删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

山东大学计算机科学与技术学院研究生导师简介-侯孟波

山东大学 免费考研网/2016-03-10


侯孟波 副教授

办公室:教师楼324房间
电子邮箱: houmb AT sdu.edu.cn
欢迎报考硕士研究生。
山东大学计算机应用技术专业, 工学博士学位
山东大学计算机软件与理论专业, 工学硕士学位
杭州电子科技大学计算机软件专业,工学学士学位

招生意向


研究方向
硕士研究生导师。研究密码学与网络安全相关内容,主要包括基于密码的基本理论,认证与密钥管理理论与技术,基于云计算、大数据、移动计算背景下的应用密码理论与技术研究。

讲授课程
操作系统信息安全导论安全协议与标准安全规划与管理 计算机科学导论 C程序设计

承担项目
主持项目:
1. 山东省优秀中青年科学家科研奖励基金:认证密钥建立协议理论与技术的研究, 2012-2014
2. 济南市科技发展计划: 安全数据存储系统的研究与开发,2010-2011
3. 济南市科技发展计划: XKMS安全认证服务器系统的研究与开发,2009-2010

核心参与项目:
2003-2006 国家自然基金: 具有特性的数字签名方案的研究,排名2
2012-2014 山东省自然基金重点项目:基于公钥密码的跨域认证技术及其支撑理论的研究,排名2
2003-2006山东省自然基金: 具有特性的数字签名方案的研究,排名3
2000-2001山东省计委专项开发项目: PKI网络安全平台的研制与开发,排名2
2006-2007 国家发改委重大项目: CNGI示范工程-面向IPv6的互联网安全体系结构和关键技术研究子项目-基于真实IPv6地址访问的身份认证系统 ,排名2
2007-2010山东省科技发展计划:网格安全支撑平台关键技术的研究与实现, 排名3

2010年山东大学教学改革立项,本科生课程教学中研究能力的培养排名4
2013年山东大学教学改革立项, 2013YB078 "操作系统课程设计中因材施教方法研究" 排名2

发表论文
学术期刊第一作者:
1. An Efficient Certificate Revocation and Verification Scheme from Multi-Hashing.Journal of Computers, Vol. 7, No.6,pp.1437- 1444.June 2012.
2. CVS-M: An Efficient Certificate Validation Scheme Based on Multi-Hashing. Springer Lecture Notes in Electrical Engineering Vol.113, pp.567-575, 2011
3. Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings. Journal of networks, Vol 5, No 7, 855-862, Jul 2010.
4. Secure Key-Escrowless Explicit Authenticated Key Agreement Protocol in ID-based Public Key Cryptography. Journal of Information Assurance and Security. Vol.5(1), 130-137, Dynamic Publishers Inc., USA, 2010.02.
5. 基于无证书的两方认证密钥协商协议, 软件学报, Vol.20, Dec. 2009, pp.321-329.
6. 安全增强的身份基认证密钥协商协议, 电子科技大学学报,Vol.38, 2009.11,pp.01-01.
7. 一个基于无证书的两方认证密钥协商协议. 电子科技大学学报,Vol.38, 2009.11,pp.16-16.
8. 构建无证书的两方认证密钥协商协议, 计算机工程与应用,Vol.46(8), pp.01-04, 2010.03.
9. 身份基认证密钥协商协议的分析与改进,计算机工程与应用, Vol.46(7), pp.25-28, 2010.03.
10. 一个具有强授权特性的网格安全框架, 计算机应用, 2005 第 5 期(第25卷), pp. 1145-1147.
11. 一种新型的数字证书注销和验证方案, 计算机应用, 2002第11期(第22卷), pp. 50-53.

国际会议第一作者:
1. CVS-M: An Efficient Certificate Validation Scheme Based on Multi-Hashing. 2011 International Conference on Green Communications and Networks (GCN’11), Chongqing, China, Springer Lecture Notes in Electrical Engineering Vol.113, pp.567-575, July 15-18, 2011. EI-**020.
2.A One-Round Authenticated Key Agreement Protocol with Enhanced Security. The 2nd International Conference on Intelligent Control and Information Processing (ICICIP’11), Harbin, China, IEEE Computer Society, pp.194-197. 25-28 July 2011.EI:**443
3.An Efficient and Secure One-Round Authenticated Key Agreement Protocol without Pairings. The 2nd International Conference on Multimedia Technology (ICMT’11), Hangzhou, China, IEEE Computer Society, pp.160-163. Jul. 26-28, 2011 .EI:**778
4.An Enhanced Two-Party Key Agreement Protocol in the Key Escrow Mode, The 2009 International Conference on Multimedia Information NEtworking and security (MINES’09), Wuhan, China, IEEE Computer Society, Vol.2, pp. 422-425, Nov. 18-20, 2009. EI: **959
5.Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow, The 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’09), Kyoto, Japan, IEEE Press, pp.644-647, Sept. 12 - 14, 2009.EI: **794
6.Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme, 5th International Joint Conference on INC, IMS and IDC(NCM’09), Seoul , Korea, IEEE Computer Society, pp. 894-897. August 25-27, 2009.EI:**185
7.On the Security ofCertificateless Authenticated Key Agreement Protocol (CL-AK) for Grid Computing, The 4th ChinaGrid Annual Conference (ChinaGrid’09), Yantai, China, pp. 128-133, IEEE Computer Society, Aug. 21-22, 2009.EI: **437
8.Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme, The 3rd International Conference on Management of e-Commerce and e-Government (ICMeCG’09), Nanchang, China, pp. 440-444. IEEE Computer Society, Sept. 16-19, 2009. EI: **349
9.A Secure Two-Party Key Agreement Protocol With Key Escrow and Perfect Forward Secrecy, 3rd International Conference onAnti-counterfeiting, Security, and Identification in Communications (ICASID’09), pp.501-504, Hong Kong, China, IEEE Press, August 20-22, 2009. EI: **008
10.A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow, 5th International Conference on Information Assurance and Security (IAS’09), Vol. I, pp. 487-490, Xi'an, China, IEEE Computer Society, August 18-20, 2009. EI: **677
11.On the Security of Certificateless Authenticated Key Agreement Protocol, 2nd IEEE International Symposium on IT in Medicine & Education (ITIME’09) , Vol. II, pp. 974-979, Jinan, China, IEEE Press, Aug, 14-16, 2009.EI: **208
12.Secure Certificateless-Based Authenticated Key Agreement Protocol in the Client-Server Setting, 2nd IEEE International Symposium on IT in Medicine & Education (ITIME’09) , Vol(2), pp. 960-965, Jinan, China, IEEE Press, Aug, 14-16,2009.EI: **206
13.Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM’09), Sanya, China, IEEE Press, Vol. III, pp.308-311, August 8 - 9, 2009. EI: **164
14.A Two-Party Certificateless Authenticated Key Agreement Protocol without pairing,The 2nd IEEE International Conference on Computer Science and Information Technology 2009 (ICCSIT’09), Beijing, China, IEEE Press, Vol. I, pp.412-416,August 8-11, 2009. EI: **822
15.Constructing Secure Two-Party Authenticated Key Agreement Protocol Based on Certificateless Public Key Encryption Scheme, The 4th International Conference on Computer Science and Education (ICCSE’09),Nanning, China, IEEE Press, pp.1923-1927, July 25-28, 2009 . EI:**514
16.Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol, 2009 Asia-Pacific Conference on Information Processing (APCIP’09), Volume II, pp. 574-577, Shenzhen, China, IEEE Computer Society, July 18-19, 2009.EI:**588

本人研究生从事的工作领域
密码学与信息安全
相关话题/计算机