1级a做片视频在线观看

当前位置:首页 > 学院概况 > 师资队伍

1级a做片视频在线观看:夏喆

发布时间:2015-05-27     字体:[增加 减小]



个人简介:

夏喆,男,19827月出生,博士、武汉理工大学副教授、硕士生导师。2009年获得英国萨里大学(University of Surrey)博士学位,2009年至2013年在英国萨里大学从事博士后研究,2017年至2018年在澳大利亚伍伦贡大学(University of Wollongong)进行访问学习,主要研究方向为密码学和信息安全。近年来在TIFS、DCC、IET Information Security、ACISP等国际期刊会议上发表学术论文40余篇,曾担任澳大利亚学术委员会(ARC)信息安全方向评审及ESORICS, EVT, Vote-ID等国际学术会议程序委员会委员(PC Member)。目前担任SCI期刊《Journal of Information Security and Application》的副主编(Associate Editor),以及多个信息安全专刊的编委。

 

教育经历:

2005.09 – 2009.06  英国萨里大学,信息安全,博士,导师:Prof. Steve Schneider

2004.09 – 2005.08  英国萨里大学,信息系统,硕士,导师:Prof. Steve Schneider

2000.09 – 2004.06  武汉大学,计算机科学与技术,学士

 

工作经历:

2013.02 – 至今  武汉理工大学,计算机学院,副教授

2017.12 – 2018.12  澳大利亚伍伦贡大学,计算机与信息学院,访问学者,合作导师:穆怡

2009.04 – 2013.02  英国萨里大学,计算机学院,博士后,合作导师:Prof. Steve Schneider

 

论文发表:

专著:

·          Aamo Iorliam, Anthony Ho, Norman Poh, Xi Zhao and Zhe Xia. Benford's Law for Classification of Biometric Images. a chapter in IET book User-Centric Privacy and Security in Biometrics, 2017.

·          Thea Peacock, Peter Y. A. Ryan, Steve Schneider and Zhe Xia. Verifiable voting systems.  A chapter in Computer and Information Security Handbook (2nd edition). Morgan Kaufmann Eds (an imprint of Elsevier Inc.), 2013.

期刊论文:

·          Yanwei Zhou, Bo Yang, Yi Mu, Zhe Xia. Continuous leakage-resilient identity-based encryption with leakage amplification. To appear at Designs, Codes and Cryptography. (CCF B)

·          Yanwei Zhou, Bo Yang, Zhe Xia, Yi Mu, Tao Wang. Anonymous and updatable identity-based hash proof system. To appear at IEEE System Journal.

·          Tao Wang, Bo Yang, Hongyu Liu, Yong Yu, Guoyong Qiu, Zhe Xia. An alternative approach to public cloud data auditing supporting data dynamics. To appear at Soft Computing. (CCF C)

·          Xin Wang, Bo Yang, Zhe Xia. A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage. To appear at Frontiers of Information Technology & Electronic Engineering.

·          Zhe Xia, Yining Liu, Ching-Fang Hsu, Chin-Chen Chang. An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials. Symmetry 11(1): 88, 2019.

·          Yining Liu, Yanping Wang, Xiaofen Wang, Zhe Xia, Jingfang Xu. Privacy-preserving raw data collection without a trusted authority for IoT. Computer Networks 148:340-348, 2019. (CCF B)

·          Yanwei Zhou, Bo Yang, Yi Mu, Zhe Xia. Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80:41-53, 2018. (CCF C)

·          Xin Wang, Bo Yang, Zhe Xia, Yanqi Zhao, Huifang Yu. A cheating detectable privacy-preserving data sharing scheme for cloud computing. Security and Communication Networks 6174830:1-6174830:13, 2018. (CCF C)

·          Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen. Updatable identity-based hash proof system based on lattices and its application to leakage-resilient public-key encryption schemes. Journal of Computer Science and Technology 33(6): 1243-1260, 2018.

·          Mingwu Zhang, Jiajun Huang, Hua Shen, Zhe Xia, Yong Ding. Consecutive leakage-resilient and updatable lossy trapdoor functions and application in sensitive big-data environments. IEEE Access 6:43936-43945, 2018.

·          Zhe Xia, Zheng Tong, Min Xiao, Chin-Chen Chang. A framework for practical and receipt-free remote voting. IET Information Security, 12(4):326-331 2018. (CCF C)

·          Lein Harn, Ching-Fang Hsu, Zhe Xia, Junwei Zhou. How to share secret efficiently over networks. Security and Communication Networks. 2017. (CCF C)

·          Hanbing Yao, Nana Xing, Junwei Zhou, Zhe Xia. Secure Index for Resource-Constraint Mobile Devices in Cloud Computing. IEEE Access. DOI:10.1109/ACCESS.2016.2622299.

·          Yining Liu, Qi Zhong, Zhe Xia, Dibiao He. A Secure Data Backup Scheme Using Multi-Factor Authentication. IET Information Security. 2016. (CCF C)

·          Yining Liu, Gao Lin, Chi Cheng, Zhe Xia. A Privacy-Preserving Health Data Aggregation Scheme. KSII Transactions on Internet and Information Systems. 2016

·          Morgan Llewellyn, Steve Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y. A. Ryan, Shriramkrishnan Srinivasan. Testing voters' understanding of a security mechanism used in verifiable voting. USENIX Journal of Election Technology and Systems (JETS). 2013.

·          Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider and Zhe Xia. Prêt à Voter: a Voter-Verifiable Voting System. In IEEE Transactions on Information Forensics and Security (Special Issue on Electronic Voting), volume 4, number 4, pages 662—673. December 2009. (CCF A)

·          David Lundin, Helen Treharne, Peter Y. A. Ryan, Steve Schneider, James Heather and Zhe Xia. Tear and destroy: chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using visual encryption. In the EATCS Fundamenta Informaticae (Journal of Fundamental Informatics), 2006, pp 1001-1019.

 

 

会议论文:

·          Zhe Xia, Zhen Yang, Shengwu Xiong, Chingfang Hsu. Game-based security proofs for secret sharing schemes. In the 2nd International Conference on Security and Intelligent Computing and Big-Data Services (SICBS 2018), December 14-16, 2018, Guilin, China.

·          Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu. An efficient and provably secure private polynomial evaluation scheme. In the 14th International Conference on Information Security Practice and Experience (ISPEC 2018). September 25-27, 2018, Tokyo Japan.

·          Yining Liu, Yanping Wang, Xiaofen Wang, Zhe Xia. Privacy-preserving data collection for mobile phone sensing tasks. In the 14th International Conference on Information Security Practice and Experience (ISPEC 2018). September 25-27, 2018, Tokyo Japan.

·          Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou, Minwu Zhang. Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems. In the 23st Australasian Conference on Information Security and Privacy (ACISP 2018). July 11-13, 2018, Wollongong, Australia. (CCF C)

·          Liuying Sun, Anthony Ho, Zhe Xia, Jiageng Chen, Xuzhe Huang, Yidan Zhang. Detection and Classification of Malicious Patterns in Network Traffic using Benford's Law. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference 2017 (APSIPA ASC 2017).

·          Zhe Xia, Bassoma Diallo, Min Xiao. A Lightweight Privacy Preserving Scheme for Smart Grid. 2016 International Conference on Computing, Analytics and Security Trends.

·          Zhe Xia, Xiaoyun Yang, Min Xiao and Debiao He. Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry. In the 21st Australasian Conference on Information Security and Privacy (ACISP 2016). July 4-6, 2016, Melbourne, Australia. (CCF C)

·          Pengyu Zhou, Min Xiao and Zhe Xia. A message authentication method for wireless sensor networks using polynomial interpolation. In the 2nd International Symposium on Dependable Computing and Internet of Things (DCIT 2015), November 2015, Wuhan China.

·          Xiaoyun Yang, Zhe Xia and Min Xiao. Verifiable secret sharing and distributed key generation based on hyperplane geometry. In the 2nd International Symposium on Dependable Computing and Internet of Things (DCIT 2015), November 2015, Wuhan China.

·          Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve Schneider and Zhe Xia. Countering ballot stuffing and incorporating eligibility verifiability in Helios. In the 8th International Conference on Network and System Security (NSS 2014), volumn 8792 of Lecture Notes of Computer Science. October, 2014. Xi'an, China.

·          Xiao Yang, Zheng Tong, Zhe Xia and Yining Liu. Generating verifiable random numbers without a trusted party. In the 2014 China Communications Security Conference (CSC 2014), May 2014. Beijing, China.

·          James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan and Zhe Xia. Solving the discrete logarithm problem for packing candidate preferences. In the 8th International Conference on Availability, Reliability and Security (CD-ARES 2013), volumn 8128 of Lecture Notes in Computer Science. IEEE Computer Society. September 2013. Regensburg, Germany.

·          Morgan Llewellyn, Steve Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y. A. Ryan, Shriramkrishnan Srinivasan. Testing voters' understanding of a security mechanism used in verifiable voting. In the 2013 USENIX Electronic Voting Technology Workshop (EVT 2013), collaborated with USENIX Security Symposium 2013. August 2013, Washinton, D.C., US.

·          Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen and Zhe Xia. Using Prêt à Voter in the Victorian State elections. In the 2012 USENIX Electronic Voting Technology Workshop (EVT 2012), collaborated with USENIX Security Symposium 2012. August 2012. Bellevue, WA, US.

·          Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen and Zhe Xia. A supervised verifiable voting protocol for the Victorian Electoral Commission. In the 5th International Conference on Electronic Voting (EVOTE 2012). Manuel J. Kripp, Melanie Volkamer, Rüdiger Grimm (Eds), volume 205 of Lecture Notes in Informatics (LNI). July 2012. Bregenz, Austria.

·          Steve Schneider, Sriramkrishnan Srinivasan, Chris Culnane, James Heather and Zhe Xia. Prêt à Voter with write-ins. In the 3rd International Conference on E-voting and Identity (VOTE-ID 2011). volume 7985 of Lecture Notes of Computer Science, Springer-Verlag. September 2011. Tallinn, Estonia.

·          Chris Culnane, David Bismark, James Heather, Steve Schneider, Sriramkrishnan Srinivasan and Zhe Xia. Authentication codes. In the 2011 USENIX Electronic Voting Technology Workshop (EVT 2011), collaborated with USENIX Security Symposium 2011. August 2011. San Francisco, California, US.

·          Steve Schneider, Morgan Llewellyn, Chris Culnane, James Heather, Sriramkrishnan Srinivasan and Zhe Xia. Focus group views on Prêt à Voter 1.0. In the 2nd International Workshop on Requirements Engineering for E-voting Systems (RE-Vote 2011). August 2011. Trento, Italy.

·          Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve Schneider and Sriramkrishnan Srinivasan. Versatile Prêt à Voter: handling multiple election methods with a unified interface. In the 11th International Conference on Cryptology in India (Indocrypt 2010). Volume 6498 of Lecture Notes of Computer Science, pages 98-114, Springer-Verlag. December 2010, Hyderabad, India.

·          David Bismark, James Heather, Roger Peel, Peter Y. A. Ryan, Steve Schneider and Zhe Xia. Experiences gained from the first Prêt à Voter implementation. In the 1st International Workshop on Requirements Engineering for E-voting Systems (RE-Vote 2009). August 2009. Atlanta, Georgia, US.

·          Zhe Xia, Steve Schneider, James Heather and Jacques Traoré. Analysis, improvement and simplification of the Prêt à Voter with Paillier encryption. In the 2008 USENIX Electronic Voting Technology Workshop (EVT 2008), collaborated with USENIX Security Symposium 2008,. July 2008. San Jose, California, US.

·          Sebastien Foulle, Steve Schneider, Jacques Traoré and Zhe Xia. Threat analysis of a practical voting scheme with receipts. In the 1st International Conference on E-voting and Identity (VOTE-ID 2007). Volume 4896 of Lecture Notes of Computer Science, pages 156-165, Springer-Verlag. October 2007. Bochum, Germany.

·          Zhe Xia, Steve Schneider, James Heather, Peter Y. A. Ryan, David Lundin, Roger Peel and Philip Howard. Prêt à Voter: All-In-One. In IAVoSS Workshop on Trustworthy Elections (WOTE 2007), June 2007. Ottawa, Canada.

·          Zhe Xia and Steve Schneider. A new receipt-free e-voting scheme based on blind signature. In IAVoSS Workshop on Trustworthy Elections (WOTE 2006). June 2006. Cambridge, UK.

 

承担项目:

·         湖北省自然科学基金“物联网中认证与密钥协商机制研究”,2017CFB303,2017.01-2018.12,5万元,主持

·         武汉市应用基础研究计划“基于云平台的大规模固件安全分析关键技术研究”,2016010101010004,2016.08 - 2018.08,30万元,参与

·         国家科技支撑计划课题“国家网络信息安全实验平台”子课题,2012BAH45B01,攻击路径及协议分析系统,2015.09 - 2016.08,69万元,参与

·         湖北省自然科学基金重点项目,2015CFA069,物联网系统安全可靠性建模与分析技术研究,2015.01 - 2017.12,20 万元,参与

·         中央高校基本科研业务费基础研究项目,2014-IV-020,抗胁迫全程可验证远程安全投票协议的设计与分析,2014.01-2015.10,5 万,主持

·         英国EPSRC 项目,EP/G025797/1,Trustworthy Voting Systems,2009.04 - 2013.02,150 万英镑,参与

 

 

1级a做片视频在线观看-成一级人大片在线观看-一级a爱片免费视频观看2019