London, United Kingdom, ISSN 1744-9189, pages 88-93.
-
2005, Secrecy Proofs of SET Purchase
Request Phase, 2005 International Conference on Computational Intelligence and
Security, pages 99-104, Yuping Wang, Yiu-ming Cheung, Hailin Liu (Eds.),
Advances in Computational Intelligence and Security, Xidian University Press,
ISBN 7-5606-1607-0.
-
2005,
Proving Secure Properties of Cryptographic Protocols with Knowledge based
Approach, The 24th IEEE International Performance Computing and Communications
Conference (IPCCC 2005), Phoenix, Arizona, USA, ISBN: 0-7803-8991-3, pages:
3-9.
-
2010, Mechanical
Verification of Cryptographic Protocols,
in Scott Huang, David MacCallum, and Ding-Zhu Du (Eds), Network
Security, Publisher: Springer; 1st Edition,
ISBN-10: 0387738207, ISBN-13: 978-0387738208. pp 97-115.
Profile Details
http://www.mdx.ac.uk/aboutus/staffdirectory/Xiaochun_Cheng.aspx