魏红宇,曲海鹏,刘培顺,徐峦,盛兆勇.海洋环境云计算安全防护支撑体系的研究与构建.
中国海洋大学学报,第41卷增刊,2011年5月,429-432.
Feng Liu, Chuan-Kun Wu and Xi-Jun Lin, Some Extensions on Threshold
Visual Cryptography Schemes, The Computer Journal, 53 (1). pp:107-119, 2010.(SCI)
Feng Liu, Chuan-Kun Wu and Xi-Jun Lin, A new definition of the contrast
of visual cryptography scheme, Inf. Process. Lett, 110(7). pp:241-246, 2010.(SCI)
Feng Liu, Chuan-Kun Wu and Xi-Jun Lin, Step construction of visual
cryptography schemes, IEEE Trans. on Information Forensics and Security,5(1), pp:27-38,
2010.(SCI)
李正宝,郭忠文,曲海鹏,洪锋,洪璐.E2DTS:水下传感器网络能量高效的分布式时间同步算法.通信学报, 31(9A), 2010,22-29.
林喜军,孙琳,武传坤,基于双线性映射的多对一加密认证方案,计算机研究与发展,2,pp:235-238,2009.(EI)
Zhengbo Li, Zhongwen Guo, Haipeng Qu, Feng Hong, Pengpeng Chen, Meng
Yang. UD-TDMA: A Distributed TDMA Protocol for Underwater Acoustic Sensor Network.
Proceedings of Mass 2009, 918-923.
Zhang Wei, Pang Renbo, Pang Yanwei, Qu Haipeng. Self adaptive mail
filtering POP3 proxy based on users' feedback, Journal of Tianjin University, 2009
Xi-Jun Lin,Chuan-Kun Wu and Feng Liu,Many-to-one Encryption and
Authentication Scheme and Its Application,Journal of Commun.and
Networks,10(1),pp:18-21,2008.(SCI)
Xi-Jun Lin,Chuan-Kun Wu and Feng Liu,Analysis of An Authenticated
Identity-Based Multicast Scheme,IET Communication,2(7),pp:935-937,2008. (SCI)
冯庆云,曲海鹏,周英,郭忠文. 基于数据包标记的伪造IP DDoS攻击防御. 计算机工程,2008,34(19).
周英,曲海鹏,冯庆云,郭忠文. 信息安全风险评估中权重优化方法研究. 信息安全与通信保密,2008.2.
陈恺,冯登国,曲海鹏,张颖君. 高速以太网即时监控可定制内存访问模型. Proceedings of NetSec 2007.
曲海鹏,冯登国,苏璞睿. 基于有序标记的IP包追踪方案.电子学报,2006,1.
Haipeng Qu, Purui Su, Dengguo Feng. 基于TTL 信道的IP包标记追踪方案,proceedings of
CNCC 2005.
曲海鹏,李德全,苏璞睿,冯登国. 一种分块标记的IP包追踪方案,计算机研究与发展,2005,12.