从1,500,000教师库中查找(输入学校名称或教师姓名)
我要添加在此添加教师信息
按拼音查找大学老师
abc(ch)defghijklmnopqrs(sh)tuvwxyz(zh)
刘吉强
5.0我来评喜爱度
所在大学:北京交通大学
所在院系:计算机与信息技术学院
所在地区:北京
所在城市:北京
评论次数:0条  我要评论
本页网址:http://teacher.cucdc.com/laoshi/2059687.html
刘吉强老师介绍
North313,Building9
PersonalInformation:
EducationalInformation:
Professional
Information:
Publications(main):
NameJiqiangLiu
Postalcode100044CountryChina
Officetelephone+86-010-51688241
Preferrede-mail:jqliu@bjtu.edu.cn
OtherInformation:IEEEMember
ResearchInterest:TrustedComputing,AppliedCryptography,SecurityProtocol,PrivacyPreserving,ModelTheory
HighestprofessionaldegreereceivedDoctorofScience
Program/CourseofstudyMathematicsLogic
Month/Yearreceived06/1999
College/UniversityBeijingNormalUniversity
PositionAssociateProfessor
Department/DivisionComputerandInformationTechnology,BeijingJiaotongUniversity
Teaching
DiscreteMathematicsforundergraduatestudents
CompilersPrinciplesforundergraduatestudents
CryptographyandNetworksecurityforgraduatestudents
CryptographyandsecurityProtocolforgraduatestudents
[1]JiqiangLiu,ShengZhong,AnalysisofKim-Jeon-YooPasswordAuthenticationSchemes,AcceptedbyCryptologia
[2]J.Q.Liu,R.Zhang,J.Zhao,AnID-basedKeyPre-distributionSchemeforWirelessSensorNetworks,ICWMMN08
[3]JiqiangLiu,JiaZhao,YongZhao,StudyofRemoteAutomatedAnonymousAttestationinTrustedComputing,ChineseJournalofComputers,2008
[4]JiqiangLiu,JiaZhao,ZhenHan,ARemoteAnonymousAttestationProtocolinTrustedComputing,The4thInternationalWorkshoponSecurityinSystemsandNetworks(SSN2008),22ndIEEEInternationalParallelandDistributedProcessingSymposium(IPDPS2008)
[5]JiqiangLiu,ShengZhong,WeiminTang,ARemoteAuthenticationSchemeBasedSmartCards,ITESS08,PP1175-1177
[6]JiaZhao,ZhenHan,JiqiangLiu,etc.,ANoninterference-basedTrustedChainModel,JournalofComputerResearchandDevelopment,(Accepted)
[7]FanWu,ShengZhong,andJiqiangLiu,Cost-effectiveTrafficAssignmentforMultipathRoutinginSelfishNetworks,IEEEGlobeCom,PP:453-457,2007
[8]JiqiangLiu,ShengZhong,ATime-BoundKeyManagementSchemeforHierarchicalTree,ISDPE07,PP:445-448,2007
[9]JiaZhao,JiqiangLiu,AMulti-LevelSecurityModelBasedonTrustedComputing,ISDPE07,PP:448-452,2007
[10]YongZhao,JiqiangLiu,ZhenHan,ChangxiangShen,AnOperatingSystemTrustedSecurityModelForImportantSensitiveInformationSystemISDPE07,PP:465-468,2007
[11]YongZhao,ZhenHan,JiqiangLiu,Trustedapplication-environmentarchitecturefitfortrustmeasurement,TongxinXuebao/JournalonCommunication,Vol28,2007
[12]YongZhao,JiqiangLiuetc.,Identity-basedblindsignatureschemeformobileelectronicpayment,BeijingJiaotongDaxueXuebao/JournalofBeijingJiaotongUniversity,Vol.31,No.5,p82-86,October,2007(InChinese)
[13]RuiZhang,JiqiangLiu,ShuanghePeng,ResearchandImplementationofthetrusttransitionbasedonEFI,ComputerApplication,200727(09):2174-2176,2007
[14]YongZhao,JiqiangLiuetc.,TheApplicationofInformationLeakageDefendableModelinEnterpriseIntranetSecurity,JournalofComputerResearchandDevelopment,vol.5,PP:761-767,2007.5
[15]YongZhao,JiqiangLiuetc.,ApplicationofAnImprovedAuthenticationProtocolinMobileElectronic,BeijingJiaotongUniversity,Vol.30No.5,PP:28-31,2006.1(InChinese)
[16]RuiXue,JiqiangLiu,UniversalInvertingAlgorithmsforBoundedOne-WayFunctions,SpecialIssueforInformationSecurityinChineseJournalofComputers,Vol.29No.9P.1603-1607,2006
[17]YongZhao,ZhenHan,JiqiangLiu,ZhigangLi,AnEfficientandDivisiblePaymentSchemeforM-Commerce,2005InternationalWorkshoponIntelligentInformationHidingandMultimediaSignalProcessing,KES(3)2005:488-496,2005
[18]XinLiu,ZhenHan,JiqiangLiu,ChangxiangShen,DevelopSecureDatabaseSystemwithSecurityExtendedERModel,2005InternationalWorkshoponIntelligentInformationHidingandMultimediaSignalProcessing,KES(3)2005:1005-1010,2005
[19]YongZhao,JiqiangLiu,ADesigntoBasePointChoosingAlgorithmforIdealSecureEllipticCurve,CCICS’2005
[20]JiangTao,JiqiangLiu,ZhenHan,UsingForwardIntegrityinSecureLogServerSystem,2004InternationalConferenceonSignalProcessingProceedings,(ICSP2004),PP:2655-2658,2004.9
[21]JiangTao,JiqiangLiu,ZhenHan,TheImplementationofDataWarehouseIncrementDataLoadingAlgorithm,JournalofComputerResearchandDevelopment,2004.12(InChinese)
[22]ShuanghePeng,ZhenHan,JiqiangLiu,SecurityEnhancementforTwoRemoteUserAuthenticationSchemes,ICSP2004,PP:2630-2633,2004.9
[23]KejunSheng,ZhenHan,JiqiangLiu,AnAutomaticMachineofApplicationProtocolRecognition,ICSP2004,PP:2481-2484,2004.9
[24]KejunSheng,JiqiangLiu,TheResearchonApplicationProtocolBasedApplicationEnvironment,ComputerApplication,Vol.24No.8,2004.8(InChinese)
[25]KejunSheng,ChangxiangShen,JiqiangLiu,TheResearchonApplicationEnclaveBoundaryAccessControlSystemBasedonOrganizationStructure,ComputerEngineeringandApplication,Vol.40No.25,2004(InChinese)
[26]JiangTao,JiqiangLiu,UsingLoadableKernelModuletoStrengthenAccessControlofOperationSystem,ComputerEngineering,Vol.30No.17,2004(InChinese)
刘吉强老师教学评价(0条)
沟通交流、共同成长。欢迎您参与评论留言!
刘吉强留言请在下面的评论框中输入您想说的话:)
我要评论(500字以内)
提示:请登录后提交!登录 快速注册
更多>>同院系教师