網(wǎng)站介紹 關(guān)于我們 聯(lián)系方式 友情鏈接 廣告業(yè)務(wù) 幫助信息
1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號(hào)
基本信息
辦公電話:01051684198 電子郵件: jqliu@bjtu.edu.cn
通訊地址:北京市海淀區(qū)西直門(mén)外上園村3號(hào) 郵編:100044
教育背景與工作經(jīng)歷
1999年畢業(yè)于北京師范大學(xué)獲理學(xué)博士學(xué)位,同年進(jìn)入北方交通大學(xué)(現(xiàn)更名為北京交通大學(xué))計(jì)算機(jī)與信息技術(shù)學(xué)院工作,歷任講師,副教授,教授,現(xiàn)為計(jì)算機(jī)與信息技術(shù)學(xué)院副院長(zhǎng),信息安全研究室主任,信息安全專業(yè)負(fù)責(zé)人,2005.9-2006.9,2012.7-2013.1紐約州立大學(xué)布法羅分校計(jì)算機(jī)科學(xué)與工程系訪問(wèn)學(xué)者。
研究方向(順序不分先后)
網(wǎng)絡(luò)安全技術(shù)
計(jì)算機(jī)安全
計(jì)算機(jī)技術(shù)(專業(yè)學(xué)位)
招生專業(yè)
計(jì)算機(jī)與信息技術(shù)學(xué)院:信息安全碩士
計(jì)算機(jī)與信息技術(shù)學(xué)院:信息安全博士
計(jì)算機(jī)與信息技術(shù)學(xué)院:計(jì)算機(jī)科學(xué)與技術(shù)博士
計(jì)算機(jī)與信息技術(shù)學(xué)院:計(jì)算機(jī)科學(xué)與技術(shù)碩士
計(jì)算機(jī)與信息技術(shù)學(xué)院:計(jì)算機(jī)技術(shù)(專業(yè)學(xué)位)碩士
科研項(xiàng)目
廣東電網(wǎng),大數(shù)據(jù)環(huán)境下數(shù)據(jù)安全研究,2015.1-2016.1,39.5萬(wàn),主持
隱私保護(hù)技術(shù)管理和法律研究,2014.8-2015.12,12萬(wàn),主持
戰(zhàn)略合作框架協(xié)議及密鑰管理系統(tǒng)項(xiàng)目,2014-06-01--2015-5-31,30.0萬(wàn)元,主持
紅果園省部級(jí)"企事業(yè)":RSA-768數(shù)域篩法大數(shù)分解多項(xiàng)式選擇中的多項(xiàng)式根優(yōu)化研究與工程實(shí)現(xiàn),2013-12-01--2014-05-31,15.0萬(wàn)元,參加
北京交通大學(xué):上網(wǎng)行為管理系統(tǒng)軟件平臺(tái),2013-10-08--2015-10-07,20.0萬(wàn)元,主持
北京交通大學(xué):互聯(lián)網(wǎng)網(wǎng)站備案關(guān)鍵技術(shù)研究 ,2013-09-04--2014-10-31,20.0萬(wàn)元,參加
紅果園:基于云計(jì)算的涉密信息系統(tǒng)安全保密測(cè)評(píng)與檢查能力建設(shè),2013-01-01--2014-12-31,80.0萬(wàn)元,參加
紅果園:?jiǎn)蜗蚴芸囟ㄖ茢?shù)據(jù)安全交換技術(shù)研究與系統(tǒng)研制,2013-10-01--2015-10-01,30.0萬(wàn)元,主持
其它部市:移動(dòng)互聯(lián)網(wǎng)應(yīng)用審計(jì)平臺(tái),2013-09-06--2014-09-06,15.0萬(wàn)元,主持
紅果園:合作協(xié)議,2012-09-14--2013-09-14,49.8萬(wàn)元,參加
紅果園:公安部第一研究所重要信息系統(tǒng)安全咨詢服務(wù)支撐平臺(tái)定制開(kāi)發(fā),2012-06-30--2013-12-31,45.0萬(wàn)元,參加
教育部新世紀(jì):面向電子病歷共享系統(tǒng)的安全與隱私保護(hù)技術(shù)研究,2012-04-08--2013-12-30,50.0萬(wàn)元,主持
基本科研業(yè)務(wù)費(fèi):基于可信計(jì)算的涉密終端安全防護(hù)技術(shù)的研究,2012-07-01--2014-12-31,61.0萬(wàn)元,主持
紅果園:保密學(xué)院建設(shè),2011-11-25--2012-12-31,20.0萬(wàn)元,參加
紅果園:基于國(guó)產(chǎn)可信計(jì)算平臺(tái)的涉密終端應(yīng)用技術(shù)研究,2011-09-01--2012-09-30,46.0萬(wàn)元,主持
紅果園:中辦國(guó)辦計(jì)算機(jī)系統(tǒng)建設(shè)中的保密防護(hù)技術(shù)研究,2011-07-01--2011-12-31,28.0萬(wàn)元,參加
紅果園:電磁泄漏發(fā)射防護(hù)技術(shù)國(guó)外發(fā)展?fàn)顩r研究,2011-07-01--2011-12-31,26.9631萬(wàn)元,參加
紅果園:無(wú)線發(fā)射設(shè)備對(duì)“全國(guó)組織信息系統(tǒng)”的安全性研究,2011-07-01--2011-12-31,20.0369萬(wàn)元,參加
紅果園:網(wǎng)絡(luò)重要設(shè)備電磁泄漏發(fā)射防護(hù)研究,2011-07-01--2011-12-31,25.0萬(wàn)元,參加
北京交通大學(xué):網(wǎng)絡(luò)文件安全保護(hù)與監(jiān)控系統(tǒng),2011-04-20--2013-12-31,15.36萬(wàn)元,參加
紅果園:基于可信計(jì)算的電子文件密級(jí)標(biāo)志安全技術(shù)研究,2011-04-01--2011-09-30,12.0萬(wàn)元,參加
紅果園:艦載安全增強(qiáng)操作系統(tǒng)及安全管理系統(tǒng)研制,2010-10-01--2010-11-30,20.0萬(wàn)元,參加
北京交大創(chuàng)新科技中心:惠州市惠陽(yáng)區(qū)人民醫(yī)院醫(yī)院信息系統(tǒng)技術(shù)開(kāi)發(fā),2010-11-11--2011-06-30,125.0萬(wàn)元,主持
其它部市:北京信息安全服務(wù)能力評(píng)估,2010-09-30--2010-12-31,10.0萬(wàn)元,參加
紅果園:PCI密碼模塊及相關(guān)軟件技術(shù)服務(wù),2010-07-10--2012-02-29,18.0萬(wàn)元,參加
紅果園:基于Java Card體系結(jié)構(gòu)的智能卡,2010-07-10--2013-07-10,15.0萬(wàn)元,參加
紅果園:基于Java Key的安全開(kāi)發(fā)套件,2010-07-10--2013-07-10,15.0萬(wàn)元,參加
北京交通大學(xué):Web安全防護(hù)系統(tǒng),2010-06-22--2012-12-31,20.0萬(wàn)元,參加
其它部市:信息安全人才培養(yǎng)體系及其發(fā)展模式的研究,2010-05-01--2011-04-30,15.0萬(wàn)元,主持
紅果園:可信計(jì)算密碼平臺(tái),2009-09-01--2010-03-30,220.0萬(wàn)元,參加
北京交通大學(xué):網(wǎng)絡(luò)與信息安全模擬實(shí)訓(xùn)系統(tǒng),2009-08-31--2010-08-31,10.0萬(wàn)元,主持
國(guó)家自然科學(xué)基金“面上”:基于TCM的匿名證明和隱私保護(hù),2010-01-01--2012-12-31,31.0萬(wàn)元,主持
其它部市:關(guān)于信息系統(tǒng)安全保密必須從源頭上加以治理的措施研究,2008-05-01--2009-12-31,15.0萬(wàn)元,參加
北京交通大學(xué):應(yīng)用軟件特征識(shí)別---辦理免稅,2009-05-04--2010-05-04,65.0萬(wàn)元,主持
科技部“863”:虛擬個(gè)人計(jì)算機(jī)系統(tǒng)的可信支撐技術(shù)研究,2008-01-24--2009-09-30,46.0萬(wàn)元,主持
北京交大創(chuàng)新科技中心:信息安全試驗(yàn)平臺(tái)開(kāi)發(fā),2008-02-26--2009-10-31,10.0萬(wàn)元,主持
科技部“863”:可信計(jì)算平臺(tái)信任鏈建立關(guān)鍵技術(shù),2007-12-18--2009-12-31,88.0萬(wàn)元,參加
紅果園:網(wǎng)絡(luò)計(jì)算現(xiàn)狀研究,2007-11-20--2008-10-31,17.5萬(wàn)元,參加
北京市科委:終端安全體系結(jié)構(gòu)研究及關(guān)鍵技術(shù)研發(fā),2007-09-10--2009-09-10,40.0萬(wàn)元,參加
鐵道部科技司:鐵路信息系統(tǒng)應(yīng)用與技術(shù)研究-鐵路信息網(wǎng)絡(luò)災(zāi)備系統(tǒng)安全防護(hù)與災(zāi)備恢復(fù)技術(shù),2007-08-20--2008-03-31,30.0萬(wàn)元,參加
其它部市:可信計(jì)算技術(shù)和產(chǎn)業(yè)發(fā)展及相關(guān)對(duì)策研究,2007-05-01--2008-05-31,15.0萬(wàn)元,參加
科技部“973”:一體化網(wǎng)絡(luò)與普適服務(wù)的體系理論與結(jié)構(gòu)-3,2007-05-01--2012-08-31,20.0萬(wàn)元,參加
紅果園:zzbb-jsjxy-韓臻-專項(xiàng)任務(wù),2006-09-01--2008-06-30,25.0萬(wàn)元,參加
北京交大科技發(fā)展中心:計(jì)劃項(xiàng)目,2006-11-10--2007-11-10,20.0萬(wàn)元,參加
北京交通大學(xué):Socks VPN安全互聯(lián)系統(tǒng)Ⅱ,2006-07-01--2007-09-30,15.0萬(wàn)元,參加
其它部市:信息安全教育現(xiàn)狀分析和發(fā)展對(duì)策的研究,2005-12-01--2006-06-30,9.0萬(wàn)元,參加
北京交通大學(xué):安全管理知識(shí)庫(kù)Security Policy Pack,2005-06-01--2006-06-01,20.0萬(wàn)元,參加
其它部市:網(wǎng)絡(luò)信息加密技術(shù)-PKI關(guān)鍵技術(shù)研究,2004-01-01--2004-12-01,10.0萬(wàn)元,參加
紅果園:Kylin操作系統(tǒng)可信支撐模塊研制,2004-11-01--2005-11-01,100.0萬(wàn)元,參加
其它部市:國(guó)家信息安全保障戰(zhàn)略,2004-09-01--2005-06-01,10.0萬(wàn)元,參加
北京交通大學(xué):Socks VPN安全互聯(lián)系統(tǒng),2004-07-15--2005-04-15,31.0萬(wàn)元,主持
北京交通大學(xué):安全操作系統(tǒng),2004-01-02--2004-12-31,33.8萬(wàn)元,參加
紅果園:網(wǎng)絡(luò)信息加密技術(shù)PKI關(guān)鍵技術(shù)研究2,2003-01-12--2003-12-12,15.0萬(wàn)元,參加
紅果園:專項(xiàng)任務(wù),2003-01-01--2004-12-30,20.0萬(wàn)元,參加
科技部:信息域網(wǎng)絡(luò)安全體系結(jié)構(gòu)研究,2002-09-01--2005-09-01,168.9萬(wàn)元,參加
科技部:(863)計(jì)算機(jī)信息系統(tǒng)安全體系結(jié)構(gòu)研究,2002-10-12--2003-12-12,50.0萬(wàn)元,參加
科技部:(973)操作系統(tǒng)安全結(jié)構(gòu)研究,2002-04-06--2004-04-06,10.0萬(wàn)元,參加
科技部:(973)基于對(duì)稱密碼的應(yīng)用層安全體系結(jié)構(gòu)研究,2002-04-06--2004-04-06,10.0萬(wàn)元,參加
教學(xué)工作
離散數(shù)學(xué)
應(yīng)用密碼學(xué)與安全協(xié)議
學(xué)術(shù)成果
期刊論文
Yanfeng Shi, Jiqiang Liu, Zhen Han, Qingji Zheng, Rui Zhang, Shuo Qiu. Attribute-Based Proxy Re-encryption with Keyword Search, 2014, PLoS ONE 9(12): e116325, doi:10.1371/journal.pone.0116325.
Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SaaS program, Computer & Security, Volume 50, May 2015, Pages 60–73
Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks [J] , (2015)
Xuezhen Huang, Jiqiang Liu, Zhen Han, Privacy beyond sensitive values. Science China Information Sciences, 2015(Accepted)
Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Communication Letter 2015(In press), DOI:10.1109/LCOMM.2015.2403832.
Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.
Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IaaS Clouds Using a M/G/m/m+K Queue, Accepted by IEEE Transactions on Services Computing
Yanfeng Shi, Jiqiang Liu, etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Accepted by Information Sciences
Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu, OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, 2014
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han. Multi-party identity-based symmetric privacy-preserving matching with cloud storage. Wuhan University Journal of Natural Sciences, Oct.2014, Vol 19, issue 5, pp 426-432
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 11, November 2014
Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communications, Vol.11, No.9, PP: 54-66 , SEP 2014
原變青, 劉吉強(qiáng), 基于NFC的離線可分享移動(dòng)優(yōu)惠券方案, 山東大學(xué)學(xué)報(bào)(理學(xué)版), Vol.49, No.9, PP:24-29, 2014.9
Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE Mobile Cloud 2014, 2014.4
Shuo Qiu, Jiqiang Liu, etc, Identity-Based Symmetric Private Set Intersection,SocialCom2013 , 2013.9
Xun Chen, Zhen Han, Jiqiang Liu, Data protection technology in classified networks, Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, v 42, n 1, p 144-148, January 2013
Wang, Wenbo; Chang, Xiaolin; Liu, Jiqiang; Wang, Bin, Simulated annealing based resource allocation for cloud data centers, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 81-82, 2013
Chang, Xiaolin; Wang, Bin; Liu, Jiqiang; Wang, Wenbo; Muppala, Jogesh K. , Green cloud virtual network provisioning based ant colony optimization, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 1553-1560, 2013
Bin Wang, Xiaolin Chang, Jiqiang Liu, Jogesh K. Muppala: Reducing power consumption in embedding virtual infrastructures. GLOBECOM Workshops 2012: 714-718
Xiaolin Chang, Jogesh K. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun: Migration cost aware virtual network re-embedding in presence of resource failures. ICON 2012: 24-29
Xiaolin Chang, Bin Wang, Jiqiang Liu: Network state aware virtual network parallel embedding. IPCCC 2012: 193-194
Guo, Yu ; Liu, Jiqiang; Shen, Changxiang,Trusted dynamic self-confidence migration of cloud service, International Journal of Advancements in Computing Technology, v 4, n 7, p 92-101, 2012
韓磊, 劉吉強(qiáng), 魏學(xué)業(yè),侯杰. 基于便攜式可信平臺(tái)模塊的Ad Hoc網(wǎng)絡(luò)密鑰管理應(yīng)用研究 。北京工業(yè)大學(xué)學(xué)報(bào),2012,38(11):1676-1682。
韓磊,劉吉強(qiáng),韓臻,魏學(xué)業(yè),移動(dòng)ad hoc網(wǎng)絡(luò)預(yù)分配非對(duì)稱密鑰管理方案 。通信學(xué)報(bào),2012,33(10):26-34。
黃學(xué)臻,韓臻,劉吉強(qiáng).數(shù)據(jù)分級(jí)匿名的訪問(wèn)控制模型。第二十二屆全國(guó)信息保密學(xué)術(shù)會(huì)議(IS2012)論文集:174-177。
陳勛,韓臻,劉吉強(qiáng).涉密網(wǎng)絡(luò)中的數(shù)據(jù)保護(hù)技術(shù).第九屆中國(guó)信息與通信安全學(xué)術(shù)會(huì)議CCICS 2012。
Jie Hou, Lei Han, Jiqiang Liu, Jia Zhao, Secure and Efficient Protocol for Position-based Routing in VANETs, ICADE p 142-148, 2012. 7
Yanfeng Shi, Jiqiang Liu, Zhen Han, Rongrong Fu. A Generic construction of certificateless signcryption. ICISCE 2012.
韓磊, 劉吉強(qiáng), 趙佳, 魏學(xué)業(yè). 移動(dòng)Ad Hoc網(wǎng)絡(luò)分布式輕量級(jí)CA密鑰管理方案 .四川大學(xué)學(xué)報(bào)(工程科學(xué)版),2011,43(6):133-139.
Bin Xing, Zhen Han, Jiqiang Liu, Xiaolin Chang, Trust Bootstrapping of Para-Virtualized Domain, Applied Mechanics and Materials, v 182-183, p 2059-2065, 2012
Xuezhen Huang, Jiqiang Liu, Zhen Han, A Security and Privacy Model for Electronic Health Records, Proceedings of 2011 IEEE International Conference on Information Theory and Information Security, 2011, PP416- 420.
Jiqiang Liu, Sheng Zhong, Lei Han and Haifan Yao, An Identity-Based Cryptosystem for Encrypting Long Messages, International Journal of Innovative Computing, Information and Control,Volume 7, Number 6, PP.3295-3302, 2011
Rui Zhang, Jiqiang Liu, Zhen Han, RBTBAC: Secure Access and Management of EHR Data,International Conference on Information Society, PP494-499. 2011.7
Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei: Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Frontiers of Computer Science in China 5(2): 169-180 (2011)
Ye Du, Jiqiang Liu, Ruhui Zhang, Jieyuan Li: A Dynamic Security Mechanism for Web Services Based on NDIS Intermediate Drivers. JCP 6(10): 2021-2028 (2011)
Jiqiang Liu, Xun Chen, Zhen Han, Full and Partial Deniability for Authentication Schemes, Frontiers of Computer Science in China Volume 4, Number 4, 516-521,2010
Zhao, J., Han, Z., Liu, J., Zhang, R. Remote attestation based on trusted cryptography module, Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University 34 (2), pp. 33-37,2010
Han L, Liu JQ, Han Z. Research on Key Management Schemes for Mobile Ad Hoc Networks. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010:225-229.
Wang ZH, Han Z, Liu JQ, Detect Technology about Smart Card, PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, July 2010:723-728
Fan Wu, Sheng Zhong, Jiqiang Liu, An Optimal, Strategy-proof Scheme for Multi-path Traffic Assignment in Non-cooperative Networks, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 3, 1012-1021, MARCH 2010
Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng: An IBE scheme using ECC combined public key. Computers & Electrical Engineering 36 (6): 1046-1054 (2010)
Xiaolin CHANG, Bin XING, Jiqiang Liu, “LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack”, In Proc. the 28th IEEE IPCCC, 2009.
Rui Zhang, Jiqiang Liu, Shuanghe Peng. A Trusted Bootstrap Scheme on EFI, 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), PP200-204, 2009. 11
Lei Han, Jiqiang Liu, Dawei Zhang, Zhen Han, and Xueye Wei, A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI,PP140-143, International Conference on Multimedia Information Networking and Security, PP140-143,2009 .11
Jiqiang Liu, Sheng Zhong, A Practical Time Bound Hierarchical Key Scheme,Vol.5, No.10, International Journal of Innovative Computing, Information and Control,PP3241-3248, 2009.10(ISSN 1349-4198)
Yao Qi, Liu Ji-Qiang, Han Zhen, Shen Chang-Xiang, Research on Linux network packet buffer recycling toward multi-core processor, Journal of Communications,Vol.30, No.9, PP102-108,2009.9
Du Ye, Liu Jiqiang, Li Jieyuan. Design and Implementation of a Defense Mechanism for SQL Injection Attack. Proceedings of ICACTE, Cairo, Egypt, 2009.9
Li, Meihong; Liu, Jiqiang; Hai, Lei. A USB Flash Disk-Based Model of Mobile TPM with Mass Storage, International Conference on Engineering Management and Service Sciences(EMS 2009), Beijing, China, 2009.9
韓磊,劉吉強(qiáng),韓臻,魏學(xué)業(yè),基于移動(dòng)終端的VPN安全訪問(wèn)控制,第六屆中國(guó)信息和通信安全學(xué)術(shù)會(huì)議,PP861-866, 2009
劉吉強(qiáng),趙佳,趙勇, 可信計(jì)算中遠(yuǎn)程自動(dòng)匿名證明的研究,計(jì)算機(jī)學(xué)報(bào),Vol.32, No.7, PP 1304-1310,2009.7
Li MeiHong,Liu JiQiang,USB key-based approach for software protection,2009 International Conference on Industrial Mechatronics and Automation, ICIMA 2009,PP151-153, 2009. 5
Jiqiang Liu, Sheng Zhong, Analysis of Kim-Jeon-Yoo Password Authentication Schemes, Cryptologia,Volume 33 , Issue 2,Pages 183-187,2009.4
章睿,劉吉強(qiáng),趙佳,一種基于ID的傳感器網(wǎng)絡(luò)密鑰管理方案,電子與信息學(xué)報(bào),Vol.31, No.4, PP 929-933,2009.7
趙佳,韓臻,劉吉強(qiáng),沈昌祥,XTR體制下基于身份特征的數(shù)字簽名算法,信號(hào)處理, 2009年3月, 25(3): 498-502.
Fan Wu; Jiqiang Liu, Sheng Zhong,An Efficient Protocol for Private and Accurate Mining of Support Counts,Pattern Recognition Letters, Volume 30, Issue 1, January 2009, 80–86
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Time-bound Dynamic Secret Sharing Scheme,Journal of Communications,Vol.29. Suppl., PP1-6, 2008.11
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Identity Based Digital Signature Algorithm Of Xtr System,ICSP08,2008.10
Jia Zhao, Zhen Han, Jiqiang Liu, etc., A Noninterference-based Trusted Chain Model, Journal of Computer Research and Development, 45(6):974~980,2008
Liu Weiwei,Han Zhen, Liu Jiqiang, Shen Changxiang, Trust extended object-oriented security model,IET 2nd International Conference on Wireless, Mobile and Multimedia Networks, ICWMMN 2008,PP486-489,2008.10
Jiqiang Liu, Jia Zhao, Zhen Han, A Remote Anonymous Attestation Protocol in Trusted Computing, The 4th International Workshop on Security in Systems and Networks (SSN2008), 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008),PP1-7,2008.4
Jiqiang Liu, Sheng Zhong, Weimin Tang, A Remote Authentication Scheme Based Smart Cards,ITESS08,Vol.1,PP1175-1177,2008.5
Xiaolin Chang, Jogesh K. Muppala, Zhen Han, Jiqiang Liu, Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts, IEEE ICC 2008
趙勇,劉吉強(qiáng)等,基于任務(wù)的訪問(wèn)控制模型研究,Vol.34, No.5, PP:28-30,計(jì)算機(jī)工程, 2008
Fan Wu, Sheng Zhong, and Jiqiang Liu, Cost-effective Traffic Assignment for Multipath Routing in Selfish Networks, IEEE GlobeCom, PP: 453-457,2007
獲獎(jiǎng)與榮譽(yù)
教育部 新世紀(jì)優(yōu)秀人才
教育部 科技進(jìn)步一等獎(jiǎng) (排名第9)
北京交通大學(xué) 優(yōu)秀主講教師
北京交通大學(xué) 五四青年獎(jiǎng)?wù)芦@得者
北京交通大學(xué) 智瑾獎(jiǎng)教金優(yōu)秀青年教師
社會(huì)兼職
IEEE會(huì)員
中國(guó)計(jì)算機(jī)學(xué)會(huì)會(huì)員
中國(guó)密碼學(xué)會(huì)會(huì)員
中國(guó)密碼學(xué)會(huì)教育工作委員會(huì)委員
全國(guó)計(jì)算機(jī)應(yīng)急處理協(xié)調(diào)中心計(jì)算機(jī)網(wǎng)絡(luò)與信息安全專家委員會(huì)委員
來(lái)源未注明“中國(guó)考研網(wǎng)”的資訊、文章等均為轉(zhuǎn)載,本網(wǎng)站轉(zhuǎn)載出于傳遞更多信息之目的,并不意味著贊同其觀點(diǎn)或證實(shí)其內(nèi)容的真實(shí)性,如涉及版權(quán)問(wèn)題,請(qǐng)聯(lián)系本站管理員予以更改或刪除。如其他媒體、網(wǎng)站或個(gè)人從本網(wǎng)站下載使用,必須保留本網(wǎng)站注明的"稿件來(lái)源",并自負(fù)版權(quán)等法律責(zé)任。
來(lái)源注明“中國(guó)考研網(wǎng)”的文章,若需轉(zhuǎn)載請(qǐng)聯(lián)系管理員獲得相應(yīng)許可。
聯(lián)系方式:chinakaoyankefu@163.com
掃碼關(guān)注
了解考研最新消息
網(wǎng)站介紹 關(guān)于我們 聯(lián)系方式 友情鏈接 廣告業(yè)務(wù) 幫助信息
1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號(hào)