求真百科歡迎當事人提供第一手真實資料,洗刷冤屈,終結網路霸凌。

伍瑋檢視原始碼討論檢視歷史

事實揭露 揭密真相
前往: 導覽搜尋

伍瑋,女,回族,2011年獲得澳大利亞臥龍崗大學博士學位(密碼學專業),福建師範大學數學與信息學院副教授,「2009年國家優秀自費留學生獎學金」獲得者。研究興趣為密碼學,在《Journal of Computer and System Sciences》、《The Computer Journal》、《Computers & Mathematics with Applications》、《電子學報》等國內外學術期刊與ACISP、WISA、Provsec等國際學術會議上發表學術論文50多篇,主持國家自然科學基金項目2項。

科研項目

1. 國家自然科學基金面上項目「面向電子病歷的可修訂數字簽名研究」,62萬,2019.01-2022.12,主持;

2. 國家自然科學基金青年基金「兩類隱私保護密碼方案的研究與應用」,26萬,2015.01-2017.12,主持。

學術成果

論文

1. Wei Wu (伍瑋)*, Chen-Li Huang, Shiuan-Tung Chen, Hung-Min Sun. 「An Integration System of communication App on Image Recognition」. Journal of Internet Technology 19(2): 555-564, 2018. (SCI)

2. Yuexin Zhang, Yang Xiang, Tao Wang, Wei Wu (伍瑋)*, and Jian Shen. 「An Over-the-Air Key Establishment Protocol Using Keyless Cryptography」. Future Generation Computer Systems 79(1): 284-294, 2018. (SCI)

3. Yuexin Zhang, Yang Xiang, Wei Wu (伍瑋)*, and Abdulhameed Alelaiwi. A Variant of Password Authenticated Key Exchange Protocol . Future Generation Computer Systems 78 (2): 699-711, 2018. (SCI)

4. Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu (伍瑋)*, Ru Meng. A universal designated multi-verifier transitive signature scheme. Inscrypt 2017, LNCS 10726, pp. 180-195, 2018. (EI會議)

5. Fei Zhu, Xiaoling Tao, Chao Lin, and Wei Wu (伍瑋)*. A Proxy Transitive Signature Scheme. Journal of Internet Technology. 19(4):1273-1284, 2018. (SCI)

6. 李洋, 劉江華, 伍瑋*. 支持豐富訪問控制策略的群組協作密文策略屬性基加密. 網絡與信息安全學報, 2017, 3(05):54-61.

7. 王敏, 馬金花, 劉江華, 伍瑋*. 兩類可截取簽名方案的改進. 網絡與信息安全學報, 2017, 3(4):69-77.

8. 馬金花, 劉江華, 伍瑋*, 黃欣沂. 可修訂數字簽名研究綜述. 計算機研究與發展, 2017, 54(10):2144-2152.

9. Jinhua Ma, Jianghua Liu, Min Wang, Wei Wu (伍瑋)*. An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control. International Conference on Green, Pervasive, and Cloud Computing. Springer, Cham, 2017: 38-52. (EI會議)

10. Wei Wu (伍瑋), Jaime Alvarez, Chengcheng Liu, and Hung‑Min Sun*. 「Bot detection using unsupervised machine learning」. Microsystem Technologies 2016: 1-9. (SCI)

11. Chao Lin, Fei Zhu, Wei Wu (伍瑋)*, Kaitai Liang, Kim-Kwang Raymond Choo. 「A New Transitive Signature Scheme」. Lecture Notes in Computer Science, 9955. NSS 2016: 156-167. (EI)

12. Tingting Wang, Man Ho Au, Wei Wu (伍瑋)*. 「An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords」. Lecture Notes in Computer Science, 9955. NSS 2016: 251-265. (EI)

13. Chao Lin, Wei Wu (伍瑋)*, Xinyi Huang, Li Xu. 「A New Universal Designated Verifier Transitive Signature Scheme for Big Graph Data」. Journal of Computer and System Sciences 83(1): 73-83, 2017. (SCI, EI)

14. Debiao He, Sherali Zeadally, Neeraj Kumar, and Wei Wu (伍瑋)*. 「Efficient and Anonymous Mobile User Authentication Protocol Using Self-certified Public Key Cryptography for Multi-server Architectures」. IEEE Transactions on Information Forensics and Security 11(9): 2052-2064, 2016. (SCI, EI)

15. Zhen Li, Wei Wu (伍瑋)*. 「Reversible Data Hiding for Encrypted Images Based on Statistical Learning」. Lecture Notes in Computer Science, 9722. ACISP (1) 2016: 198-212. (EI)

16. Wei Wu (伍瑋), Shun Hu, Xu Yang, Joseph K. Liu and Man Ho Au. 「Towards Secure and Cost-Effective fuzzy Access Control in Mobile Cloud Computing」. Soft Computing. 21(10):2643-2649, 2017.

17. Xu Yang, Wei Wu (伍瑋)*, Joseph K. Liu, Xiaofeng Chen. 「Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach」. Lecture Notes in Computer Science, 9451. ProvSec 2015: 215-226. (EI)

18. Wei Wu (伍瑋), Yi Mu, Willy Susilo, Xinyi Huang, and Li Xu. 「An Efficient Construction of Convertible Undeniable Proxy Signatures」. Journal of Internet Technology 15(3): 471-484, 2014. (SCI)

19. Wei Wu (伍瑋), Jianying Zhou, Yang Xiang, and Li Xu. 「How to Achieve Non-Repudiation of Origin with Privacy Protection in Cloud Computing」. Journal of Computer and System Sciences 79(8): 1200-1213, 2013. (SCI, EI)

20. Wei Wu (伍瑋), Yi Mu, Willy Susilo, Xinyi Huang, and Li Xu. 「A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption」. The Computer Journal 55(10): 1157-1168, 2012. (SCI, EI)[1]

參考資料