當前位置:首頁 » 教授導師 » 武漢大學崔競松老師

武漢大學崔競松老師

發布時間: 2022-02-06 19:59:36

1. 王麗娜的論文著作

曾發表過計算機安全方面的論文60餘篇。出版專著《網路多媒體信息安全保密技術—方法與應用》。主編了《信息安全導論》、《信息系統的安全與保密》、《信息隱藏技術與應用》、《信息隱藏技術試驗教程》等7部教材。
主要發表的期刊論文:(截至2008年底)
1. 李松,王麗娜,余榮威,匡波,一種密鑰協商協議的自動化設計方法.武漢大學學報(理學版),2009.55(1):89-92
2. 張磊,王麗娜,王德軍. 一種網頁防篡改的系統模型. 武漢大學學報(理學版),2009.55(1):121-124
3. 余榮威,王麗娜,匡波.一種面向遠程證明的安全協議設計方法.通信學報,2008,29(10):19-24
4. 王麗娜,趙磊,郭遲,方喆君.一種基於信任理論的路由安全接入與選路模型.武漢大學學報(信息科學版),2008,33(10): 999-1002
5. 費如純,王麗娜,張煥國.門限視覺密碼方案的組構造方法.通信學報2008,29(10):82-87
6. 熊琦,王麗娜,劉陶,余榮威.面向容侵系統可生存性量化的隨機博弈模型研究.小型微型計算機系統,2008,29(10):1794-1798
7. 郝彥軍,王麗娜,張煥國.基於結構碼的安全數字水印方案,武漢大學學報(信息科學版),2008,33(10):1070-1072
8. 王麗娜,岳雲濤,劉力,王德軍,Oracle資料庫備份軟體設計與實現.武漢大學學報(理學版),2008,54(1):60-64
9. 王德軍,王麗娜,郝永芳, 裸機備份與恢復技術研究,計算機應用研究,2008,25(12):3735-3738
10. Jingsong Cui ,Lina Wang ,Rong Peng. A new approach to anti-piracy. Dynamics Of Continuous Discrete And Impulsive Systems-Series B-Applications & Algorithms,2006,13:964-966
11. Wang Lina , Guo chi. Building Hot Snapshot Copy based on Windows File System. Wuhan University Journal of Natural Sciences,2006,11(6):1503-1506
12. Wang Dejun, Wang Lina. Efficient multi-resolution compression algorithm for disk-based backup and recovery. Wuhan University Journal of Natural Sciences,2006,11(6):1609-1613
13. 熊琦,王麗娜,基於磁碟和SAN的網路數據備份模型,計算機工程,2006,33(4):233~235
14. 彭文靈,王麗娜,基於角色訪問控制的入侵容忍機制研究, 電子學報,2005,33(1):91~95
15. 李莉,薛銳,張煥國,馮登國,王麗娜,基於口令認證的密鑰交換協議的安全性分析. 電子學報, 2005,33(1): 166~171
16. Wenling Peng,Lina Wang,Huanguo Zhang,Wei Chen. Building Intrusion Tolerant Software System. Wuhan University Journal of Natural Sciences,2005,10(1):47-50
17. Min Yang,Lina Wang,Huanguo Zhang,Wei Chen. Masquerade detection using support vector machine. Wuhan University Journal of Natural Sciences,2005,10(1):103-106
18. Yichun Liu,Lina Wang,Huanguo Zhang. Atomic electronic contract protocol based on convertible signature. Wuhan University Journal of Natural Sciences,2005,10(1):227-230
19. Ruchun Fei,Lina Wang. Threshold decryption scheme with multiple policies. Wuhan University Journal of Natural Sciences,2005,10(1):243-247
20. Jianhui Xuan,Lina Wang,Huanguo Zhang,. Wavelet-based denoising attack on image watermarking. Wuhan University Journal of Natural Sciences,2005,10(1):279-283
21. Guoqing Tu,Huanguo Zhang,Lina Wang,Dandan Yu. Analysis and application for integrity model on trusted platform. Wuhan University Journal of Natural Sciences,2005,10(1):35-38
22. 彭文靈,張煥國,王麗娜. 基於隨機過程的容侵系統可信性量化方法的研究. 計算機工程,2005,31(21)
23. 彭文靈,王麗娜,張煥國. 基於有限自動機的網路入侵容忍系統研究. 小型微型計算機系統,2005,26(8):1296~1300
24. 李曉麗,王麗娜. 網路中的計算機病毒傳播模型. 計算機工程,2005,31(18):153-155
25. 彭文靈,王麗娜,張煥國. 基於隨機過程的容侵系統可信性量化方法. 計算機工程,2005,31(22):7-8,35
26. 劉義春,王麗娜,張煥國. 用於P2P交易的離線電子代幣系統. 計算機工程,2005,31(16):9-10,13
27. 王德軍,王麗娜. 容災系統研究. 計算機工程,2005,31(6): 43~45
28. Li Li, Zhang Huanguo and Wang Lina. An improved non-repudiation protocol and its security analysis. Wuhan University Journal of Natural Science,2004,9(3)
29. 崔競松,王麗娜,張煥國,傅建明,一種並行容侵系統研究模型—RC模型, 計算機學報,2004,27(4):500~506
30. 王麗娜,費如純,董曉梅,等級系統中的訪問控制方案研究,電子學報,2003,31(2):146~149
31. 費如純,王麗娜, 基於RSA和單向Hash函數防欺詐的(t,n)秘密共享體制,軟體學報,2003,14(1),146~150
32. 羅敏,王麗娜,張煥國,基於無監督聚類的入侵檢測方法,電子學報,2003,31(11),1713~1716
33. 費如純,王麗娜,於戈, 基於離散對數和二次剩餘的門限數字簽名體制, 通信學報,2002,23(5),65~69
主要發表的會議論文:(截至2008年底)
1. Chi Guo , Lei Zhao , Li-na Wang , Zhe-jun Fang.A Secure Network Admission and Routing Model Based on Trust Theory.Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS 2008),Zhangjiajie,pp.2216-2221,2008.11
2. Chi Guo , Li-na Wang , Fu-rong Zhou , Lai-nv Huang, Zhen Peng. Analysis on the 『Robust yet fragile' nature of Internet: Load, Capacity and the Cascading failure Avalanche Effect. Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS 2008),Zhangjiajie,pp.2149-2153,2008.11
3. Chi Guo, Lina Wang, Lai-nv Huang,Lei Zhao. Study on the Internet Behavior』s Activity Oriented to Network Survivability. Proceedings of the 2008 International Conference on Computational Intelligence and Security(CIS 2008),Suzhou,Vol.1,pp.432-435,2008.12
4. Mo Yang,Lina Wang,Yuandong Lei. Research on Evaluation of Trust Model. Proceedings of the 2008 International Conference on Computational Intelligence and Security(CIS 2008),Suzhou,Vol.1,pp.345-349,2008.12
5. Donghui Hu, Lina Wang, Xiaqiu Jiang. Detecting the MB1 with Higher-Order Statistics. Proceedings of the 2008 International Conference on Computational Intelligence and Security Workshop(CISW 2008),Suzhou,Vol.2,pp.330-333,2008.12
6. Dejun Wang, Lina Wang, Jingbo Song. SEDBRS:A Secure and Efficient Desktop Backup and Recovery System. Proceedings of the 1st International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007),pp.304-309,Cheng, 2007.11
7. 王麗娜,宋靜波,郭遲,王德軍. 一種基於演算法優化的桌面數據備份系統. 第五屆中國信息安全和通信安全學術會議(CCICS'07),長沙,2007.8
8. Yanjun Hao,Huanguo Zhang,Lina Wang. Secure spread-spectrum watermark detection based on extended TPM. Proceedings of the 1st International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007),Cheng, 2007.11
9. Lina Wang, Jingli Guo, Min Luo. A More Efficient Voting Scheme based on Blind Signature. Proceedings of the 2006 International Conference on Computational Intelligence and Security(CIS-2006),Guangzhou,2006.11
10. Guojun Peng,Huanguo Zhang,lina Wang. An Improved Worm Preventive System Based on Generic Exploit Blocking. 1st SKLOIS Conference on Information Security and Cryptology(CICS2005),Beijing,2005.12
11. PENG Wenling, ZHANG Huanguo, WANG Lina, CHEN Wei. Building Distributed Intrusion Tolerant Software System for High Performance Grid Computing. In Proceedings of the International Conference on High Performance Computing and Application (HPCA2004). LNCSE 2005:409~413, Shanghai China, 2004
12. CUI Jing-song, PENG Rong,Wang Lina. The Optimized Key Distribution Scheme In Threshold RSA. Proceedings of the Third International Conference on Information Secueiry/Infosecu』04,2004
13. Fei Yan, Huanguo Zhang, Lina Wang, Min Ya. An improved intrusion detection model based on paraconsistent logic. Proceedings of SPIE - The International Society for Optical EngineeringThe International Society for Optical Engineering, 2005
14. Jianhui Xuan,Huanguo Zhang,Lina Wang. Rotation, scaling and translation invariant image watermarking based on Radon transform. Proceedings of SPIE - The International Society for Optical EngineeringThe International Society for Optical Engineering, 2005
15. Li Li, Wang Lina and Zhang Huanguo. Attacks on Non-Repudiation Cryptographic Protocol and Its Improvement,Proceeding of 2003 International Workshop on Cryptology and Network Security,Miami,USA,2003
主要著作:(截至2008年底)
1. 王麗娜,網路多媒體信息安全保密技術方法與應用,武漢大學出版社,2003
2. 劉玉珍,王麗娜,傅建明譯,密碼學與網路安全,電子工業出版社,2003
3. 王麗娜,張煥國,信息隱藏技術與應用,武漢大學出版社,2003
4. 王麗娜,郭遲,李鵬,信息隱藏技術實驗教程,武漢大學出版社,2003
5. 王麗娜,信息安全綜合實驗教程. 武漢大學出版社,2005
6. 王麗娜等,信息安全導論, 武漢大學出版社,2008

熱點內容
四川農業大學申請考核博士 發布:2025-10-20 08:58:11 瀏覽:981
福田雷沃重工本科生待遇怎麼樣 發布:2025-10-20 08:53:49 瀏覽:575
華為要本科生嗎 發布:2025-10-20 08:25:41 瀏覽:550
2008年青島本科生工資 發布:2025-10-20 08:04:24 瀏覽:444
東北大學藝術考研 發布:2025-10-20 07:38:35 瀏覽:299
我的大學生活txt 發布:2025-10-20 07:35:28 瀏覽:25
人民大學外語系考研 發布:2025-10-20 07:31:12 瀏覽:894
上海交通大學考研輔導班 發布:2025-10-20 07:24:54 瀏覽:420
華中農業大學細胞生物學考研群 發布:2025-10-20 07:09:36 瀏覽:558
南京大學2016考研線 發布:2025-10-20 06:43:12 瀏覽:930