删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

北京科技大学计算机与通信工程学院硕士研究生导师简介-朱岩

北京科技大学 免费考研网/2013-09-08


朱岩
教授
软件工程系


办公地点:机电信息楼1204A室
电子邮件:zhuyan@ustb.edu.cn
科研方向:网络与信息安全
密码学与安全计算
计算复杂性理论
简历
朱岩,男,1974年生,现为北京科技大学计算机与通信工程学院教授,曾于2005-2012年就职于北京大学计算机科学技术研究所,副研究员,硕士生导师,于2008-2009年在美国亚利桑那州立大学(ArizonaStateUniversity)以访问副教授身份从事信息安全方面科研工作,于2012年在美国密西根大学(UniversityofMichigan)以客座研究员身份从事访学活动。
代表性论文论著
目前已在国内外会议与期刊上以第一作者(通信作者)发表SCI/EI检索论文40多篇,已申请和授权专利8项,发表包括TPDS、TDSC、TSC、JSS、IJCIS、China-ScienceF、JCST、计算机学报、软件学报、电子学报等期刊,以及InfoCom、GlobeCom、ICDCS、CCS、CodaSpy、AsiaCCS、ACMSAC,IWDW、CollaborateCom、Wisec、Passat等,并在TPDS、TDSC、TCS、TKDE、JONS、JSS、JCST等国际杂志担当评审专家。主要代表性论文如下:
[1]YanZhu,Gail-JoonAhn,HongxinHu,StephenS.Yau,HoG.An,ChangjunHu.DynamicAuditServicesforOutsourcedStoragesinClouds.IEEETransactionsonServicesComputing(TSC).2013,Preprint.SCI
[2]DiMa,NiteshSaxena,TuoXiang,YanZhu.Location-AwareandSaferCards:EnhancingRFIDSecurityandPrivacyviaLocationSensing,IEEETransactionsonDependableandSecureComputing(TDSC).Accepted,2013.SCI
[3]YanZhu,ShanbiaoWang,HongxinHu,Gail-JoonAhn.SecureCollaborativeIntegrityVerificationForHybridCloudEnvironments.InternationalJournalofCooperativeInformationSystems(IJCIS).21,165(2012),2012,pp.165-198.SCI
[4]YanZhu,HongxinHu,Gail-JoonAhn,MengyangYu,ShiminChen.CooperativeProvableDataPossessionforIntegrityVerificationinMulti-CloudStorage.TransactionsonParallelandDistributedSystems(TPDS).23(12),2012,pp.2231-2244.SCI
[5]ZhuYan,YuMengyang,HuHongXin.EfficientConstructionofProvablySecureSteganographyunderOrdinaryCovertChannels.ScienceChina:InformationSciences(SeriesF).2012,2012Vol.55(7):1639-1649.SCI
[6]YanZhu,HongxinHu,Gail-JoonAhn,StephenS.Yau,YuChen.EfficientAuditServiceOutsourcingforDataIntegrityinClouds,JournalofSystemsandSoftware(JSS).2011.85(2012),pp.1083-1095.SCI
[7]YanZhu,HongxinHu,Gail-JoonAhn,Huai-XiWang,Shan-BiaoWang.ProvablySecureRole-BasedEncryptionwithRevocationMechanism.2011,JournalofComputerScienceandTechnology(JCST),26(4):696-710,July2011,SCI
[8]YanZhu,HuaixiWang,ZexingHu,Gail-JoonAhn,HongxinHu.Zero-knowledgeProofsofRetrievability.ScienceChina:InformationSciences(SeriesF).2011,54(8):1608–1617.SCI
[9]HuaixiWang,YanZhu(CorrespondingAuthors),ZexingHu,RongquanFeng,StephenS.Yau.Attribute-BasedSignaturewithPolicy-and-EndorsementMechanism,JournalofComputerScienceandTechnology(JCST),25(6),2010,pp.1293-1304.SCI
[10]Y.Zhu,D.G.FengandY.T.Yang.ConvolutionalSpreadSpectrumFingerprintingforCollusionSecure.InternationalWorkshoponDigitalWatermarking(IWDW2005),SpringerVerlag,LNCS3710,2005,pp.67-83.SCI
[11]YanZhu,HongxinHu,Gail-JoonAhn,MengyangYu,HongjiaZhao.Comparison-BasedEncryptionforFine-grainedAccessControlinClouds.SecondACMConferenceonDataandApplicationSecurityandPrivacy(ACMCodaspy2012),(SponsoredbyACMSIGSAC),SanAntonio,USA,Feb7-9,2012,pp.115-116.
[12]YanZhu,HongxinHu,Gail-JoonAhn,DijiangHuang,DiMa.TowardsTemporalAccessControlinCloudComputing.The31stAnnualIEEEInternationalConferenceonComputerCommunications(IEEEINFOCOM2012).Orlando,FloridaUSA,March25-30,2012,pp.2858-2862.
[13]YanZhu,ShanbiaoWang,DiMa,HongxinHu,Gail-JoonAhn.SecureandEfficientConstructionsofHash,MACandPRFforMobileDevices.IEEEGlobalCommunicationsConference(IEEEGLOBECOM2012).Anaheim,California,2012
[14]YanZhu,HongxinHu,Gail-JoonAhn,HuaixiWang,MengyangYu.TemporalAttributeBasedEncryptioninClouds.18thACMConferenceonComputerandCommunicationsSecurity,Chicago,USA,Shortpaper(ACMCCS2011),pp.881-883.
[15]DiMa,NiteshSaxena,BabinsShrestha,TuoXiangandYanZhu.Tap-Wave-Rub:LightweightMalwarePreventionforSmartphonesusingIntuitiveHumanGestures.SixthACMConferenceonSecurityandPrivacyinWirelessandMobileNetworks(WiSec2013),Accepted,2013.
[16]DiMa,YanZhu.End-to-EndAggregateAuthenticationofTime-SeriesData.2013ACMAsiaPublic-KeyCryptographyWorkshop(AsiaPKC2013)and8thACMSymposiumonInformation,ComputerandCommunicationsSecurity(ASIACCS2013),Accepted,2013.
[17]Y.Zhu,HongxinHu,Gail-JoonAhn,YujingHan,ShiminChen.CollaborativeIntegrityVerificationinHybridClouds,7thInternationalConferenceonCollaborativeComputing:Networking,ApplicationsandWorksharing(CollaborateCom2011),Orlando,Florida,USA,October15-18,2011,pp.191-200.
[18]YanZhu,DiMa,ShanbiaoWang.Multi-keywordSecureDataRetrievalBasedonDualRangeComparison.The32ndInternationalConferenceonDistributedComputingSystemsandthe3rdWorkshoponSecurityandPrivacyinCloudComputing(ICDCS-SPCC2012).Macau,China,June28-21,2012
[19]YanZhu,HuaixiWang,ZexingHu,Gail-JoonAhn,HongxinHu,StephenS.Yau.DynamicAuditServicesforIntegrityVerificationofOutsourcedStoragesinClouds,the26thSymposiumonAppliedComputing(ACMSAC2011),March21-25,2011,Taiwan,toprint.
[20]YanZhu,ZexingHu,HuaixiWang,Gail-JoonAhn,HongxinHu,StephenS.Yau.EfficientProvableDataPossessionforHybridClouds,17thACMConferenceonComputerandCommunicationsSecurity(ACMCCS2010),Chicago,USA,Shortpaper,2010,pp.756-758.
[21]YanZhu,Gail-JoonAhn,HongxinHu,HuaixiWang,CryptographicRole-basedSecurityMechanismsbasedonRole-KeyHierarchy,5thACMSymposiumonInformation,Computer,andCommunicationssecurity,ACMAisaCCS2010,Beijing,China,pp.314-319.
[22]YanZhu,ZexingHu,HuaixiWang,Gail-JoonAhn,HongxinHu.ConvergenceBasedAccessControlforSocialNetwork,6thInternationalConferenceonCollaborativeComputing:Networking,ApplicationsandWorksharing(CollaborateCom2010),Chicago,USA,Regularpaper,2010,pp.328-338.
[23]DijiangHuang,ZhibinZhou,YanZhu.GradualIdentityExposureUsingAttribute-BasedEncryption,2thIEEEInternationalConferenceonInformationPrivacy,Security,RiskandTrust,Minnesota(Passat2010),USA,Regularpaper,2010,pp.881-888.
[24]YanZhu,WeiZou,XinShanZhu.CollusionSecureConvolutionalFingerprintingInformationCodes.ACMSymposiumonInformAtion,ComputerandCommunicationsSecurity(AsiaCCS2006),ACMPress,2006,pp.266-274.EI:20071810579577
[25]XinShanZhu,ZhiTang,YanZhu.Image-adaptivewatermarkingbasedonperceptuallyshapingwatermarkblockwise,ACMSymposiumonInformAtion,ComputerandCommunicationsSecurity(AsiaCCS2006),ACMPress,2006,pp.175-181.EI:20071810579570
[26]YanZhu,Chang-TsunLiandHong-JiaZhao.StructuralDigitalSignatureandSemi-FragileFingerprintingforImageAuthenticationinWaveletDomain.InternationalSymposiumonInformationAssuranceandSecurity(IAS2007),Manchester,UnitedKingdom,IEEE,2007,pp.478-483.EI:9874558
[27]YanZhu,DdengGuoFengandYangTianYang.OwnershipProofsofDigitalWorksBasedonSecureMultipartyComputation.JournalofSoftware(软件学报),Vol.17(1),2006,pp.157-166.EI:8839193,
[28]朱岩,韩心慧,叶志远,杨永田.扩频卷积指纹及其安全性分析.计算机学报.Vol.29(6),2006,pp.960-968.EI:9157460,
[29]朱岩,孙中伟,杨永田,冯登国.扩频CDMA水印性能分析及其多小波域内的应用研究.计算机学报.Vol.28(8),2005,pp.1376-1385.EI:8751662.
[30]朱岩,杨永田,冯登国.合谋安全的扩频卷积指纹信息码.软件学报.Vol.17(7),2006,pp.1617-1626.EI:9115431.
[31]朱岩,杨永田,叶志远,邹维,冯登国.购买者透明的非对称扩频指纹方案.电子学报.Vol.34(6),2006,pp.1037-1041.EI:9124812
[32]朱岩,冯登国,杨永田.多小波变换域内基于扩频和量化的混合水印研究.电子学报.Vol.34(10),2006,pp.1817-1822.EI:9421913.
[33]孙中伟,朱岩,冯登国.一种基于局部最大势检验的DWT域水印检测器及其性能研究.电子学报.Vol.33(5),2005,pp.864-867.EI
科研业绩
曾先后主持或参加多项国家自然基金、国家863计划、“十一五”国家密码发展基金、国家242计划等科研课题。
获得奖励/专利
1.一种基于反馈传播的分布式计算网络构建方法及其系统,专利号:ZL200810172676.3
2.一种具有容错功能的密码学分布式计算与分步检验方法,专利号:ZL200810111190.9
3.一种具有层次关系的公钥广播加密方法,专利号:200910222921.1
4.一种分布式计算中基于密码学的除法协议构造方法,专利申请号:200910222922.6
5.一种可用于分布式计算的逻辑比较的计算方法,专利号:200810180439.1
相关话题/计算机