博士生导师
硕士生导师
个人信息Personal Information
学位:工学博士学位
办公地点:西南交通大学犀浦校区九号教学楼
学科:计算机应用技术. 计算机科学与技术. 网络空间安全. 信号与信息处理. 信息安全. 通信与信息系统
所在单位:信息科学与技术学院
报考该导师研究生的方式
欢迎你报考张文芳老师的研究生,报考有以下方式:
1、参加西南交通大学暑期夏令营活动,提交导师意向时,选择张文芳老师,你的所有申请信息将发送给张文芳老师,老师看到后将和你取得联系,点击此处参加夏令营活动
2、如果你能获得所在学校的推免生资格,欢迎通过推免方式申请张文芳老师研究生,可以通过系统的推免生预报名系统提交申请,并选择意向导师为张文芳老师,老师看到信息后将和你取得联系,点击此处推免生预报名
3、参加全国硕士研究生统一招生考试报考张文芳老师招收的专业和方向,进入复试后提交导师意向时选择张文芳老师。
4、如果你有兴趣攻读张文芳老师博士研究生,可以通过申请考核或者统一招考等方式报考该导师博士研究生。
公开发表学术论文90余篇,授权发明专利40余项,编著信息安全书籍2部。
[1] 期刊文章(部分)
(1) Yu Wang, Wenfang Zhang*, Xiaomin Wang, Muhammad Khurram Khan, Pingzhi Fan. Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks, IEEE Transactions on Intelligent Transportation Systems, 2023, 25(1): 370-385. (SCI,一区)
(2) Xi Huang, Wenfang Zhang*, Shibin Zhang. Practical quantum protocols for blind millionaires’ problem based on rotation encryption and swap test, Physica A, 2024, 637:129614. (SCI,一区)
(3) Yu Wang, Wenfang Zhang*, Xiaomin Wang, Wei Guo, Muhammad Khurram Khan, Pingzhi Fan. Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(2):1332-1346. (SCI,一区)
(4) Yu Wang, Wenfang Zhang*, Xiaomin Wang, Muhammad Khurram Khan, Pingzhi Fan. Efficient Privacy-Preserving Authentication Scheme with Fine-grained Error Location for Cloud-based VANET. IEEE Transactions on Vehicular Technology, 2021, 10; 70(10): 10436-10449. (SCI,一区)
(5) Xi Huang, Wen-Fang Zhang*, Shi-Bin Zhang. Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption. Quantum Information Processing, 2023, 22(272):1-23. (SCI,一区)
(6) Wenfang Zhang, Heng Jiao, Zhuoqun Yan, Xiaomin Wang, Muhammad Khurram Khan. Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing. Computers & Security, 2022: 1-8. (SCI,二区)
(7) Liting Lei, Wenfang Zhang*, Yu Wang, Xiaomin Wang. A pairing-free identity-based handover AKE protocol with anonymity in the heterogeneous wireless networks. International Journal of Communication Systems. 2019, 32(12):1-16. (SCI)
(8) Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan. A VBCA-based cross-domain authentication mechanism for distributed collaborative manufacturing systems. Security and Communication Networks, 2015, 8: 937-951. (SCI)
(9) Chao Yuan, Wenfang Zhang*, Xiaomin Wang. EIMAKP: Heterogeneous Cross-Domain Authenticated Key Agreement Protocols in the EIM System. Arabian Journal for Science and Engineering, 2017, 42: 3275-3287. (SCI)
(10) Xiaomin Wang, Wenfang Zhang, Wei Guo, Jiashu Zhang. Secure chaotic system with application to chaotic ciphers. Information Sciences, 2013, 221(2): 555-570. (SCI,一区)
(11) Xiaomin wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, and Khaled Alghathbar. Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network. Telecommunication Systems, 2013, 52: 515–524. (SCI)
(12) Wei Guo, Xiaomin Wang, Wenfang zhang, DakeHe. Key-recovery attack on a keyed hash function based on chaotic map network, INFORMATION, 2013, 16(9A): 6605-6617. (SCI)
(13) Yu Xiu-Ying, He Da-Ke, Zhang Wen-Fang. An efficient certificateless authenticated key agreement. Journal of Theoretical and Applied Information Technology, 2013, 48(2): 1160-1166. (EI)
(14) Jiashu Zhang, Xiaomin Wang, Wenfang Zhang. Chaotic keyed hash function based on feedforward- feedback nonlinear digital filter. Physics Letters A, 2007, 362(5-6): 439-448. (SCI)
(17) Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhammad Khurram Khan. Cryptanalysis and improvement on two efficient remote user authentication schemes using smart cards, Computer Standards & Interfaces, 2007, 29(5): 507-512. (SCI)
(16) Wenfang Zhang, Dake He, Xiaomin Wang. An improved generalized threshold authenticated encryption scheme. International Journal of Computer Science and Network Security (IJCSNS). 2006, 6(8B): 195-201. (EI)
(17) 张文芳, 雷丽婷, 王小敏, 王宇. 面向云服务的安全高效无证书聚合签名车联网认证密钥协商协议. 电子学报, 2020. 48(9): 1814-1823. (EI)
(18) 张文芳, 陈桢, 刘旭东, 王小敏. 支持细粒度属性直接撤销的CP-ABE方案. 软件学报, 2019, 30(9): 2760-2771. (EI)
(19) 张文芳, 孙海锋, 张晏端, 唐荣骏 等, 基于树形结构构造的联盟链主从多链共识算法. 电子学报, 2022, 50(2): 257-266. (EI)
(20) 孙海锋, 张文芳*, 王小敏, 马征, 黄路非, 李暄. 基于门限和环签名的抗自适应攻击拜占庭容错共识算法. 自动化学报, 2023, 49(7): 1471-1482. (EI)
(21) 张文芳, 孙海锋, 王宇, 蔺伟, 王小敏. 基于自更新哈希链的安全高效车-地通信鉴权方案. 西南交通大学学报, 2020. 55(6): 1160-1170. (EI)
(22) 王宇, 张文芳, 王小敏, 吴文丰. 基于匿名代理签名的LTE-R车-地无线通信安全认证方案. 铁道学报, 2020, 42(3): 76-84. (EI)
(23) 吴文丰, 张文芳*, 王小敏, 王宇. 一种安全增强的LTE-R车-地认证密钥协商方案. 铁道学报, 2019. 41(12): 66-74. (EI)
(24) 张文芳, 董冠群, 王小敏, 吴文丰. 基于多步动态信任评价的任务—角色基访问控制模型. 计算机集成制造系统-CIMS, 2018, 24(8): 1983-1995. (EI)
(25) 刘旭东, 张文芳*, 王小敏. 分布式无中心授权的基于属性可变门限环签名方案. 软件学报, 2018, 29(11):3528-3543. (EI)
(26) 张文芳, 熊丹, 王小敏, 陈桢, 刘旭东. 基于 RSA 公钥密码体制的可选择可转换关联环签名. 计算机学报, 2017, 40(5): 1-13. (EI)
(27) 陈桢, 张文芳*, 王小敏. 基于属性的抗合谋攻击可变门限环签名方案. 通信学报, 2015, 36(12): 912-922. (EI)
(28) 刘元兵, 张文芳*, 王小敏. 云制造环境下基于多属性模糊信任评估的访问控制方案. 计算机集成制造系统-CIMS, 2018, 24(2): 321-330. (EI)
(29) 张文芳, 熊丹, 王小敏. 基于关联环签名的抗第三方欺诈安全电子投票方案. 西南交通大学报, 2015, 50(5): 905-911. (EI)
(30) 张文芳, 王小敏, 郭伟, 何大可. 基于椭圆曲线密码体制的高效虚拟企业跨域认证方案. 电子学报, 2014, 42(6): 1095-1102. (EI)
(31) 张文芳, 王小敏, 何大可. 一个改进的基于门限RSA签名的虚拟企业安全交互模型. 计算机研究与发展, 2012, 49(8): 1662-1667. (EI)
(32) 董冠群, 张文芳*, 王小敏. 面向虚拟企业的PT-TRBAC动态访问控制模型. 计算机集成制造系统-CIMS, 2014, 20(7): 1716-1730. (EI)
(33) 饶宇, 张文芳*, 王小敏. 基于访问授权票据的跨异构域认证与密钥协商. 计算机集成制造系统-CIMS, 2014, 20(8): 2050-2059. (EI)
(34) 廖东, 王小敏, 张家树, 张文芳. 基于空间伸缩结构的参数可控的混沌Hash函数. 物理学报, 2012, 61(23): 230506-1-10. (SCI)
(35) 周萍, 何大可, 张文芳*. 具有强安全性不含双线性对的基于证书盲签名. 四川大学学报(工程科学版), 2013, 45(4): 111-116. (EI)
(36) 周萍, 何大可, 张文芳*. 不含双线性对的基于证书前向安全签名方案. 铁道学报, 2013, 35(11): 45-50. (EI)
(37) 张文芳, 王小敏, 何大可. 身份可追查的抗合谋攻击虚拟企业广义信任交互方案. 计算机集成制造系统-CIMS, 2010, 16(7): 1558-1567. (EI)
(38) 张文芳, 何大可, 王小敏, 郑宇. 基于新型秘密共享方法的高效RSA门限签名方案. 电子与信息学报, 2005, 27(11): 1745-1749. (EI)
(39) 张文芳, 王小敏, 何大可. 一种防欺诈的安全增强型广义门限签密方案. 四川大学学报(工程科学版), 2010, 42(4): 83-90. (EI)
(40) 张文芳, 王小敏, 何大可. 一个无可信中心(t,n)门限签名方案的安全缺陷及其改进. 铁道学报, 2008, 30(3): 40-45. (EI)
(41) 马冬, 何大可, 张文芳. 基于AAA的移动IP快速认证注册方案研究. 铁道学报, 2008, 30(1): 98-103. (EI)
(42) 张文芳, 何大可, 王小敏. 基于可变权限基的广义虚拟企业信任交互方案. 计算机集成制造系统-CIMS, 2007, 13(5): 1001-1007. (EI)
(43) 张文芳, 何大可, 王宏霞, 王小敏. 具有可追查性的抗合谋攻击(t,n)门限签名方案. 西南交通大学学报, 2007, 42(4): 461-467. (EI)
(44) 王小敏, 张文芳, 张家树. 基于非线性数字滤波器的混沌Hash函数设计. 计算机辅助设计与图形学学报, 2006, 18(6): 870-875. (EI)
(45) 王小敏, 张家树, 张文芳. 基于复合非线性数字滤波器的hash函数构造. 物理学报, 2005, 54(12): 5566-5573. (SCI,EI)
(46) 郑宇, 何大可, 张文芳, 路献辉. 一种有效的GPS数据压缩方案. 中国铁道科学, 2005, 26(3): 134-138. (EI)
[2] 会议文章(部分)
(1) Wang Y, Zhang W*, Wang X. A Lightweight and Secure Authentication Protocol for Space-Ground Integrated Network of Railway[C]//2021 International Conference on Communications, Information System and Computer Engineering (CISCE). May 14-16, 2021, Beijing, China, IEEE, 2021: 30-35. (EI)
(2) Zhen Chen, Wenfang Zhang*, Xiaomin Wang. A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking, The 3rd International Workshop on Cyber Security and Privacy (CSP 2014) in 2014 International Conference on Cyber-enabled distributed computing and knowledge discovery (Cyber 2014), Shanghai, October 10-12, 2014: 10-13. (EI,ISTP)
(3) Wenfang Zhang, Xiaomin Wang. A conspiracy attack resistant trust model for agile manufacturing enterprises. Proceeding of the 3rd International Conference on Research and Innovation in Information Systems(ICRIIS 2013), Selangor, Malaysia, Nov 27-28, 2013: 135-139. (EI,ISTP)
(4) Yu Xiu-Ying, Zhang Wen-Fang, He Da-Ke. A new certificateless authenticated two-party key agreement. 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2011), Shanghai, June 10-12, 2011, Vol 3: 686-690. (EI)
(5) Li Gao, Xiaomin Wang, Wenfang Zhang. Chaotic hash function based on Tandem-DM construction. 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11 (The 2nd International Symposium on Mobile and Wireless Network Security (MWNS 2011)), Changsha, China, November 16-18, 2011: 1745-1749. (EI)
(6) Wenfang Zhang, Xiaomin Wang. A novel inter-enterprises authentication scheme for virtual enterprises based on variable privilege sets. IEEE Proceedings of the 2010 2nd Internetional Conference on Signal Processing Systems (ICSPS 2010), Dalian, China, July 5-7, 2010, Vol.3:178-180. (EI,ISTP)
(7) Xiaomin Wang, Wenfang Zhang. An efficient and secure biometric remote user authentication scheme using smart cards. 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Applications (PACIIA 2008), Wuhan, China, December 19-20, 2008: 913-917. (EI,ISTP)
(8) Wenfang Zhang, Xingyu Liu, Dake He, Xiaomin Wang. A novel ElGamal type threshold signature scheme. IEEE Proceedings of the 6th World Congress on Intelligent Control and Automation (WCICA 2006), Dalian, China, June 21-23, 2006, Vol.4: 3119-3123. (EI,ISTP)
(9) Wenfang Zhang, Dake He, Xiaomin Wang. A new generalized threshold signcryption scheme. IEEE Proceedings of 2006 International Conference on Communication Technology (ICCT 2006), Guilin, China, November 27-30, 2006: 186-189. (EI,ISTP)
(10) Xiaomin Wang, Jiashu Zhang, Wenfang Zhang. Chaotic keystream generator using coupled NDFs with parameter perturbing. Proceedings of the 5th International Conference on Cryptology and Network Security (CANS 2006), Suzhou, China, December 8-10, 2006. Berlin: Springer-Verlag, LNCS 4301, 2006: 270-285. (EI,ISTP)
(11) Xiaomin Wang, Jiashu Zhang, Wenfang Zhang, Muhammad Khurram Khan. Security improvement on the timestamp-based password authentication scheme using smart cards. Proceeding of IEEE International Conference on Engineering of Intelligent Systems (ICEIS 2006), Islamabad, Pakistan, April 22-23, 2006: 140-142. (EI,ISTP)
(12) Xiaomin Wang, Jiashu Zhang, Yongquan Fan, Wenfang Zhang. Chaotic pseudorandom bit generator using N-dimensional nNonlinear digital filter. IEEE Proceedings of 2006 International Conference on Communication Technology (ICCT 2006), Guilin, China, November 27-30, 2006: 159-162. (EI,ISTP)
(13) Wenfang Zhang, Dake He, Xiaomin Wang. Chaotic secure communications based on discrete time chaos noise generator. IEEE Proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2003), Chengdu, China, August 27-29, 2003: 935-939. (EI,ISTP)
(14) Dake He, Wenfang Zhang. The parallel algorithm of 2-D discrete wavelet transform. IEEE Proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2003), Chengdu, China, August, 2003: 738-741. (EI,ISTP)
[3] 已授权发明专利(部分)
(1) METHOD FOR BATCH HANDOVER AUTHENTICATION AND KEY AGREEMENT ORIENTED TO HETEROGENEOUS NETWORK. 美国发明专利, 专利号:US 11,665,598B2.
(2) 一种外包属性基加密即时密文验证方法. 发明专利, 专利号:ZL202211110861.6.
(3) 一种基于双重盲化的拜占庭容错共识方法. 发明专利, 专利号:ZL202211083662.0.
(4) 一种基于变色龙哈希函数的安全认证方法. 发明专利, 专利号:ZL202111140564.1.
(5) 一种基于区块链的医疗数据共享加密方法. 发明专利, 专利号:ZL202111075040.9.
(6) 基于无证书且含隐私保护功能的云端数据完整性审计方法. 发明专利, 专利号: ZL 202010300887.1.
(7) 一种基于盲签名的无线体域网匿名认证与密钥协商方法. 发明专利, 专利号:ZL 201910609615.7.
(8) 一种基于同态的云辅助动态通用安全多方计算方法. 发明专利, 专利号: ZL 201910603234.8.
(9) 一种基于证书的无线体域网群组认证与密钥协商方法. 发明专利, 专利号:ZL 201910529658.4.
(10) 一种分布式授权的属性基网络环签名方法. 发明专利, 专利号: ZL 201710485416.0.
(11) 基于身份无对的无线网跨域切换认证的密钥协商方法. 发明专利, 专利号: ZL 201710705073.4.
(12) ZPW-2000补偿电容开路故障预警方法. 发明专利, 专利号: ZL 201810790377.X.
(13) 基于票据的LTE-R车-地通信接入层切换认证方法. 发明专利, 专利号: ZL 201810006672.1.
(14) 基于代理签名的LTE-R车-地通信非接入层认证方法. 发明专利, 专利号: ZL 201810006662.8.
(15) 基于混合密码的 LTE-R车-地通信非接入层认证密钥协商方法. 发明专利, 专利号: ZL 201810407675.6.
(16) 基于无证书聚合签名的车联网认证与密钥协商方法. 发明专利, 专利号: ZL 201810676184.1.
(17) 一种实现细粒度属性撤销的属性基重加密方法. 发明专利, 专利号: ZL 201810684303.8.
(18) 基于自同步混沌密码的铁路应答器报文安全增强方法. 发明专利, 专利号: ZL 201810732792.X.
(19) 一种格上支持细粒度属性撤销的分布式属性基加密方法. 发明专利, 专利号:ZL 201810744183.6.
(20) IBC域内的用户访问PKI域内的资源的认证密钥协商方法. 发明专利, 专利号: ZL 201710081516.7.
(21) PKI域内的用户访问IBC域内的资源的认证密钥协商方法. 发明专利, 专利号:ZL 201710082835.X.
(22) 一种基于访问授权票据的跨异构域身份认证及会话密钥协商方法. 发明专利, 专利号: ZL 201410028603.2.
(23) 一种用于分布式网络系统的跨信任域认证方法. 发明专利, 专利号:ZL 201410185099.7.
[3] 书籍编著
(1) 《认证理论及应用》,清华大学出版社,ISBN: 9787302208273,2009年11月.
(2) 《铁路信息安全技术》,中国铁道出版社,ISBN: 9787113112523,2010年5月.