Biography

Dr. Xiaochun Cheng

Swansea University, UK


Email: xiaochun.cheng@gmail.com


Qualifications


1996 Ph.D., Jilin University, China

1992 B.Sc., Jilin University, China


Publications (Selected)

  1. 2014, Degradation and Encryption for Outsourced PNG Image in Cloud Storage.
  2. International Journal of Grid and Utility Computing, ISSN online: 1741-8488, ISSN print: 1741-847X. 2012, A Security Design for Cloud Computing: An Implementation of an On Premises Authentication with Kerberos and IPSec within a Network, International Journal of Advanced Research in Computer Science, Volume 3, No. 1, Jan-Feb.
  3. 2010, Efficient Identity-Based Broadcast Encryption without Random Oracles, Journal of Computers, Vol. 5, No 3, 331-336.
  4. 2008, Verifying Security Protocols by Knowledge Analysis, International Journal of Security and Networks, Vo.3, No.3, pages.183-192.
  5. 2005, Formal Verification of Merchant Registration Phase of Secure Electronic Transaction Protocol, International Journal of Automation and Computing, ISSN 1476-8186, Vol.2, No.2, pages155-162.
  6. 2013, Detection of Application Layer DDoS Attack with Clustering and Likelihood Analysis, Globecomm 2013, International Workshop on Security and Privacy in Big Data, GLOBECOM Workshops 2013: 217-222.
  7. 2013, Detection of Application Layer DDoS Attack with Clustering and Bayes Factors, IEEE SMC 2013, http://www.smc2013.org/, 978-1-4799-0652-9/13, DOI: 10.1109/SMC.2013.34, pages 156-161.
  8. 2013, DNSsec in Isabelle -- Replay Attack and Origin Authentication, IEEE SMC 2013, www.smc2013.org/, 978-1-4799-0652-9/13, DOI:10.1109/ SMC.2013.812,  pages  4772-4777.
  9. 2013, Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud, 4TH International Conference on Emerging Intelligent Data and Web Technologies, http://voyager.ce.fit.ac.jp/conf/eidwt/2013/index.html, EIDWT: 249-255.
  10. 2013, Format-compliant Degradation and Encryption for PNG Image, 2013 4TH International Conference on Emerging Intelligent Data and Web Technologies. http://voyager.ce.fit.ac.jp/conf/eidwt/2013/index.html, EIDWT: 720-723.
  11. 2012-2013, Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements. Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, pp 45-61. Joaquín García-Alfaro, FrédéricCuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi (Eds.): Lecture Notes in Computer Science Volume 7743 Springer 2013, ISBN 978-3-642-37118-9, pp 45-61.
  12. 2011-2012, Chapter 4: Improvement of an ID-Based Threshold Signcryption Scheme, Computer, Informatics, Cybernetics and Applications,  Proceedings of the CICA 2011, Editors: Xingui He, ErtianHua, Yun Lin, Xiaozhu Liu, ISBN: 978-94-007-1838-8 (Print) 978-94-007-1839-5 (Online), Lecture Notes in Electrical Engineering, Volume 107, 2012, pp 29-35.
  13. 2011-2012, Chapter 69: Analysis of an ID-Based Threshold Signcryption Scheme, Proceedings of the International Conference on Green Communications and Networks (GCN 2011), Yuhang Yang, Maode Ma, (Eds), ISBN: 978-94-007-2168-5 (Print) 978-94-007-2169-2 (Online), Green Communications and Networks, Lecture Notes in Electrical Engineering, Publisher: Springer; Volume 113, 2012, pp 585-592.
  14. 2010, Format-Preserving Encryption for Date Time, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010), ISBN: 978-1-4244-6582-8, pages 201-205.
  15. 2009, TLS Protocol Extensions for Web Applications of Identity-based Encryption, IEEE International Conference on Machine Learning and Cybernetics, Vol. 6, pages 3595-3599.
  16. 2009, A Chosen-Ciphertext Secure Identity-Based Broadcast Encryption Scheme, IEEE International Conference on Machine Learning and Cybernetics,  Vol. 6, Pages3556-3560.
  17. 2007, Voice over Internet Protocol: Vulnerabilities and Countermeasure, pages:176-181, Proceedings of IEEE SMC UK&RI 6th Conference on Cybernetic Systems 2007, ISSN 1744-9170.
  18. 2007, Security Issues in E-learning Systems, pages:170-175, Proceedings of IEEE SMC UK&RI 6th Conference on Cybernetic Systems 2007, ISSN 1744-9170.
  19. 2006, Syntax, Semantics and Type Theory of A Security Protocol Verification Framework, IEEE SMC UK Annual Conference on Applied Cybernetics, ISSN 1744-9170, 148-153, Sheffield.
  20. 2006, A Mobile Agent Transfer Method for Protecting the Integrity of Mobile Agents, IEEE SMC UK Annual Conference on Applied Cybernetics, ISSN 1744-9170, 102-107, Sheffield.
  21. 2006, Verifying and Fixing Password Authentication Protocol, International Workshop on Self-Assembling Wireless Networks , Yeong-Tae Song, Chao Lu, Roger Lee (Eds.): Seventh International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2006), 19-20 June 2006, Las Vegas, Nevada, USA. IEEE Computer Society 2006, ISBN 0-7695-2611-X, 324-329.
  22. 2005, Verifying Cardholder Registration Phase in SET Protocol, Proceedings of the IEEE SMC UK-RI Chapter Conference on Applied Cybernetics, City University, London, United Kingdom, ISSN 1744-9189, pages 88-93.
  23. 2005, Secrecy Proofs of SET Purchase Request Phase, 2005 International Conference on Computational Intelligence and Security, pages 99-104, Yuping Wang, Yiu-ming Cheung, Hailin Liu (Eds.), Advances in Computational Intelligence and Security, Xidian University Press, ISBN 7-5606-1607-0.
  24. 2005, Proving Secure Properties of Cryptographic Protocols with Knowledge based Approach, The 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), Phoenix, Arizona, USA, ISBN: 0-7803-8991-3, pages: 3-9.
  25. 2010, Mechanical Verification of Cryptographic Protocols,  in Scott Huang, David MacCallum, and Ding-Zhu Du (Eds), Network Security, Publisher: Springer; 1st Edition,  ISBN-10: 0387738207, ISBN-13: 978-0387738208. pp 97-115.


Profile Details

http://www.mdx.ac.uk/aboutus/staffdirectory/Xiaochun_Cheng.aspx

Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top