从1,500,000教师库中查找(输入学校名称或教师姓名)
我要添加在此添加教师信息
按拼音查找大学老师
abc(ch)defghijklmnopqrs(sh)tuvwxyz(zh)
马建峰
5.0我来评喜爱度
所在大学:西安电子科技大学
所在院系:计算机学院
所在地区:陕西
所在城市:西安
评论次数:0条  我要评论
本页网址:http://teacher.cucdc.com/laoshi/2377633.html
马建峰老师介绍
姓 名
马建峰
性 别

职 称
教授
电子信箱
jfma@mail.xidian.edu.cn
联系电话
029-88202352
个人主页
http://
备用联系电话
029-88204750
办公地址
主楼一区328房间
导师类别
博士生导师
主要研究方向&领域
系统安全、密码技术、无线/移动安全
研究成果&著作个人代表作获奖情况
一、部分论文 1)王超,马建峰,“Design and Implementation of Survivable Network System”,LNCS 3645, Part II, 2005 2)王巍,马建峰,“Efficient Group Key Management for Dynamic Peer Networks”,LNCS 3794, 2005 3)曾勇,马建峰,“A Traffic Model of Intrusion Detection System and Its Applications”,LNAI 3802,2005 4)李兴华,马建峰,“On the security of Canetti-Krawczyk model”,LNAI 3802,2005 5)张帆,马建峰,“The Security proof of a 4-way handshake protocol in IEEE 802.11i”,LNAI 3802,2005 6)Zhang Yunkai, Wang Fangwei, Wang Changguang, Ma Jianfeng,“Worm Propagation Modeling and Analysis on Network”,LNAI 3802, 2005 7)张帆,马建峰,“Security Analysis on Chinese Wireless LAN Standard and Its Solution”,2005 International Workshop on Wireless and Sensor Networks (ICPP 2005) 8)赖晓龙,马建峰,“可证明安全的802.11i RSN认证方案”,计算机学报,2005,28(12) 9)郭渊博,马建峰,王亚弟. “一种高效的基于图的攻击结构的秘密共享方案”,计算机研究与发展. 2005, 42(5) 10)郭渊博,马建峰,“基于博弈论框架的自适应网络入侵检测与响应”,系统工程与电子技术,2005, 27(5) 11)郭渊博,马建峰,“一种安全的分布式会议密钥分配方案及其实现”,系统工程与电子技术, 2005, 27(3) 12)俞艳苹,郭渊博,马建峰,“基于自适应大数表决机制的容忍入侵模型”,系统工程与电子技术,2005, 27(6) 13)胡永洁,郭渊博,马建峰.“基于排序机制的全序广播算法分类与性能分析”,系统工程与电子技术, 2005, 27(1) 14)ZHU Jianming,MA Jianfeng. “Intrusion-Tolerant Based Survivable Model of Database System”. Chinese Journal of Electronics, 2005, 14(3) 15)GUO Yuanbo, MA Jianfeng. “A New and Efficient Secret Sharing in Graph-Based Prohibited Structures”. Chinese Journal of Electronics. 2005, 14(3) 16)GUO Yuanbo, MA Jianfeng. “Formal Specification of the Intrusion-Tolerant System by Using Object-Z”. Journal of Internet Technology, 2005 17)GUO Yuanbo, MA Jianfeng, WANG Yadi. “An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure”. International Conference on Computational Science 2005. Lecture Notes in Computer Science 3516, Springer-Verlag, Berlin, May 2005 18)GUO Yuanbo, MA Jianfeng. “An intrusion-tolerant authorization and authentication scheme in distributed environments”. ACM SIGOPS Operating Systems Review, 2004, 38(4) 19)GUO Yuanbo, MA Jianfeng, WANG Yadi. “Application of Cloud Models in Network Security Situation Assessment”. 6th International Symposium on Test and Measurement Technology. Dalian, China. June 1-4,2005 20)GUO Yuanbo, MA Jianfeng. “Secure and Intrusion-tolerant Authorization and Authentication in Distributed Environments”. The 38th Hawaii International Conference on System Sciences. Jan 2005. IEEE Press 21)李兴华,马建峰,“Security Extension for the Canetti-Krawczyk Model in Identity-based Systems”,中国科学(F辑),2005(1) 22)郭渊博,史庭俊,马建峰. 一种容忍入侵结构的Z规格说明. 系统仿真学报. 2004, 16(12) 23)Wang Liangmin, MA Jianfeng, Yongzhao Zhan, “Enhancing the content of the intrusion alerts using logic correlation”, Content Computing,Lecture Notes in Computer Science, LNCS 3309, Chi-Hung Chi, Kwok-Yan Lam (Eds.), Springer-Verlag Berlin Heidelberg 2004 24)Wang Chao and Ma Jianfeng, “Availability Analysis and Comparison of Different Intrusion-Tolerant Systems”, Content Computing,Lecture Notes in Computer Science, LNCS 3309, Chi-Hung Chi, Kwok-Yan Lam (Eds.), Springer-Verlag Berlin Heidelberg 2004 25)GUO Yuanbo, MA Jianfeng. “An Efficient Construction of Secret Sharing for Generalized Adversary Structure and Its Reduction”. Second International Conference on Communications, Circuits and Systems. Jun 17-29, 2004. IEEE Press 26)SHI Tingjun, MA Jianfeng. “A Fault-Tolerant and Secure Multi-Conference-Key Agreement Protocol”,International Conference on Communications, Circuits and Systems, (ICCCAS04),Jun 17-29,2004, IEEE Press 27)ZHU Jianming, Wang Ninghong, MA Jianfeng. “A micro-payment scheme for multiple-vendor in m-commerce”. IEEE International Conference on e-Commerce Technology for Dynamic E-Business, 2004.9, IEEE Press 28)ZHU Jianming, MA Jianfeng. “A New Authentcation Scheme with Anonymity for Wireless Environment”. IEEE Transactions on Consumer Electronics, 2004(2) 29)GUO Yuanbo, MA Jianfeng. “Secret Sharing Scheme Realizing Generalized Adversary Structure”. Journal of Computer Science and Technology, 2004(3) 30)GUO Yuanbo, MA Jianfeng. “An Efficient and Secure Fault-tolerant Conference-Key Distribution Protocol”. IEEE Transactions on Consumer Electronics,2004(3) 31)李兴华,马建峰,“基于身份密码系统下Canetti-Krawczyk 模型的安全扩展”,中国科学(E辑),2004(10) 32)李兴华,马建峰,“Mobile IPv6中建立IPSec的一种新方法”,通信学报,2004(5); 33)朱建明,马建峰,“一种高效的具有用户匿名的无线认证协议”,通信学报,2004(5) 34)郭渊博,马建峰,“异步及不可靠链路环境下的先应式秘密共享”.电子学报,2004(3) 35)郭渊博,马建峰. “分布式环境下一种实用的先应式秘密共享方法”. 系统工程与电子技术, 2004(6) 36)GUO Yuanbo, MA Jianfeng. “An Efficient and Robust Conference Key Distribution Protocol”. The 2003 International Conference on Computer Networks and Mobile Computing. Oct 2003. IEEE Press 37)ZENG Yong, MA Jianfeng. “Pseudorandom Number Generators Based on Evolutionary Algorithm”. IEEE Conference on Evolutionary Computation. Australia. Oct.2003 IEEE Press 38)Jian-Feng Ma等. “A New Group Signature Scheme and its Performance”. Chinese Journal of Electronics, No.3, 2001 39)Jian-Feng Ma等. “A Novel Collusion-Secure Fingerprinting Scheme for Digital Data Based on Linear Codes”. Journal of Software, No.3, 2002 40)Jian-Feng Ma等,”Efficient design of multiprocessor systems for fault detection and location”. IEE Electronics Letters, 1998.09. 41)Jian-Feng Ma等,”Decoding of the Golay Code”, IEE Electronics Letters, 1997.10 42)Jian-Feng Ma等,”Linear Codes with Pless Structures”, IEE Electronics Letters, 1997.12 43)Jian-Feng Ma等,”Trellis Structures of Block Codes and Their Decoding”, Journal of Electronics, No.2, 1997 44)Jian-Feng Ma等,”A novel concurrent error detection/correction scheme for FFT”,Journal of Electronics, 1997.10 45)马建峰等,“容错数字信号处理系统的设计:方法及实现”.计算机学报,1997.01 46)马建峰等,“FFT网络有效的并发错误检测、定位和纠错”.计算机学报,1997.10 47)马建峰等,“容错矩阵分解与线性方程组求解”.计算机学报,1998.08 48)马建峰等,“一类新的适用于算法容错的加权校验和编码方案”.电子学报,1997.10 49)马建峰等,“一类循环码的神经网络软判决译码”. 电子学报,1996.04 50)马建峰等,“两类新的线性分组码的译码”. 电子学报,1996.10 51)马建峰等,“Golay码的快速译码”.通信学报,No.4, 1996 52)马建峰等,“几类格的快速译码”,电子科学学刊,No.6, 1996 53)马建峰等,“一类三元线性分组码的译码”,通信学报,No.6, 1996 二、主要著作 1)马建峰,郭渊博,“计算机系统安全”.西安电子科技大学出版社,2005 2)马建峰,朱建明,“无线局域网安全-方法与技术”.机械工业出版社,2005 3)王新梅、张焕国、马建峰等,“计算机中的编码技术”.人民邮电出版社,1999.(全国高技术重点图书) 三、科研获奖 1)“分组码快速译码研究”,1997.12,电子工业部科技进步三等奖; 2)“情报侦察数据融合专家系统及开发工具研究”,2001.12, 国防科学技术委员会国防科学技术三等奖; 3)“计算机中的纠错码技术”,2001.12,国家新闻出版署第十界全国优秀科技图书三等奖; 4)“宽带无线IP网络系统安全技术”,中国通信学会科学技术成果二等奖,2005.12。 四、发明专利 1)宽带无线IP网络安全体系结构与安全实现方法(申请号:200410026211.9, 公开号:CN1585405A) 2)基于漫游密钥交换认证协议的无线局域网接入方法(申请号:200410025973.7, 公开号:CN1564626A) 3)宽带无线IP网络匿名连接方法(申请号:200410025972.2, 公开号:CN1564508A) 4)WAPI认证机制中的密钥协商方法(申请号:200510041822.5,公开号:CN1665183)
目前承担的科研项目及教学情况
1)2003.01-2005.12,“容忍入侵的入侵检测模型与检测方法研究”,国家自然科学基金重大研究计划项目 2)2003.01-2005.12,“自适应可生存网络安全体系结构研究”,教育部科学技术重点研究项目 3)2004.01-2005.12,“容忍入侵系统中的关键技术”,总装备部,武器装备预研基金 4)2005.07-2006.7,“宽带无线IP接入网络系统安全技术研究”,,华为基金 5)2005.09-2006.6,“Security analysis and design of ubiquitous network security systems”,西电—庆北大学合作项目(中韩合作项目) 6)2006.01-2006.12,“可证安全的多方安全协议的分析与设计”,国家自然科学基金
马建峰老师教学评价(0条)
沟通交流、共同成长。欢迎您参与评论留言!
马建峰留言请在下面的评论框中输入您想说的话:)
我要评论(500字以内)
提示:请登录后提交!登录 快速注册
更多>>同院系教师