網(wǎng)站介紹 關(guān)于我們 聯(lián)系方式 友情鏈接 廣告業(yè)務(wù) 幫助信息
1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號
基本信息
辦公電話:01051684198 電子郵件: jqliu@bjtu.edu.cn
通訊地址:北京市海淀區(qū)西直門外上園村3號 郵編:100044
教育背景與工作經(jīng)歷
1999年畢業(yè)于北京師范大學(xué)獲理學(xué)博士學(xué)位,同年進(jìn)入北方交通大學(xué)(現(xiàn)更名為北京交通大學(xué))計算機與信息技術(shù)學(xué)院工作,歷任講師,副教授,教授,現(xiàn)為計算機與信息技術(shù)學(xué)院副院長,信息安全研究室主任,信息安全專業(yè)負(fù)責(zé)人,2005.9-2006.9,2012.7-2013.1紐約州立大學(xué)布法羅分校計算機科學(xué)與工程系訪問學(xué)者。
研究方向(順序不分先后)
網(wǎng)絡(luò)安全技術(shù)
計算機安全
計算機技術(shù)(專業(yè)學(xué)位)
招生專業(yè)
計算機與信息技術(shù)學(xué)院:信息安全碩士
計算機與信息技術(shù)學(xué)院:信息安全博士
計算機與信息技術(shù)學(xué)院:計算機科學(xué)與技術(shù)博士
計算機與信息技術(shù)學(xué)院:計算機科學(xué)與技術(shù)碩士
計算機與信息技術(shù)學(xué)院:計算機技術(shù)(專業(yè)學(xué)位)碩士
科研項目
廣東電網(wǎng),大數(shù)據(jù)環(huán)境下數(shù)據(jù)安全研究,2015.1-2016.1,39.5萬,主持
隱私保護技術(shù)管理和法律研究,2014.8-2015.12,12萬,主持
戰(zhàn)略合作框架協(xié)議及密鑰管理系統(tǒng)項目,2014-06-01--2015-5-31,30.0萬元,主持
紅果園省部級"企事業(yè)":RSA-768數(shù)域篩法大數(shù)分解多項式選擇中的多項式根優(yōu)化研究與工程實現(xiàn),2013-12-01--2014-05-31,15.0萬元,參加
北京交通大學(xué):上網(wǎng)行為管理系統(tǒng)軟件平臺,2013-10-08--2015-10-07,20.0萬元,主持
北京交通大學(xué):互聯(lián)網(wǎng)網(wǎng)站備案關(guān)鍵技術(shù)研究 ,2013-09-04--2014-10-31,20.0萬元,參加
紅果園:基于云計算的涉密信息系統(tǒng)安全保密測評與檢查能力建設(shè),2013-01-01--2014-12-31,80.0萬元,參加
紅果園:單向受控定制數(shù)據(jù)安全交換技術(shù)研究與系統(tǒng)研制,2013-10-01--2015-10-01,30.0萬元,主持
其它部市:移動互聯(lián)網(wǎng)應(yīng)用審計平臺,2013-09-06--2014-09-06,15.0萬元,主持
紅果園:合作協(xié)議,2012-09-14--2013-09-14,49.8萬元,參加
紅果園:公安部第一研究所重要信息系統(tǒng)安全咨詢服務(wù)支撐平臺定制開發(fā),2012-06-30--2013-12-31,45.0萬元,參加
教育部新世紀(jì):面向電子病歷共享系統(tǒng)的安全與隱私保護技術(shù)研究,2012-04-08--2013-12-30,50.0萬元,主持
基本科研業(yè)務(wù)費:基于可信計算的涉密終端安全防護技術(shù)的研究,2012-07-01--2014-12-31,61.0萬元,主持
紅果園:保密學(xué)院建設(shè),2011-11-25--2012-12-31,20.0萬元,參加
紅果園:基于國產(chǎn)可信計算平臺的涉密終端應(yīng)用技術(shù)研究,2011-09-01--2012-09-30,46.0萬元,主持
紅果園:中辦國辦計算機系統(tǒng)建設(shè)中的保密防護技術(shù)研究,2011-07-01--2011-12-31,28.0萬元,參加
紅果園:電磁泄漏發(fā)射防護技術(shù)國外發(fā)展?fàn)顩r研究,2011-07-01--2011-12-31,26.9631萬元,參加
紅果園:無線發(fā)射設(shè)備對“全國組織信息系統(tǒng)”的安全性研究,2011-07-01--2011-12-31,20.0369萬元,參加
紅果園:網(wǎng)絡(luò)重要設(shè)備電磁泄漏發(fā)射防護研究,2011-07-01--2011-12-31,25.0萬元,參加
北京交通大學(xué):網(wǎng)絡(luò)文件安全保護與監(jiān)控系統(tǒng),2011-04-20--2013-12-31,15.36萬元,參加
紅果園:基于可信計算的電子文件密級標(biāo)志安全技術(shù)研究,2011-04-01--2011-09-30,12.0萬元,參加
紅果園:艦載安全增強操作系統(tǒng)及安全管理系統(tǒng)研制,2010-10-01--2010-11-30,20.0萬元,參加
北京交大創(chuàng)新科技中心:惠州市惠陽區(qū)人民醫(yī)院醫(yī)院信息系統(tǒng)技術(shù)開發(fā),2010-11-11--2011-06-30,125.0萬元,主持
其它部市:北京信息安全服務(wù)能力評估,2010-09-30--2010-12-31,10.0萬元,參加
紅果園:PCI密碼模塊及相關(guān)軟件技術(shù)服務(wù),2010-07-10--2012-02-29,18.0萬元,參加
紅果園:基于Java Card體系結(jié)構(gòu)的智能卡,2010-07-10--2013-07-10,15.0萬元,參加
紅果園:基于Java Key的安全開發(fā)套件,2010-07-10--2013-07-10,15.0萬元,參加
北京交通大學(xué):Web安全防護系統(tǒng),2010-06-22--2012-12-31,20.0萬元,參加
其它部市:信息安全人才培養(yǎng)體系及其發(fā)展模式的研究,2010-05-01--2011-04-30,15.0萬元,主持
紅果園:可信計算密碼平臺,2009-09-01--2010-03-30,220.0萬元,參加
北京交通大學(xué):網(wǎng)絡(luò)與信息安全模擬實訓(xùn)系統(tǒng),2009-08-31--2010-08-31,10.0萬元,主持
國家自然科學(xué)基金“面上”:基于TCM的匿名證明和隱私保護,2010-01-01--2012-12-31,31.0萬元,主持
其它部市:關(guān)于信息系統(tǒng)安全保密必須從源頭上加以治理的措施研究,2008-05-01--2009-12-31,15.0萬元,參加
北京交通大學(xué):應(yīng)用軟件特征識別---辦理免稅,2009-05-04--2010-05-04,65.0萬元,主持
科技部“863”:虛擬個人計算機系統(tǒng)的可信支撐技術(shù)研究,2008-01-24--2009-09-30,46.0萬元,主持
北京交大創(chuàng)新科技中心:信息安全試驗平臺開發(fā),2008-02-26--2009-10-31,10.0萬元,主持
科技部“863”:可信計算平臺信任鏈建立關(guān)鍵技術(shù),2007-12-18--2009-12-31,88.0萬元,參加
紅果園:網(wǎng)絡(luò)計算現(xiàn)狀研究,2007-11-20--2008-10-31,17.5萬元,參加
北京市科委:終端安全體系結(jié)構(gòu)研究及關(guān)鍵技術(shù)研發(fā),2007-09-10--2009-09-10,40.0萬元,參加
鐵道部科技司:鐵路信息系統(tǒng)應(yīng)用與技術(shù)研究-鐵路信息網(wǎng)絡(luò)災(zāi)備系統(tǒng)安全防護與災(zāi)備恢復(fù)技術(shù),2007-08-20--2008-03-31,30.0萬元,參加
其它部市:可信計算技術(shù)和產(chǎn)業(yè)發(fā)展及相關(guān)對策研究,2007-05-01--2008-05-31,15.0萬元,參加
科技部“973”:一體化網(wǎng)絡(luò)與普適服務(wù)的體系理論與結(jié)構(gòu)-3,2007-05-01--2012-08-31,20.0萬元,參加
紅果園:zzbb-jsjxy-韓臻-專項任務(wù),2006-09-01--2008-06-30,25.0萬元,參加
北京交大科技發(fā)展中心:計劃項目,2006-11-10--2007-11-10,20.0萬元,參加
北京交通大學(xué):Socks VPN安全互聯(lián)系統(tǒng)Ⅱ,2006-07-01--2007-09-30,15.0萬元,參加
其它部市:信息安全教育現(xiàn)狀分析和發(fā)展對策的研究,2005-12-01--2006-06-30,9.0萬元,參加
北京交通大學(xué):安全管理知識庫Security Policy Pack,2005-06-01--2006-06-01,20.0萬元,參加
其它部市:網(wǎng)絡(luò)信息加密技術(shù)-PKI關(guān)鍵技術(shù)研究,2004-01-01--2004-12-01,10.0萬元,參加
紅果園:Kylin操作系統(tǒng)可信支撐模塊研制,2004-11-01--2005-11-01,100.0萬元,參加
其它部市:國家信息安全保障戰(zhàn)略,2004-09-01--2005-06-01,10.0萬元,參加
北京交通大學(xué):Socks VPN安全互聯(lián)系統(tǒng),2004-07-15--2005-04-15,31.0萬元,主持
北京交通大學(xué):安全操作系統(tǒng),2004-01-02--2004-12-31,33.8萬元,參加
紅果園:網(wǎng)絡(luò)信息加密技術(shù)PKI關(guān)鍵技術(shù)研究2,2003-01-12--2003-12-12,15.0萬元,參加
紅果園:專項任務(wù),2003-01-01--2004-12-30,20.0萬元,參加
科技部:信息域網(wǎng)絡(luò)安全體系結(jié)構(gòu)研究,2002-09-01--2005-09-01,168.9萬元,參加
科技部:(863)計算機信息系統(tǒng)安全體系結(jié)構(gòu)研究,2002-10-12--2003-12-12,50.0萬元,參加
科技部:(973)操作系統(tǒng)安全結(jié)構(gòu)研究,2002-04-06--2004-04-06,10.0萬元,參加
科技部:(973)基于對稱密碼的應(yīng)用層安全體系結(jié)構(gòu)研究,2002-04-06--2004-04-06,10.0萬元,參加
教學(xué)工作
離散數(shù)學(xué)
應(yīng)用密碼學(xué)與安全協(xié)議
學(xué)術(shù)成果
期刊論文Yanfeng Shi, Jiqiang Liu, Zhen Han, Qingji Zheng, Rui Zhang, Shuo Qiu. Attribute-Based Proxy Re-encryption with Keyword Search, 2014, PLoS ONE 9(12): e116325, doi:10.1371/journal.pone.0116325.
Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SaaS program, Computer & Security, Volume 50, May 2015, Pages 60–73
Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks [J] , (2015)
Xuezhen Huang, Jiqiang Liu, Zhen Han, Privacy beyond sensitive values. Science China Information Sciences, 2015(Accepted)
Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communication Letter 2015(In press), DOI:10.1109/LCOMM.2015.2403832.
Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.
Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IaaS Clouds Using a M/G/m/m+K Queue, Accepted by IEEE Transactions on Services Computing
Yanfeng Shi, Jiqiang Liu, etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Accepted by Information Sciences
Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu, OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, 2014
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han. Multi-party identity-based symmetric privacy-preserving matching with cloud storage. Wuhan University Journal of Natural Sciences, Oct.2014, Vol 19, issue 5, pp 426-432
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 11, November 2014
Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communications, Vol.11, No.9, PP: 54-66 , SEP 2014
原變青, 劉吉強, 基于NFC的離線可分享移動優(yōu)惠券方案, 山東大學(xué)學(xué)報(理學(xué)版), Vol.49, No.9, PP:24-29, 2014.9
Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE Mobile Cloud 2014, 2014.4
Shuo Qiu, Jiqiang Liu, etc, Identity-Based Symmetric Private Set Intersection,SocialCom2013 , 2013.9
Xun Chen, Zhen Han, Jiqiang Liu, Data protection technology in classified networks, Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, v 42, n 1, p 144-148, January 2013
Wang, Wenbo; Chang, Xiaolin; Liu, Jiqiang; Wang, Bin, Simulated annealing based resource allocation for cloud data centers, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 81-82, 2013
Chang, Xiaolin; Wang, Bin; Liu, Jiqiang; Wang, Wenbo; Muppala, Jogesh K. , Green cloud virtual network provisioning based ant colony optimization, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 1553-1560, 2013
Bin Wang, Xiaolin Chang, Jiqiang Liu, Jogesh K. Muppala: Reducing power consumption in embedding virtual infrastructures. GLOBECOM Workshops 2012: 714-718
Xiaolin Chang, Jogesh K. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun: Migration cost aware virtual network re-embedding in presence of resource failures. ICON 2012: 24-29
Xiaolin Chang, Bin Wang, Jiqiang Liu: Network state aware virtual network parallel embedding. IPCCC 2012: 193-194
Guo, Yu ; Liu, Jiqiang; Shen, Changxiang,Trusted dynamic self-confidence migration of cloud service, International Journal of Advancements in Computing Technology, v 4, n 7, p 92-101, 2012
韓磊, 劉吉強, 魏學(xué)業(yè),侯杰. 基于便攜式可信平臺模塊的Ad Hoc網(wǎng)絡(luò)密鑰管理應(yīng)用研究 。北京工業(yè)大學(xué)學(xué)報,2012,38(11):1676-1682。
韓磊,劉吉強,韓臻,魏學(xué)業(yè),移動ad hoc網(wǎng)絡(luò)預(yù)分配非對稱密鑰管理方案 。通信學(xué)報,2012,33(10):26-34。
黃學(xué)臻,韓臻,劉吉強.數(shù)據(jù)分級匿名的訪問控制模型。第二十二屆全國信息保密學(xué)術(shù)會議(IS2012)論文集:174-177。
陳勛,韓臻,劉吉強.涉密網(wǎng)絡(luò)中的數(shù)據(jù)保護技術(shù).第九屆中國信息與通信安全學(xué)術(shù)會議CCICS 2012。
Jie Hou, Lei Han, Jiqiang Liu, Jia Zhao, Secure and Efficient Protocol for Position-based Routing in VANETs, ICADE p 142-148, 2012. 7
Yanfeng Shi, Jiqiang Liu, Zhen Han, Rongrong Fu. A Generic construction of certificateless signcryption. ICISCE 2012.
韓磊, 劉吉強, 趙佳, 魏學(xué)業(yè). 移動Ad Hoc網(wǎng)絡(luò)分布式輕量級CA密鑰管理方案 .四川大學(xué)學(xué)報(工程科學(xué)版),2011,43(6):133-139.
Bin Xing, Zhen Han, Jiqiang Liu, Xiaolin Chang, Trust Bootstrapping of Para-Virtualized Domain, Applied Mechanics and Materials, v 182-183, p 2059-2065, 2012
Xuezhen Huang, Jiqiang Liu, Zhen Han, A Security and Privacy Model for Electronic Health Records, Proceedings of 2011 IEEE International Conference on Information Theory and Information Security, 2011, PP416- 420.
Jiqiang Liu, Sheng Zhong, Lei Han and Haifan Yao, An Identity-Based Cryptosystem for Encrypting Long Messages, International Journal of Innovative Computing, Information and Control,Volume 7, Number 6, PP.3295-3302, 2011
Rui Zhang, Jiqiang Liu, Zhen Han, RBTBAC: Secure Access and Management of EHR Data,International Conference on Information Society, PP494-499. 2011.7
Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei: Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Frontiers of Computer Science in China 5(2): 169-180 (2011)
Ye Du, Jiqiang Liu, Ruhui Zhang, Jieyuan Li: A Dynamic Security Mechanism for Web Services Based on NDIS Intermediate Drivers. JCP 6(10): 2021-2028 (2011)
Jiqiang Liu, Xun Chen, Zhen Han, Full and Partial Deniability for Authentication Schemes, Frontiers of Computer Science in China Volume 4, Number 4, 516-521,2010
Zhao, J., Han, Z., Liu, J., Zhang, R. Remote attestation based on trusted cryptography module, Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University 34 (2), pp. 33-37,2010
Han L, Liu JQ, Han Z. Research on Key Management Schemes for Mobile Ad Hoc Networks. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010:225-229.
Wang ZH, Han Z, Liu JQ, Detect Technology about Smart Card, PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, July 2010:723-728
Fan Wu, Sheng Zhong, Jiqiang Liu, An Optimal, Strategy-proof Scheme for Multi-path Traffic Assignment in Non-cooperative Networks, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 3, 1012-1021, MARCH 2010
Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng: An IBE scheme using ECC combined public key. Computers & Electrical Engineering 36 (6): 1046-1054 (2010)
Xiaolin CHANG, Bin XING, Jiqiang Liu, “LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack”, In Proc. the 28th IEEE IPCCC, 2009.
Rui Zhang, Jiqiang Liu, Shuanghe Peng. A Trusted Bootstrap Scheme on EFI, 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), PP200-204, 2009. 11
Lei Han, Jiqiang Liu, Dawei Zhang, Zhen Han, and Xueye Wei, A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI,PP140-143, International Conference on Multimedia Information Networking and Security, PP140-143,2009 .11
Jiqiang Liu, Sheng Zhong, A Practical Time Bound Hierarchical Key Scheme,Vol.5, No.10, International Journal of Innovative Computing, Information and Control,PP3241-3248, 2009.10(ISSN 1349-4198)
Yao Qi, Liu Ji-Qiang, Han Zhen, Shen Chang-Xiang, Research on Linux network packet buffer recycling toward multi-core processor, Journal of Communications,Vol.30, No.9, PP102-108,2009.9
Du Ye, Liu Jiqiang, Li Jieyuan. Design and Implementation of a Defense Mechanism for SQL Injection Attack. Proceedings of ICACTE, Cairo, Egypt, 2009.9
Li, Meihong; Liu, Jiqiang; Hai, Lei. A USB Flash Disk-Based Model of Mobile TPM with Mass Storage, International Conference on Engineering Management and Service Sciences(EMS 2009), Beijing, China, 2009.9
韓磊,劉吉強,韓臻,魏學(xué)業(yè),基于移動終端的VPN安全訪問控制,第六屆中國信息和通信安全學(xué)術(shù)會議,PP861-866, 2009
劉吉強,趙佳,趙勇, 可信計算中遠(yuǎn)程自動匿名證明的研究,計算機學(xué)報,Vol.32, No.7, PP 1304-1310,2009.7
Li MeiHong,Liu JiQiang,USB key-based approach for software protection,2009 International Conference on Industrial Mechatronics and Automation, ICIMA 2009,PP151-153, 2009. 5
Jiqiang Liu, Sheng Zhong, Analysis of Kim-Jeon-Yoo Password Authentication Schemes, Cryptologia,Volume 33 , Issue 2,Pages 183-187,2009.4
章睿,劉吉強,趙佳,一種基于ID的傳感器網(wǎng)絡(luò)密鑰管理方案,電子與信息學(xué)報,Vol.31, No.4, PP 929-933,2009.7
趙佳,韓臻,劉吉強,沈昌祥,XTR體制下基于身份特征的數(shù)字簽名算法,信號處理, 2009年3月, 25(3): 498-502.
Fan Wu; Jiqiang Liu, Sheng Zhong,An Efficient Protocol for Private and Accurate Mining of Support Counts,Pattern Recognition Letters, Volume 30, Issue 1, January 2009, 80–86
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Time-bound Dynamic Secret Sharing Scheme,Journal of Communications,Vol.29. Suppl., PP1-6, 2008.11
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Identity Based Digital Signature Algorithm Of Xtr System,ICSP08,2008.10
Jia Zhao, Zhen Han, Jiqiang Liu, etc., A Noninterference-based Trusted Chain Model, Journal of Computer Research and Development, 45(6):974~980,2008
Liu Weiwei,Han Zhen, Liu Jiqiang, Shen Changxiang, Trust extended object-oriented security model,IET 2nd International Conference on Wireless, Mobile and Multimedia Networks, ICWMMN 2008,PP486-489,2008.10
Jiqiang Liu, Jia Zhao, Zhen Han, A Remote Anonymous Attestation Protocol in Trusted Computing, The 4th International Workshop on Security in Systems and Networks (SSN2008), 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008),PP1-7,2008.4
Jiqiang Liu, Sheng Zhong, Weimin Tang, A Remote Authentication Scheme Based Smart Cards,ITESS08,Vol.1,PP1175-1177,2008.5
Xiaolin Chang, Jogesh K. Muppala, Zhen Han, Jiqiang Liu, Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts, IEEE ICC 2008
趙勇,劉吉強等,基于任務(wù)的訪問控制模型研究,Vol.34, No.5, PP:28-30,計算機工程, 2008
Fan Wu, Sheng Zhong, and Jiqiang Liu, Cost-effective Traffic Assignment for Multipath Routing in Selfish Networks, IEEE GlobeCom, PP: 453-457,2007
獲獎與榮譽
教育部 新世紀(jì)優(yōu)秀人才
教育部 科技進(jìn)步一等獎 (排名第9)
北京交通大學(xué) 優(yōu)秀主講教師
北京交通大學(xué) 五四青年獎?wù)芦@得者
北京交通大學(xué) 智瑾獎教金優(yōu)秀青年教師
社會兼職
IEEE會員
中國計算機學(xué)會會員
中國密碼學(xué)會會員
中國密碼學(xué)會教育工作委員會委員
全國計算機應(yīng)急處理協(xié)調(diào)中心計算機網(wǎng)絡(luò)與信息安全專家委員會委員
來源未注明“中國考研網(wǎng)”的資訊、文章等均為轉(zhuǎn)載,本網(wǎng)站轉(zhuǎn)載出于傳遞更多信息之目的,并不意味著贊同其觀點或證實其內(nèi)容的真實性,如涉及版權(quán)問題,請聯(lián)系本站管理員予以更改或刪除。如其他媒體、網(wǎng)站或個人從本網(wǎng)站下載使用,必須保留本網(wǎng)站注明的"稿件來源",并自負(fù)版權(quán)等法律責(zé)任。
來源注明“中國考研網(wǎng)”的文章,若需轉(zhuǎn)載請聯(lián)系管理員獲得相應(yīng)許可。
聯(lián)系方式:chinakaoyankefu@163.com
掃碼關(guān)注
了解考研最新消息
網(wǎng)站介紹 關(guān)于我們 聯(lián)系方式 友情鏈接 廣告業(yè)務(wù) 幫助信息
1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號