删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

西安电子科技大学网络与信息安全学院导师教师师资介绍简介-赵兴文

本站小编 Free考研考试/2021-07-10


基本信息
姓名:赵兴文 职称:副教授
院系:网络与信息安全学院 信息安全系
专业:信息安全
学历:博士

联系方式
电子邮箱:
xwzhao(at)xidian.edu.cn
sevenzhao(at)hotmail.com
联系方式:
陕西省西安市太白南路2号
西安电子科技大学91信箱
办公地址:
西安电子科技大学南校区行政副楼201东
联系电话:


个人简介
赵兴文现任西安电子科技大学网络与信息安全学院信息安全系的副教授,硕士生导师。中国高科技产业化研究会 智能信息处理产业化分会 理事,ACM SIGSAC 会员,中国密码学会会员。1999年在西安电子科技大学通信工程学院取得学士学位,专业为通信工程。2004年在西安电子科技大学通信工程学院取得硕士学位,专业为通信与信息系统。2011年在中山大学信息科学与技术学院取得博士学位,专业为计算机软件与理论。

研究方向
多方参与的数据安全共享
广播加密和叛徒追踪
保护隐私的密码协议,比如匿名认证
数字签名
基于机器学习的网络安全应用




基本信息
姓名:赵兴文 职称:副教授
院系:网络与信息安全学院 信息安全系
专业:信息安全
学历:博士

联系方式
电子邮箱:
xwzhao(at)xidian.edu.cn
sevenzhao(at)hotmail.com
联系方式:
陕西省西安市太白南路2号
西安电子科技大学91信箱
办公地址:
西安电子科技大学南校区行政副楼201东
联系电话:


个人简介
赵兴文现任西安电子科技大学网络与信息安全学院信息安全系的副教授,硕士生导师。中国高科技产业化研究会 智能信息处理产业化分会 理事,ACM SIGSAC 会员,中国密码学会会员。1999年在西安电子科技大学通信工程学院取得学士学位,专业为通信工程。2004年在西安电子科技大学通信工程学院取得硕士学位,专业为通信与信息系统。2011年在中山大学信息科学与技术学院取得博士学位,专业为计算机软件与理论。

研究方向
多方参与的数据安全共享
广播加密和叛徒追踪
保护隐私的密码协议,比如匿名认证
数字签名
基于机器学习的网络安全应用




科学研究
目前研究团队承担的科研项目:
1. 隐私保护
2. 多方参与的数据共享
3. 匿名认证
4. 基于机器学习的网络信息安全




科研团队
团队教师:

博士研究生
硕士研究生:
2020-07-30,2021年预计招学硕2名,专硕暂时未知




课程教学
目前本人承担的教学任务:
网络编程技术(课本是 《网络编程实用教程》,叶树华,人民邮电出版社)
入侵检测(唐正军,李建华编著. 入侵检测技术, 清华大学出版社)




论文成果
Xinyin Xiang,Xingwen Zhao:Continuous leakage-resilient IBE in cloud computing.Int. J. Communication Systems31(10)(2018)
Xingwen Zhao,Hui Li:Privacy Preserving Data-Sharing Scheme in Content-Centric Networks Against Collusion Name Guessing Attacks.IEEE Access5:23182-23189(2017)
Xingwen Zhao,Jiaping Lin,Hui Li:Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles.Mobile Information Systems2017:**:1-**:9(2017)
Jiaping Lin,Xingwen Zhao,Hui Li:Target: category-based android malware detection revisited.ACSW2017:74:1-74:9
Xingwen Zhao,Hui Li:Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service.CSS2017:396-410
Xinyin Xiang,Hui Li,Mingyu Wang,Xingwen Zhao:Efficient multi-party concurrent signature from lattices.Inf. Process. Lett.116(8):497-502(2016)
Xingwen Zhao, Gaofei Zhao, Hui Li.Generic Codes Based Traitor Tracing and Revoking Scheme from Attributes Based Encryption.Accepted by IEEE CIT 2014, Xi'An China.
Xingwen Zhao, Gaofei Zhao, Hui Li. Fully Secure Codes Based Tracing and Revoking Scheme with Constant Ciphertext, Applied Mechanics and Materials, Vols. 543-547 (2014) pp 3300-3307. (EI).Full version technical report available here. (pdf).
Xingwen Zhao, Hui Li. Improvement on A Multi-Channel Broadcast Encryption Scheme. Applied Mechanics and Materials Vols. 427-429 (2013) pp. 2163-2169.(EI)
Xingwen Zhao, Hui Li. Achieving Dynamic Privileges in Secure Data Sharing on Cloud Storage. Security and Communication Networks.2014, 7(11):2211-2221.(SCI)
Xingwen Zhao, Fangguo Zhang. Generic Codes Based Traitor Tracing Scheme with Revocation
Ability from Attributes Based Encryption, Technical Report. (pdf)
Xingwen Zhao, Hui Li. Codes Based Tracing and Revoking Scheme with Constant Ciphertext. ProvSec 2012 (Chengdu, China),LNCS 7496,2012,pp 318-335.(link)
Xingwen Zhao, Fangguo Zhang. Tracing and Revoking Scheme for Dynamic Privileges against Pirate Rebroadcast. Computers & Security. 2012, 31(1):59-69. http://dx.doi.org/10.1016/j.cose.2011.11.002. (SCI)
Xingwen Zhao, Fangguo Zhang, Haibo Tian. Dynamic Asymmetric Group Key Agreement for Ad Hoc Networks. Ad Hoc Networks. 2011, 9(5):928-939. http://dx.doi.org/10.1016/j.adhoc.2010.11.002. (SCI)
Xingwen Zhao, Fangguo Zhang. Fully CCA2 Secure Identity-Based Broadcast Encryption with Black-Box Accountable Authority. Journal of Systems and Software. 2012, 85(3):708-716. http://dx.doi.org/10.1016/j.jss.2011.09.045. (SCI)
Xingwen Zhao, Fangguo Zhang, Traitor Tracing Against Public Collaboration, ISPEC 2011, LNCS 6672, Springer, 2011, pp. 302-316. (EI)
Xingwen Zhao, Fangguo Zhang. Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature. Informatica. 2012, 31(1): 75-82. (EI)
Xingwen Zhao, Fangguo Zhang. A New Type of ID-based Encryption System and Its Application to Pay-TV Systems. International Journal of Network Security. 2011, 13(3):161-166.
Xingwen Zhao, Fangguo Zhang. Analysis on Hu et al.'s Identity-based Broadcast Encryption. International Journal of Network Security. 2011, 13(3):178-180.
Xingwen Zhao. Amendment to a Trace and Revoke Systems with Short Ciphertexts. International Journal of Network Security. 2012, 14(5): 251-256.
Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen. ID-Based Adaptive Oblivious Transfer. WISA 2009, LNCS 5932, Springer, pp. 133-147. (EI)
Xingwen Zhao, Fangguo Zhang, Efficient Periodic k-show Anonymous Credential System, The 6th Joint Workshop on Information Security (JWIS2011), Kaohsiung, Taiwan, October 5-6, 2011.
Xingwen Zhao, Fangguo Zhang. Time Selective Designated Confirmer Signature, ChinaCrypt 2009 (中国密码学会2009 年会), Science Press, pp.183-195.

新增栏目1




Information about Xingwen Zhao
Xingwen Zhao is now an associate professor in School of Cyber Engineering, Xidian University. He obtained B.S. degree and M.S. degree from School of Telecommunications Engineering of Xidian Universityin 1999 and 2004repectivley. He obtained Ph.D. degreefrom School of Information Science and Technology of Sun Yat-sen University in 2011. He is also an editor of International Journal of Technology in Computer Science & Engineering.
His research interests include machine learning (or artificial intelligent) based network security, multi-party data sharing, anonymous authentication, broadcast encryption, traitor tracing, key agreement.
Email: xwzhao(at)xidian.edu.cn, sevenzhao(at)hotmail.com
Mail address:
#91
School of Cyber Engineering
Xidian University
#2, Taibai Road South
Xi'an
Sha'an Xi
710071
China





Research Papers
Xinyin Xiang,Xingwen Zhao:Continuous leakage-resilient IBE in cloud computing.Int. J. Communication Systems31(10)(2018)
Xingwen Zhao,Hui Li:Privacy Preserving Data-Sharing Scheme in Content-Centric Networks Against Collusion Name Guessing Attacks.IEEE Access5:23182-23189(2017)
Xingwen Zhao,Jiaping Lin,Hui Li:Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles.Mobile Information Systems2017:**:1-**:9(2017)
Jiaping Lin,Xingwen Zhao,Hui Li:Target: category-based android malware detection revisited.ACSW2017:74:1-74:9
Xingwen Zhao,Hui Li:Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service.CSS2017:396-410
Xinyin Xiang,Hui Li,Mingyu Wang,Xingwen Zhao:Efficient multi-party concurrent signature from lattices.Inf. Process. Lett.116(8):497-502(2016)
Xingwen Zhao, Gaofei Zhao, Hui Li.Generic Codes Based Traitor Tracing and Revoking Scheme from Attributes Based Encryption.IEEE CIT 2014, Xi'An China.(EI)
Xingwen Zhao, Gaofei Zhao, Hui Li. Fully Secure Codes Based Tracing and Revoking Scheme with Constant Ciphertext, Applied Mechanics and Materials, Vols. 543-547 (2014) pp 3300-3307. (EI). Full Version Technical Report Available Here. (pdf)
Xingwen Zhao, Hui Li. Improvement on A Multi-Channel Broadcast Encryption Scheme. Applied Mechanics and Materials Vols. 427-429 (2013) pp. 2163-2169.(link)
Xingwen Zhao, Hui Li. Achieving Dynamic Privileges in Secure Data Sharing on Cloud Storage. Security and Communication Networks.2014, 7(11):2211-2221.(SCI)(link)
Xingwen Zhao, Fangguo Zhang. Generic Codes Based Traitor Tracing Scheme with Revocation
Ability from Attributes Based Encryption, Technical Report.(pdf)
Xingwen Zhao, Hui Li. Codes Based Tracing and Revoking Scheme with Constant Ciphertext. ProvSec 2012 (Chengdu, China), LNCS 7496, 2012, pp 318-335.(link)
Xingwen Zhao, Fangguo Zhang. Tracing and Revoking Scheme for Dynamic Privileges against Pirate Rebroadcast. Computers & Security. 2012, 31(1):59-69. http://dx.doi.org/10.1016/j.cose.2011.11.002. (SCI)
Xingwen Zhao, Fangguo Zhang, Haibo Tian. Dynamic Asymmetric Group Key Agreement for Ad Hoc Networks. Ad Hoc Networks. 2011, 9(5):928-939. http://dx.doi.org/10.1016/j.adhoc.2010.11.002. (SCI)
Xingwen Zhao, Fangguo Zhang. Fully CCA2 Secure Identity-Based Broadcast Encryption with Black-Box Accountable Authority. Journal of Systems and Software. 2012, 85(3):708-716. http://dx.doi.org/10.1016/j.jss.2011.09.045. (SCI)
Xingwen Zhao, Fangguo Zhang, Traitor Tracing Against Public Collaboration, ISPEC 2011, LNCS 6672, Springer, 2011, pp. 302-316. http://www.springerlink.com/content/m41nr46/(EI)
Xingwen Zhao, Fangguo Zhang. Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature. Informatica. 2012, 31(1): 75-82. http://www.informatica.si/PDF/36-1/12_Zhao%20-%20Times%20Limited%20Accountable%20Anonymous%20Online%20Submission%20Control%20System%20from.pdf(EI)
Xingwen Zhao, Fangguo Zhang. A New Type of ID-based Encryption System and Its Application to Pay-TV Systems. International Journal of Network Security. 2011, 13(3):161-166. http://ijns.femto.com.tw/contents/ijns-v13-n3/ijns-v13-n3.html
Xingwen Zhao, Fangguo Zhang. Analysis on Hu et al.'s Identity-based Broadcast Encryption. International Journal of Network Security. 2011, 13(3):178-180. http://ijns.femto.com.tw/contents/ijns-v13-n3/ijns-v13-n3.html
Xingwen Zhao. Amendment to a Trace and Revoke Systems with Short Ciphertexts. International Journal of Network Security. 2012, 14(5): 251-256. http://ijns.femto.com.tw/contents/ijns-v14-n5/ijns-v14-n5.html
Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen. ID-Based Adaptive Oblivious Transfer. WISA 2009, LNCS 5932, Springer, pp. 133-147. http://www.springerlink.com/content/e1731/(EI)
Xingwen Zhao, Fangguo Zhang, Efficient Periodic k-show Anonymous Credential System, The 6th Joint Workshop on Information Security (JWIS2011), Kaohsiung, Taiwan, October 5-6, 2011.
Xingwen Zhao, Fangguo Zhang. Time Selective Designated Confirmer Signature, ChinaCrypt 2009, Science Press, pp.183-195.


相关话题/西安电子科技大学 网络