|
基本信息办公电话咨询QQ、微信:2544906,主持红果园省部级"企事业"咨询QQ、微信:2544906,参加北京交通大学咨询QQ、微信:2544906,主持北京交通大学咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,主持其它部市咨询QQ、微信:2544906,主持红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加教育部新世纪咨询QQ、微信:2544906,主持基本科研业务费咨询QQ、微信:2544906,主持红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,主持红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加北京交通大学咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加北京交大创新科技中心咨询QQ、微信:2544906,主持其它部市咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加北京交通大学咨询QQ、微信:2544906,参加其它部市咨询QQ、微信:2544906,主持红果园咨询QQ、微信:2544906,参加北京交通大学咨询QQ、微信:2544906,主持国家自然科学基金“面上”咨询QQ、微信:2544906,主持其它部市咨询QQ、微信:2544906,参加北京交通大学咨询QQ、微信:2544906,主持科技部“863”咨询QQ、微信:2544906,主持北京交大创新科技中心咨询QQ、微信:2544906,主持科技部“863”咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加北京市科委咨询QQ、微信:2544906,参加铁道部科技司咨询QQ、微信:2544906,参加其它部市咨询QQ、微信:2544906,参加科技部“973”咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加北京交大科技发展中心咨询QQ、微信:2544906,参加北京交通大学咨询QQ、微信:2544906,参加其它部市咨询QQ、微信:2544906,参加北京交通大学咨询QQ、微信:2544906,参加其它部市咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加其它部市咨询QQ、微信:2544906,参加北京交通大学咨询QQ、微信:2544906,主持北京交通大学咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加红果园咨询QQ、微信:2544906,参加科技部咨询QQ、微信:2544906,参加科技部咨询QQ、微信:2544906,参加科技部咨询QQ、微信:2544906,参加科技部咨询QQ、微信:2544906,参加教学工作离散数学
应用密码学与安全协议
学术成果期刊论文Yanfeng Shi, Jiqiang Liu, Zhen Han, Qingji Zheng, Rui Zhang, Shuo Qiu. Attribute-Based Proxy Re-encryption with Keyword Search, 2014, PLoS ONE 9(12): e116325, doi:10.1371/journal.pone.0116325.
Changlong Tang, Jiqiang Liu, Selecting a trusted cloud service provider for your SbbS program, Computer & Security, Volume 50, May 2015, Pages 60–73
Guang Yang, Jiqiang Liu, Lei Han, An ID-based node key management scheme based on PTPM in MANETs, Security And Communication Networks [J] , (2015)
Xuezhen Huang, Jiqiang Liu, Zhen Han, Privacy beyond sensitive values. Science China Information Sciences, 2015(Accepted)
Bin Wang, Xiaolin Chang, Jiqiang Liu: Modeling Heterogeneous Virtual Machines on IbbS Data Centers. IEEE Communication Letter 2015(In press), DOI:10.1109/LCOMM.2015.2403832.
Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu. Deterministic attribute based encryption. International Journal of High Performance Computing and Networking, accept, tentative publication date 2015.
Xiaolin Chang, Bin Wang, Jiqiang Liu, Jogesh K. Muppala, Modeling Active Virtual Machines on IbbS Clouds Using a M/G/m/m+K Queue, Accepted by IEEE Transactions on Services Computing
Yanfeng Shi, Jiqiang Liu, etc., Direct Credential Revocation and Verifiable Ciphertext Delegation for Key-Policy Attribute-Based Encryption, Accepted by Information Sciences
Bin Xing, Zhen Han, Xiaolin Chang and Jiqiang Liu, OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines, Concurrency And Computation: Practice And Experience, 2014
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Zhen Han. Multi-party identity-based symmetric privacy-preserving matching with cloud storage. Wuhan University Journal of Natural Sciences, Oct.2014, Vol 19, issue 5, pp 426-432
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 11, November 2014
Xuezhen Huang, Jiqiang Liu, Zhen Han, A New Anonymity Model For Privacy-Preserving Data Publishing, China Communications, Vol.11, No.9, PP: 54-66 , SEP 2014
原变青, 刘吉强, 基于NFC的离线可分享移动优惠券方案, 山东大学学报(理学版), Vol.49, No.9, PP:24-29, 2014.9
Xing Liu, Jiqiang Liu, A Two-layered Permission-based Android Malware Detection Scheme, IEEE Mobile Cloud 2014, 2014.4
Shuo Qiu, Jiqiang Liu, etc, Identity-Based Symmetric Private Set Intersection,SocialCom2013 , 2013.9
Xun Chen, Zhen Han, Jiqiang Liu, Data protection technology in classified networks, Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, v 42, n 1, p 144-148, January 2013
Wang, Wenbo; Chang, Xiaolin; Liu, Jiqiang; Wang, Bin, Simulated annealing based resource allocation for cloud data centers, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 81-82, 2013
Chang, Xiaolin; Wang, Bin; Liu, Jiqiang; Wang, Wenbo; Muppala, Jogesh K. , Green cloud virtual network provisioning based ant colony optimization, GECCO 2013 - Proceedings of the 2013 Genetic and Evolutionary Computation Conference Companion, p 1553-1560, 2013
Bin Wang, Xiaolin Chang, Jiqiang Liu, Jogesh K. Muppala: Reducing power consumption in embedding virtual infrastructures. GLOBECOM Workshops 2012: 714-718
Xiaolin Chang, Jogesh K. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun: Migration cost aware virtual network re-embedding in presence of resource failures. ICON 2012: 24-29
Xiaolin Chang, Bin Wang, Jiqiang Liu: Network state aware virtual network parallel embedding. IPCCC 2012: 193-194
Guo, Yu ; Liu, Jiqiang; Shen, Changxiang,Trusted dynamic self-confidence migration of cloud service, International Journal of Advancements in Computing Technology, v 4, n 7, p 92-101, 2012
韩磊, 刘吉强, 魏学业,侯杰. 基于便携式可信平台模块的Ad Hoc网络密钥管理应用研究 。北京工业大学学报,2012,38(11):1676-1682。
韩磊,刘吉强,韩臻,魏学业,移动ad hoc网络预分配非对称密钥管理方案 。通信学报,2012,33(10):26-34。
黄学臻,韩臻,刘吉强.数据分级匿名的访问控制模型。第二十二届全国信息保密学术会议(IS2012)论文集:174-177。
陈勋,韩臻,刘吉强.涉密网络中的数据保护技术.第九届中国信息与通信安全学术会议CCICS 2012。
Jie Hou, Lei Han, Jiqiang Liu, Jia Zhao, Secure and Efficient Protocol for Position-based Routing in VANETs, ICADE p 142-148, 2012. 7
Yanfeng Shi, Jiqiang Liu, Zhen Han, Rongrong Fu. A Generic construction of certificateless signcryption. ICISCE 2012.
韩磊, 刘吉强, 赵佳, 魏学业. 移动Ad Hoc网络分布式轻量级CA密钥管理方案 .四川大学学报(工程科学版),2011,43(6):133-139.
Bin Xing, Zhen Han, Jiqiang Liu, Xiaolin Chang, Trust Bootstrapping of Para-Virtualized Domain, Applied Mechanics and Materials, v 182-183, p 2059-2065, 2012
Xuezhen Huang, Jiqiang Liu, Zhen Han, A Security and Privacy Model for Electronic Health Records, Proceedings of 2011 IEEE International Conference on Information Theory and Information Security, 2011, PP416- 420.
Jiqiang Liu, Sheng Zhong, Lei Han and Haifan Yao, An Identity-Based Cryptosystem for Encrypting Long Messages, International Journal of Innovative Computing, Information and Control,Volume 7, Number 6, PP.3295-3302, 2011
Rui Zhang, Jiqiang Liu, Zhen Han, RBTBAC: Secure Access and Management of EHR Data,International Conference on Information Society, PP494-499. 2011.7
Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei: Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Frontiers of Computer Science in China 5(2): 169-180 (2011)
Ye Du, Jiqiang Liu, Ruhui Zhang, Jieyuan Li: A Dynamic Security Mechanism for Web Services Based on NDIS Intermediate Drivers. JCP 6(10): 2025-2028 (2011)
Jiqiang Liu, Xun Chen, Zhen Han, Full and Partial Deniability for Authentication Schemes, Frontiers of Computer Science in China Volume 4, Number 4, 516-521,2010
Zhao, J., Han, Z., Liu, J., Zhang, R. Remote attestation based on trusted cryptography module, Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University 34 (2), pp. 33-37,2010
Han L, Liu JQ, Han Z. Research on Key Management Schemes for Mobile Ad Hoc Networks. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010:225-229.
Wang ZH, Han Z, Liu JQ, Detect Technology about Smart Card, PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, July 2010:723-728
Fan Wu, Sheng Zhong, Jiqiang Liu, An Optimal, Strategy-proof Scheme for Multi-path Traffic Assignment in Non-cooperative Networks, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 3, 1012-1021, MARCH 2010
Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng: An IBE scheme using ECC combined public key. Computers & Electrical Engineering 36 (6): 1046-1054 (2010)
Xiaolin CHANG, Bin XING, Jiqiang Liu, “LWRM: A Lightweight Response Mechanism for TCG TOCTOU Attack”, In Proc. the 28th IEEE IPCCC, 2009.
Rui Zhang, Jiqiang Liu, Shuanghe Peng. A Trusted Bootstrap Scheme on EFI, 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), PP200-204, 2009. 11
Lei Han, Jiqiang Liu, Dawei Zhang, Zhen Han, and Xueye Wei, A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI,PP140-143, International Conference on Multimedia Information Networking and Security, PP140-143,2009 .11
Jiqiang Liu, Sheng Zhong, A Practical Time Bound Hierarchical Key Scheme,Vol.5, No.10, International Journal of Innovative Computing, Information and Control,PP3241-3248, 2009.10(ISSN 1349-4198)
Yao Qi, Liu Ji-Qiang, Han Zhen, Shen Chang-Xiang, Research on Linux network packet buffer recycling toward multi-core processor, Journal of Communications,Vol.30, No.9, PP102-108,2009.9
Du Ye, Liu Jiqiang, Li Jieyuan. Design and Implementation of a Defense Mechanism for SQL Injection Attack. Proceedings of ICACTE, Cairo, Egypt, 2009.9
Li, Meihong; Liu, Jiqiang; Hai, Lei. A USB Flash Disk-Based Model of Mobile TPM with Mass Storage, International Conference on Engineering Management and Service Sciences(EMS 2009), Beijing, China, 2009.9
韩磊,刘吉强,韩臻,魏学业,基于移动终端的VPN安全访问控制,第六届中国信息和通信安全学术会议,PP861-866, 2009
刘吉强,赵佳,赵勇, 可信计算中远程自动匿名证明的研究,计算机学报,Vol.32, No.7, PP 1304-1310,2009.7
Li MeiHong,Liu JiQiang,USB key-based approach for software protection,2009 International Conference on Industrial Mechatronics and Automation, ICIMA 2009,PP151-153, 2009. 5
Jiqiang Liu, Sheng Zhong, Analysis of Kim-Jeon-Yoo Password Authentication Schemes, Cryptologia,Volume 33 , Issue 2,Pages 183-187,2009.4
章睿,刘吉强,赵佳,一种基于ID的传感器网络密钥管理方案,电子与信息学报,Vol.31, No.4, PP 929-933,2009.7
赵佳,韩臻,刘吉强,沈昌祥,XTR体制下基于身份特征的数字签名算法,信号处理, 2009年3月, 25(3): 498-502.
Fan Wu; Jiqiang Liu, Sheng Zhong,An Efficient Protocol for Private and Accurate Mining of Support Counts,Pattern Recognition Letters, Volume 30, Issue 1, January 2009, 80–86
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Time-bound Dynamic Secret Sharing Scheme,Journal of Communications,Vol.29. Suppl., PP1-6, 2008.11
Zhao,J.;Liu,J.Q.;Han,Z.;Shen,C.X,Identity Based Digital Signature Algorithm Of Xtr System,ICSP08,2008.10
Jia Zhao, Zhen Han, Jiqiang Liu, etc., A Noninterference-based Trusted Chain Model, Journal of Computer Research and Development, 45(6):974~980,2008
Liu Weiwei,Han Zhen, Liu Jiqiang, Shen Changxiang, Trust extended object-oriented security model,IET 2nd International Conference on Wireless, Mobile and Multimedia Networks, ICWMMN 2008,PP486-489,2008.10
Jiqiang Liu, Jia Zhao, Zhen Han, A Remote Anonymous Attestation Protocol in Trusted Computing, The 4th International Workshop on Security in Systems and Networks (SSN2008), 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008),PP1-7,2008.4
Jiqiang Liu, Sheng Zhong, Weimin Tang, A Remote Authentication Scheme Based Smart Cards,ITESS08,Vol.1,PP1175-1177,2008.5
Xiaolin Chang, Jogesh K. Muppala, Zhen Han, Jiqiang Liu, Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts, IEEE ICC 2008
赵勇,刘吉强等,基于任务的访问控制模型研究,Vol.34, No.5, PP:28-30,计算机工程, 2008
Fan Wu, Sheng Zhong, and Jiqiang Liu, Cost-effective Traffic Assignment for Multipath Routing in Selfish Networks, IEEE GlobeCom, PP: 453-457,2007
获奖与荣誉教育部 新世纪优秀人才教育部 科技进步一等奖 (排名第9)北京交通大学 优秀主讲教师北京交通大学 五四青年奖章获得者北京交通大学 智瑾奖教金优秀青年教师社会兼职IEEE会员中国计算机学会会员中国密码学会会员中国密码学会教育工作委员会委员全国计算机应急处理协调中心计算机网络与信息安全专家委员会委员 |
|