高伟
近期热点
资料介绍
个人简历
学习经历大学本科 1996.9-2000.7 鲁东大学 理学学士 数学与应用数学 全日制硕士研究生 2000.9-2003.6 广州大学 理学硕士 应用数学 全日制博士研究生 2003.9-2006.12 湖南大学 理学博士 应用数学 全日制博士后研究 2010.9-2012.8 上海交通大学 博士后 计算机科学与技术 在职访问学者 2011.10-2012.4 University of Wollongong,在职访问学者 2009.9-2009.10 University of Birmingham,在职工作经历2007.5-至今 鲁东大学 数学与统计科学学院近年来获得奖励情况和荣誉称号1.山东省第三届师范生类高校学生从业技能大赛,优秀辅导教师奖,2015年2.鲁东大学第三届师范类学生从业技能大赛,优秀辅导教师奖,2015年3.鲁东大学第二届“我最喜爱的教师”提名奖,2015年4.鲁东大学学士学位论文优秀指导教师,2014年5.鲁东大学先进工作者,2015-2018年6. 鲁东大学教学观摩大赛一等奖,2013年研究领域
密码学与信息安全近期论文
Wei Gao, Guilin Wang, Xueli Wang, Zhenguang Yang, ID-based threshold signatures based on bilinear Pairings, Informatica, 2009, 20(4): 461-476Wei Gao, Fei Li, Xueli Wang, Chameleon hash without key exposure based on Schnorr signature. Computer standards & interfaces, 2009, 31(2): 282-285Wei Gao, Xueli Wang, Dongqing Xie, Chameleon hashes sithout key exposure based on factoring. Journal of computer science and technology, 2007, 22(1): 109-113Wei Gao, Kefei Chen., Guilin Wang, Designated condition one-time signatures, International Conference on Internet and Distributed Computing Systems, LNCS, 2012,7646: 253-263, Fujian, China, 2012.11.21-11.23Wei Gao, Zhenyou Wang, Fei Li, Lie Chen, An efficient threshold signature scheme without random oracles, Proceedings of the 2009 international conference on computational intelligence and security, IEEE Computer Society, 2009, 400-404, Beijing, China, 2009.12.11-12.14Wei Gao, Guilin Wang, Xueli Wang, Fei Li, One-round ID-based blind signature scheme without ROS assumption, The second international conference on pairing-based cryptography (Pairing 2008), LNCS, 2008, 5209: 316-331, Egham, UK, 2008.09.01-09.03Wei Gao, Fei Li, Banghai Xu, An abuse-free optimistic fair exchange protocol based on BLS signature, Proceedings of the 2008 international conference on computational intelligence and security, IEEE Computer Society, pp.278-282, 2008.12.12-12.17Fei Li, Wei Gao,Kefei Chen,Guilin Wang, A certificateless signature and public auditing with trust level 3+.Journal of Ambient Intelligence and Humanized Computing, 2017, online,DOI:10.1007/s12652-017-0553 -xFei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Efficient identity-based threshold signature scheme from bilinear pairings in standard model, International Journal of Internet Protocol Technology, 2014, 8(2/3): 107-115Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao, An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation, IEEE Transactions on Information Forensics and Security, 2014, 9(12): 2302-2313Jianhua Yu, Xueli Wang, Wei Gao, Improvement and applications of secure outsourcing of scientific computations, J. Ambient Intelligence and Humanized Computing 6(6): 763-772 (2015)Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu, A brief survey on secure multi-party computing in the presence of rational parties, J. Ambient Intelligence and Humanized Computing, 6(6): 807-824 (2015)Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, A brief survey on secure multi-party computing in the presence of rational parties, Journal of Ambient Intelligence and Humanized Computing, 2015, 6(6): 1-18Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen, Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited, Oxford Computer Journal, 2015, 58(10): 2747 - 2757Gang Sheng, Chunming Tang, Wei Gao, Ying Yin, MD-VC Matrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication, The 10th International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, 2016.09.28-09.30Fei Li, Wei Gao, Dongqing Xie, Chunming Tang,Certificateless Cryptography with KGC Trust Level 3 Revisited, International Conference on Cloud Computing and Security 2017, ICCCS (2), pp.7292-304, Nanjing, China, 2017.06.16-06.18.Fei Li, Wei Gao, Jianhua Yan, Xuan Wang, Round-optimal ID-based dynamic authenticated group key agreement, International Journal of High Performance Systems Architecture, 2016, 6(3): 153-161Fei Li, Wei Gao, Xuan Wang, Jianhua Yan, An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings, The 10th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2016, IEEE Computer Society, pp.468- 472, Fukuoka, Japan, 2016.07.06-07.082.Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security, INFORMATICA, 2017, 28(2): 215-235Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Efficient Identity-based Threshold Decryption Scheme from Bilinear Pairings. Frontiers of Computer Science, 2018, 12(1):177-189Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Chunmig Tang, Double-authentication-preventing signatures revisited:new definition and construction from chameleon hash. Frontiers of Information Technology & Electronic Engineering, 2019, 20(2):176-186 相关热点
最新收录
- 椛岛光 06-01
- 星乃梦奈(ほしの ゆな 06-01
- 沖田奈奈 沖田奈々(Nana 06-01
- 藤仁依那 藤にいな(Niina 06-01
- 矢田步美 矢田あゆみ(Ay 06-01
- 妹岳夏目 妹岳なつめ(Na 06-01
- 麻仓香穗里 麻仓かほり 06-01
- 立花广美 (立花ひろみ H 05-31
- 里中瑞穗(里中みずほ Mi 05-31
- 结月莉亚(結月りあ) 05-31