当前位置: X-MOL首页全球导师 国内导师 › 李晖

个人简介

个人简介 李晖,博士生导师,现任西安电子科技大学网络与信息安全学院执行院长。1990年获得复旦大学无线电电子学理学学士学位,1993年和1998年分别获得西安电子科技大学通信与电子系统工学硕士和工学博士学位,2009年在加拿大滑铁卢大学进行为期6个月的访问研究。 国家重点研发计划项目负责人,主持863计划、国家科技支撑计划、新一代宽带移动通信国家重大专项、国家自然科学基金重点与面上项目、国防预研等项目15项,移动互联网安全陕西省创新团队负责人,获得国家级教学成果二等奖2项,陕西省教学成果特等奖1项,二等奖4项,陕西省优秀教材奖1项;省部级科技进步奖一等奖2项,二等奖3项,三等奖1项,2003年获得陕西省青年科技奖,2010年获陕西省教学名师奖,2017年获中央网信办网络安全优秀教师奖,2018年入选陕西省特支计划教学名师项目。获发明专利授权20余项,申请发明专利20项。论文170余篇。 团队新闻 1.11.1-11.3成功举办中国密码学会2019年会 科学研究 目前研究团队承担的科研项目: 网络信息安全方向: 面向社交媒体大数据隐私保护和安全共享的隐私计算理论与技术研究,国家自然科学基金重点项目,2020.1-2024.12,61932015 安全电子凭据服务及其监管关键技术,国家重点研发计划,2017.7-2020.12,2017YFB0802700 互联网环境下隐私保护与取证,国家重点研发计划,2017.7-2020.12,2017YFB0802201 海量多源异构数据的使用授权与鉴权体系研究,国家自然科学基金重点类项目,2019.1-2022.12,U1836203 移动互联网安全陕西省创新团队,2018.6.30-2021.6.30,2018TD-007 泛在网安全搜索基础理论与技术,国家自然科学基金重点项目,2018.01-2022.12,61732022 移动互联网服务及隐私保护的理论与关键技术研究,广东省联合基金项目,2015.1-2018.12,U1401251 云计算环境下群组数据共享的隐私保护研究,国家自然科学基金面上项目,2013.1-2016,61272457 移动感知服务中的隐私保护关键技术研究,陕西省自然科学基础研究计划重大基础研究项目,2016.1-2018.12,2016ZDJC-04 可信路径与跨域认证技术,863计划,2012-2014,2012AA013102 信息论与编码方向: 1.高移动性宽带无线通信网络重点理论基础研究,973计划项目,2012-2016,2012CB316100 已完成的项目: 面向IMT-Advanced协作中继的网络编码技术,新一代移动通信重大专项,2011-2012 网络编码的安全问题研究,博士点基金项目,2011-2013 宽带移动网络安全体系结构及关键技术,新一代移动通信国家重大科技专项, 云计算中数据安全理论与关键技术,中央高校基本科研业务费重点项目,2012-2014 基于云计算的网络安全技术,新一代移动通信重大专项,2012-2013 移动互联网流量端到端管理和优化,新一代移动通信重大专项,2012-2013 社区电子服务系统安全支撑体系,国家科技支撑计划项目 移动自组织网络分布式PKI关键技术研究,国家自然科学基金面上项目 公众移动网络P2P安全技术,科技部863探索导向类项目 网络安全管理与监控系统,广东省教育部联合项目 XML安全认证协议研究,国家自然科学基金面上项目 密码算法和安全协议自动化检测工具开发及测评系统构建,863目标导向类项目 可信移动互联网络关键理论与应用研究,国家自然科学基金重点项目 Turbo码实用编译码算法研究,国家自然科学基金项目 重要会议列表 会议名称主办方举办时间一般截稿时间举办地 IEEES&PIEEE5月11月SanJose安全四大会Big4 ACMCCSACM10月2016/3/16 UsenixSecurityUSENIX8月2016/2/18 NDSSInternetSociety2月 CryptoIACR8月14-182016/2/9santabarbara三大密码会 Eurocrypt5月8-1210月 Asiacrypt12月4-8河内 INFOCOMIEEEComSoc4月7月网络 ESORICS9月欧洲计算机安全会议 TCCIACR1月,12月特拉维夫/北京密码学会议 FSEIACR3月快速软件加密 CHESIACR8月17-192016/3/4santabarbara硬件和嵌入式系统 ICCIEEEComSoc5月23-17吉隆坡通信旗舰会议 GLOBECOMIEEEComSoc12月2016/3/15华盛顿通信旗舰会议 CNSIEEEComSoc10月17-192016/4/20费城通信和网络安全 ASIACCSACM5月11月西安 MOBICOMACM10月3-72016/3/8NewYork移动计算和网络 SIGCOMMACM8月22-162016/1/22巴西Salvador计算机通信 WISECACM7月18-202016/2/26德国Darmstadt无线通信安全 ISITIEEE7月11-152016/1/24巴塞罗那信息论旗舰会议 科教团队 团队教师 密码理论、隐私保护方向:李凤华研究员 密码理论、无线网络安全、网络与系统安全方向: 陈晓峰教授、裴庆祺教授、吕锡香教授、朱辉教授、樊凯教授、李学俊副教授、张跃宇副教授、傅晓彤副教授、张宁副教授、党岚君副教授、谭示崇副教授、李小青副教授、赵兴文副教授、付玉龙副教授、刘樵博士 无线通信与信息论方向: 王子龙教授、王勇副教授 在读博士研究生 李秀广、孟佳洁、谢绒娜、张文静、尹钰、郑献春、李效光、姚瑞欣、罗玙榕、郑戈威、阎浩楠、张剑 李佳旻、何诗洋(导师为李凤华教授) 已毕业博士研究生 周业军:航天5院501所 孙银霞:南京师范大学计算机学院 吕超:兴唐股份 苏志图:福建省公安厅 孙春辉:公安部上海消防所 刘辉:公安部 李小青:西安电子科技大学副教授 张应辉:西安邮电大学副教授 孙玉花:中国石油大学 王博洋:美国辛辛那提大学助理教授 赖成喆:西安邮电大学副教授 李战虎:咸阳师范学院 曹进:西安电子科技大学,副教授 牛犇:中国科学院信息工程研究所,副研究员 孙文海:美国普渡大学,助理教授 李晨:西安电子科技大学,师资博士后 向新银:西安财经学院 刘樵:西安电子科技大学,师资博士后 洪银芳:桂林 郭祯:海南大学 fawadkhan,departmentofinformationsecurity,nationaluniversityofscienceandtechnology,Pakistan 韩琪:205所 李子:华为 单芳芳:中原工学院 李维皓:CEC6所 马东旭:加拿大 丁晟:华为 硕士研究生 2001级:叶平丰赵兴文王珊珊李菲 2002级:邹娟裴智强曹玥李林王丹卉韩贞 2003级:于明喆和力吴蔚李晓媛张武军申婷朱一欣马进忤小墩 2004级:宋亚琼顾洁鱼雷陈娟咸娟罗楠叶飞阎琪徐颖 2005级:邹佩琳苏志图杨天骄周亮谷裕钟文国王伟魏元首王宁娟徐明 2006级:祖玲玲王诚祁小波张蔚刘博游前程孙春辉 2007级:尹钰王彦平代宜君于静王博洋付晓红宋芹芹申肖肖牛犇曹巍 2008级:芦文峰孔德智石玲玲莫灿赵黎斌邱婷婷王怀勇曹进赖成喆王宏王大中李瑞民崔琳 2009级:梁晨李扬吴昊王康张朕源陈曦李杰薛尚武胡逸陈旭红王亚飞杨洁 2010级:潘文海张泽钥郭爱香何红艾云杨柳高文龙解岳峰刘北水王志强 2011级:张文静陈思羽康思李帅郭利君曾栋朱乐翔刘樵白晨刘梦溪 2012级:折宇超李义杰王莹娟刘航朱晓阳方魏张可人 2013级:赵高飞尤博闫文婷张少志王晨沣冯玮钰 2014级:毛小乐、王浩、林佳萍、张亮轩、焦兰兰、李代琛、吴良俊、刘子骜 2015级:潘媛刘栋龚柏瀚姚瑞欣石素丽宋和春汪涛和吴宝锐 2016级:罗玙榕李佳旻路世翠郝晓娜徐国玮 2017级:王灿豆敏娟张宇阳张秀娟 2018级:闫皓楠萧明炽刘阳王硕戴睿丁潇付溪关键 2019级:赵姝畅李高明饶嵩王瑞张铭拜晓蒙谢雨航 课程教学 目前本人承担的教学任务: 网络空间安全导论 概率论与数理统计 信息安全专业教育 信息论基础 团队承担的教学任务: 现代密码学 计算机网络安全 计算机导论与C语言 无线网络安全 获奖 科研获奖 业务数据全流程受控共享的关键技术及应用,中国通信学会科学技术奖(技术发明)一等奖,2018,李凤华、李晖、史国振、朱辉、耿魁、谢绒娜、付铨、曹进、张玲翠 复杂网络环境下服务安全提供方法,中国通信学会科学技术奖(技术发明)一等奖,2014,李凤华、马建峰、李晖、李兴华、朱辉、耿魁 异构无线网络安全技术及应用,陕西省科学技术奖一等奖,2009年,马建峰、郑志彬、吴昊、黄迎新、李晖、沈玉龙、裴庆祺、杨力、杨超、李兴华、马卓。 密码新型算法的设计、安全性分析与应用,2007.9,陕西省科学技术奖二等奖,胡予濮、马建峰、李晖、王保仓等 电子交易密码应用技术体系框架,2010,密码科技进步奖二等,排名第5,2010-MJ-20-05 密码算法和安全协议自动化监测工具开发和测评系统,2012,中共中央办公厅科学技术进步奖,第四完成人,2011-KJ-09-04 300路载波话上数传设备研制,1997.,电子工业部科技进步二等奖,排名第4。 分组码快速译码研究,1997,电子工业部科技进步三等奖,排名第2。 2003年,陕西省青年科技奖 教学获奖 2009,信息安全高层次创新人才培养体系研究与实践,国家教学成果二等奖,排名第1 2014,军地联合创建国防生“卓越计划”培养模式的探索与实践,国家教学成果二等奖,排名第10 2010,陕西省教学名师奖 2013,依托学科优势,构建培养通信类学生工程实践能力和创新能力的实践教育体系,陕西省教学成果二等奖,排名2 2012,电子信息类专业课程体系改革及教材建设的探索与实践,陕西省教学成果二等奖,排名3 2012,注重能力培养,创新校企合作-通信工程国家第二类特色专业工程教育探索,陕西省教学成果二等奖,排名3 授权专利 李晖,申婷,跨安全域的网络认证和密钥分配方法,ZL200610041652.5 李晖,孙银霞,朱辉,证书公钥系统与身份公钥系统之间的认证加密方法,ZL200910023167.9 吕锡香,李晖,基于身份的认证群组密钥管理方法,ZL200810232657.5 朱辉;李晖;尹钰;刘欢;段海生,网络设备统一配置系统及其配置方法,ZL200910023078.4 李晖;代宜君;刘建伟;宫晓妍,16APSK编码调制中软判决信息获取方法,ZL200910022726.4 吕锡香,李晖,张卫东,移动自组织网络的自认证公钥生成及验证方法,ZL200910219109.3 朱辉;李晖;张卫东;尹钰,通用网络安全管理系统及其管理方法,ZL200910023082.0 李凤华;马建峰;李晖;王九林;孙春辉;阎军智;史国振;马卓,支持线程级加解密的密码处理器及其密码运算操作方法,200810232656.0 吕锡香;李晖;张卫东,基于自认证公钥的两方密钥协商方法,ZL200910219108.9 李晖,于静,张跃宇,基于路径优化查找的P2P网络安全信任管理系统。ZL200910219103.6,(公告日2012.7.25) 李晖,朱辉,尹钰,王彦平,莫灿,基于模式匹配方式的网络数据流识别方法,ZL201010013628.7,(公告日2012.8.8) 李晖,周业军,马建峰,防窃听和防污染的网络编码方法ZL200810018104.X。 李晖、付晓红、吕锡香,基于中国剩余定理的群组密钥管理方法。ZL201010107171.6 李晖,王博洋,曹进,基于概率检测的抗污染网络编码方法。ZL200910219105.5 李学俊、李晖、申肖肖,分代分组交叉随机线性网络编码方法。ZL201010107173.5 李晖;吕锡香;李志;郑欢欢,基于Android系统的多机蓝牙群通信方法。CN201110140972 李晖;赖成喆;张跃宇;曹进;基于群组的机器类型通信设备的认证方法。CN201110057736 樊凯;李晖;吴昊;张大洋,基于HDFS分布式文件系统的数据冗余及文件操作方法。CN201110340417 王勇;李晖;张跃宇;朱辉;李小青;张卫东;王子龙;李学俊;党岚君;吕锡香;樊凯;李凤华;基于信号空间对齐的共信道多用户干扰抑制方法,CN201110066539 党岚君;李晖;许捷,移动IP注册时实现移动节点身份匿名性的方法,CN201110002035 招生要求 关于研究生招生的信息: 2020年硕士招生:计划招收学术型硕士3名,专业学位硕士2名。欢迎2016级学生联系面试推荐和优研计划。 要求: 1.接收本科专业为信息安全、通信与电子信息类专业、计算机科学与技术、软件工程、应用数学、信息与计算科学的学生 2.有较好的数学基础,特别是线性代数、概率论,随机过程或者离散数学、组合数学、代数等方面基础较好的学生 3.有较强的计算机语言编程能力或者有硬件、嵌入式系统设计经历的学生 4.英语6级成绩不低于425或者四级成绩不低于500分 5.能吃苦,抗压力强,积极肯干,团队意识强 2020年博士招生:计划招收网络空间安全博士研究生2名。 要求: 1.有志于学术研究 2.数学基础好 3.因国际学术交流频繁,要求英语阅读、写作水平较好,有一定的听、说交流能力 4.学风严谨,诚信

研究领域

主要的研究方向是密码信息安全、信息论与编码理论。

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

2018 KFan,JWang,XWang,HLi,YYang,Secure,efficientandrevocabledatasharingschemeforvehicularfogs,Peer-to-PeerNetworkingandApplications11(4),766-777,2018 KFan,WWang,WJiang,HLi,YYang,Secureultra-lightweightRFIDmutualauthenticationprotocolbasedontransparentcomputingforIoV,Peer-to-PeerNetworkingandApplications11(4),723-734,2018 QHan,CLi,HLi,Efficientandrobustattribute-basedencryptionsupportingaccesspolicyhidinginInternetofThings,FutureGenerationComputerSystems83,269-277,2018 SDing,CLi,HLi,ANovelEfficientPairing-freeCP-ABEBasedonEllipticCurveCryptographyforIoT,IEEEAccess,2018 KFan,XWang,KSuto,HLi,YYang,SecureandEfficientPrivacy-PreservingCiphertextRetrievalinConnectedVehicularCloudComputing,IEEENetwork32(3),52-57,2018 KFan,WJiang,HLi,YYang,LightweightRFIDProtocolforMedicalPrivacyProtectioninIoT,IEEETransactionsonIndustrialInformatics14(4),1656-1665,2018 XLiu,HZhu,RLu,HLi,Efficientprivacy-preservingonlinemedicalprimarydiagnosisschemeonnaivebayesianclassification,Peer-to-PeerNetworkingandApplications11(2),334-347,2018 FShan,HLi,FLi,YGuo,BNiu,HAC:HybridAccessControlforOnlineSocialNetworks,SecurityandCommunicationNetworks2018 2015 KaiFan,DengHai,LangWang,HuiLi,YinyangYang,Ciphertextretrievalinsuper-peerp2pnetwork,GLOBECOM2015 BoyangWang,MingLi,HaitaoWang,HuiLI,CircularRangeSearchonEncryptedSpatialData,IEEECNS2015 JinCao;HuiLi;MaodeMa,GAHAP:AGroup-basedAnonymityHandoverAuthenticationProtocolforMTCinLTE-ANetworks,ICC2015 JinCao;HuiLi;MaodeMa;FenghuaLi,UGHA:UniformGroup-basedHandoverAuthenticationforMTCwithinE-UTRANinLTE-ANetworks,ICC2015 ShunrongJiang;XiaoyanZhu;RipeiHao;HaotianChi;HuiLi;LiangminWangLightweightandPrivacy-PreservingAgentDataTransmissionforMobileHealthcare,ICC2015 WeihaoLi;BenNiu;HuiLi;FenghuaLi,Privacy-PreservingStrategiesinServiceQualityAwareLocation-BasedServices,ICC2015 WenhaiSun,XuefengLiu;WenjingLou,ThomasHou,HuiLi,CatchYouIfYouLietoMe:EfficientVerifiableConjunctiveKeywordSearchoverLargeDynamicEncryptedCloudData,IEEEINFOCOM2015 BenNiu;QinghuaLi;XiaoyanZhu;GuohongCao;HuiLi,EnhancingPrivacythroughCachinginLocation-BasedServices,IEEEINFOCOM2015 Niu,Ben;Zhu,Xiaoyan;Li,Weihao;Li,Hui;Wang,Yingjuan;Lu,ZongqingApersonalizedtwo-tiercloakingschemeforprivacy-awarelocation-basedservices,ICNC2015,p94-98,March26,2015 2014 1.BoyangWang,YantianHou,MingLi,HaitaoWang,HuiLi,Maple:scalablemulti-dimensionalrangesearchoverencryptedclouddatawithtree-basedindex,ASIACCS'14,Tokoyo,Japan 2.BoyangWang;MingLi;ShermanS.M.Chow;HuiLi,ATaleofTwoServers:EfficientPrivacy-PreservingComputationoverCloudDataunderMultipleKeys,2thIEEEConferenceonCommunicationsandNetworkSecurity,2014.10,SanFransico,USA 3.BoyangWang,YantianHou,MingLi,HaitaoWang,HuiLiandFenghuaLi.Tree-basedMulti-DimensionalRangeSearchonEncryptedDatawithEnhancedPrivacy,10thInternationalConferenceonSecurityandPrivacyinCommunicationNetworks,Beijing,China 4.Niu,Ben;Zhu,Xiaoyan;Weihao,Li,Li,Hui,EPcloak:AnEfficientandPrivacy-PreservingSpatialCloakingSchemeforLBSs,IEEEMASS2014,Philadelphia,USA,2014.10 5.Niu,Ben;Li,Qinghua;Zhu,Xiaoyan;Li,Hui,Afine-grainedspatialcloakingschemeforprivacy-awareusersinLocation-BasedServices,ICCCN,September25,2014,Shanghai,China 6.Zhu,Hui;Huang,Rong;Liu,Ximeng;Li,Hui,SPEMR:Anewsecurepersonalelectronicmedicalrecordschemewithprivilegeseparation,2014IEEEInternationalConferenceonCommunicationsWorkshops,ICC2014,p700-705,2014, 7.Zhu,Xiaoyan;Chi,Haotian;Jiang,Shunrong;Lei,Xiaosan;Li,Hui,Usingdynamicpseudo-IDstoprotectprivacyinlocation-basedservices,2014IEEEInternationalConferenceonCommunications,ICC2014,p2307-2312,2014, 8.Zhu,Hui;Huang,Cheng;Li,Hui,MPPM:MalwarepropagationandpreventionmodelinonlineSNS,2014IEEEInternationalConferenceonCommunicationsWorkshops,ICC2014,Sydney,NSW,Australia 9.Zhu,Xiaoyan;Liu,Jie;Jiang,Shunrong;Chen,Zengbao;Li,Hui,EfficientWeight-basedPrivateMatchingforproximity-basedmobilesocialnetworks,2014IEEEInternationalConferenceonCommunications,ICC2014,Sydney,NSW,Australia,2014 10.Lai,Chengzhe;Li,Hui;Lu,Rongxing;Jiang,Rong;Shen,Xuemin,SEGR:Asecureandefficientgrouproamingschemeformachinetomachinecommunicationsbetween3GPPandWiMAXnetworks,2014IEEEInternationalConferenceonCommunications,ICC2014,p1011-1016,2014 11.NiuB,ZhangZ,LiXandLiH,Privacy-AreaAwareDummyGenerationAlgorithmsforLocation-BasedServices,inProc.ofIEEEICC2014 12.SunW,YuS,LouW,HouTY,andLiH,ProtectingYourRight:Attribute-basedKeywordSearchwithFine-grainedOwner-enforcedSearchAuthorizationintheCloud,inProc.ofIEEEINFOCOM2014 13.NiuB,LiQ,ZhuX,CaoGandLiH,Achievingk-anonymityinPrivacy-AwareLocation-BasedServices,inProc.ofIEEEINFOCOM2014,Toronto,Canada 14.Zhang,Yinghui;Zheng,Dong;Chen,Xiaofeng;Li,Jin;Li,Hui,Computationallyefficientciphertext-policyattribute-basedencryptionwithconstant-sizeciphertexts,LectureNotesinComputerScience,v8782,p259-273,2014 2013 1.NiuB,ZhuX,LeiX,ZhangW,andLiH,EPS:Encounter-BasedPrivacy-PreservingSchemeforLocation-BasedServices,inProc.ofIEEEGLOBECOM2013 2.NiuB,ZhuX,LiuJ,LiZ,andLiH,Weight-awarePrivateMatchingSchemeforProximity-BasedMobileSocialNetworks,"inProc.ofIEEEGLOBECOM2013 3.ZhuX,ChiH,NiuB,ZhangW,LiZ,andLiH,Mobicache:Whenk-anonymitymeetscache,inProc.ofIEEEGLOBECOM2013 4.NiuB,ZhuX,ZhangT,ChiH,andLiH,P-match:Priority-awareFriendDiscoveryforProximity-BasedMobileSocialNetworks,inProc.ofIEEEMASS,pp.351-355,2013 5.BoyangWang,ShermanS.M.Chow,MingLi,HuiLi,StoringSharedDataontheCloudviaSecurity-Mediator,ICDCS2013 6.BoyangWang,HuiLi,MingLi,PrivacyPreservingPublicAuditingforSharedCloudDataSupportingGroupDynamics,ICC2013. 7.WenhaiSun,BingWang,NingCao,MingLi,WenjingLou,ThomasHouandHuiLi,Privacy-PreservingMulti-keywordTextSearchintheCloudSupportingSimilarity-basedRanking,ASIACCS2013 8.YinghuiZhang,XiaofengChen,JinLi,DuncanS.WongandHuiLi,AnonymousAttribute-BasedEncryptionSupportingEfficientDecryptionTest,ASIACCS2013,distinguishedpaperaward 9.BoyangWang,BaochunLi,HuiLi,PublicAuditingforSharedDatawithEfficientUserRevocationintheCloud,INFOCOM2013,Apr.15-19,Turin,Italia. 10.BenNiu,XiaoyanZhu,HuiLi,AnUltralightweightandPrivacy-PreservingAuthenticationProtocolforMobileRFIDSystems,IEEEWCNC2013 11.BenNiu,XiaoyanZhu,HaotianChi,HuiLi,plus:$Privacy-PreservingPseudo-LocationUpdatingSysteminLocation-BasedServices,IEEEWCNC2013 2012 1.JinCao,MaodeMa,HuiLi,UnifiedHandoverAuthenticationbetweenHeterogeneousAccessSystemsinLTENetworks,IEEEGlobeCom2012,Dec.3-7,CA,USA 2.JinCao,MaodeMa,HuiLi,AGroup-basedAuthenticationandKeyAgreementforMTCinLTENetworks,IEEEGlobeCom2012,Dec.3-7,CA,USA 3.BoyangWang,BaochunLi,HuiLi,Gmatch:SecureandPrivacy-PreservingGroupMatchinginSocialNetworks,IEEEGlobeCom2012,Dec.3-7,CA,USA 4.ZhaoXingwen,LiHui,Codesbasedtracingandrevokingschemewithconstantciphertext,LectureNotesinComputerScience,v7496LNCS,p318-335,2012,ProvableSecurity-6thInternationalConference,ProvSec2012,Proceedings 5.BoyangWang,BaochunLi,HuiLi,Knox:Privacy-PreservingAuditingforSharedDatawithLargeGroupsintheCloud,ACNS2012,LNCS7341,507-525,June26-29,Singapore 6.BoyangWang,BaochunLi,HuiLi,Oruta:Privacy-PreservingPublicAuditingforSharedDataintheCloud,IEEECloud2012,Honolulu,Hawaii,USA.June24-29,2012. 7.KaiFan,LibinZhao,XueminShermanShen,HuiLi,YintangYang,Smart-blockingFileStorageMethodinCloudComputing,IEEEICCC2012,Beijing,August15-18,2012. 2011 1.YinghuiZhang,XiaofengChen,HuiLi,JinCao,IdentityBasedConstructionforSecureandEfficientHandoffAuthenticationSchemesinWirelessNetworks,The2011FTRAWorldConvergenceConference,Korea,DEC12-15,2011 2.Sun,Yuhua;Wang,Zilong;Li,Hui;Yan,Tongjiang,Onthecross-correlationofaternarym-sequenceofperiod34k-1anditsdecimatedsequenceby(32k+1)2/20,Proceedingsofthe5thInternationalWorkshoponSignalDesignandItsApplicationsinCommunications,IWSDA'11,p48-51,2011,EI20121214883358 3.Li,Zhanhu;Fan,Kai;Li,Hui,ConcurrentsignatureprotocolonconiccurveoverringZn,Source:2011InternationalConferenceonElectronics,CommunicationsandControl,ICECC2011-Proceedings,p194-197,2011,EI20114714544163 4.Niu,Ben,Li,Hui;Zhu,Xiaoyan;Chao,Lv,SecurityanalysisofsomerecentauthenticationprotocolsforRFID,Proceedings-20117thInternationalConferenceonComputationalIntelligenceandSecurity,CIS2011,p665-669,2011, 2010 1.YongWang,HuiLiandXiyuanWang.PerformanceAnalysisofOptimalAntennaSchemeinTransmitDiversitySystems.The6thInternationalConferenceonNaturalComputation(ICNC'10),Yantai,August,2010,Vol.6,2793-2797.EI20104613380415 2.YongWang,HuiLi.FullRateandFullDiversitySTBCinDecode-and-ForwardRelaySystems.The2010InternationalConferenceonCommunicationsandIntelligenceInformationSecurity,Nanning,October,2010,135-138. 3.CanMo,HuiLi,HuiZhu,Asteampatternmatchingmethodfortrafficanalysis,ICSTE-Forensics2010,Shanghai 4.ChaoLv;MaodeMa,HuiLi,JianfengMa,Asecurityenhancedauthenticationandkeydistributionprotocolforwirelessnetworks,inIEEEGLOBECOM2010WorkshoponWebandPervasiveSecurity,2010.12,EI20110913697828 5.ChaoLv;MaodeMa,HuiLi,JianfengMa,AnEfficientThree-PartyAuthenticatedKeyExchangeProtocolwithOne-TimeKey,INFOCOMIEEEConferenceonComputerCommunicationsWorkshops,2010 2009 1.ZhouYejun,LiHui,MaJianfeng,SecureError-CorrectionNetworkCodinginaRandomizedSetting,ISA2009,LNCS5576,pp570-577 2.ZhuHui,LiHui,WangYumin.AnEfficientFastAuthenticationProtocol.IEEE2009InternationalConferenceonComputationalIntelligenceandSecurity.2009,12. 3.Li,Xiaoqing,LiHui,MaJianfengandZhangWeidong.AnEfficientAnonymousRoutingProtocolforMobileAdHocNetworks.The5thInternationalConferenceonInformationAssuranceandSecurity,VolumeII,pp.287–290,2009. 4.LvChao,LiHui,MaJianfeng.AnalysisthePropertiesofTLSBasedonTemporalLogicofKnowledge,TheFifthInternationalConferenceonInformationAssuranceandSecurity,2009. 2008andbefore 1.WangYing,LiHui,DuXinjun,WangYumin,Thedesignofoptimalperiodinterleaver,Proceedings-InternationalConferenceonAdvancedInformationNetworkingandApplications,AINA,Proceedings-22ndInternationalConferenceonAdvancedInformationNetworkingandApplicationsWorkshops/Symposia,AINA2008,2008,p413-415 2.WangYing,DuXinjun,LiHui,ZhuXiaoyan,Tail-bitingtheoryforturbocodes,IEEEWirelessandMicrowaveTechnologyConference,WAMICON2006,IEEEWirelessandMicrowaveTechnologyConference,WAMICON2006 3.LiHui,Shenqing,ATokenBasedSingleSign-onprotocol,CIS2005,PartII,LNAI3802,Springer-Verlag2005.12 4.WangMeng,LiHui,LiuZhijing,EfficientIdentityBasedProxy-SigncryptionSchemeswithForwardSecurityandPublicVerifiability,ICCNMC2005,LNCSSpringerVerlag2005.8. JournalPaper 2015 Liu,X.;Sun,W.;Quan,H.;Lou,W.;Zhang,Y.;Li,H.PubliclyVerifiableInnerProductEvaluationoverOutsourcedDataStreamsunderMultipleKeys,IEEETransactionsonServicesComputing,online Zhu,Hui;Huang,Cheng;Lu,Rongxing;Li,Hui,Modellinginformationdisseminationunderprivacyconcernsinsocialmedia,PhysicaA:StatisticalMechanicsanditsApplications,v449,p53-63,May1,2016 Zhu,Hui;Gao,Lijuan;Li,Hui,Secureandprivacy-preservingbodysensordatacollectionandqueryscheme,Sensors(Switzerland),v16,n2,February1,2016 Zhu,Hui;He,Xiaoying;Liu,Ximeng;Li,Hui,PTFA:Asecureandprivacy-preservingtrafficflowanalysisschemeforintelligenttransportationsystem,InternationalJournalofem[ant]beddedSystems,v8,n1,p78-86,2016 Niu,Ben;(Zhu,Xiaoyan;Li,Qinghua;Chen,Jie;Li,Hui*,Anovelattacktospatialcloakingschemesinlocation-basedservices,FUTUREGENERATIONCOMPUTERSYSTEMS-THEINTERNATIONALJOURNALOFGRIDCOMPUTINGANDESCIENCE,Vol.49,p125-132,2015 Wang,Yong;Wu,Hao;Tang,Liyang;Li,Hui,TheSolutionforCooperativeBeamformingDesigninMIMOMulti-wayRelayNetworks,KSIITRANSACTIONSONINTERNETANDINFORMATIONSYSTEMS,9(3):956-970,2015 Lv,Xixiang;Mu,Yi;Li,Hui,KeymanagementforSmartGridbasedonasymmetrickey-wrapping,INTERNATIONALJOURNALOFCOMPUTERMATHEMATICS,92(3):498-512,2015 Lai,Chengzhe;Li,Hui;Li,Xiaoqing;Cao,Jin,Anovelgroupaccessauthenticationandkeyagreementprotocolformachine-typecommunication,TRANSACTIONSONEMERGINGTELECOMMUNICATIONSTECHNOLOGIES26(3):414-431,2015 Li,Chen;Chen,Le;Lu,Rongxing;Li,Hui,Commenton"AnEfficientHomomorphicMACwithSmallKeySizeforAuthenticationinNetworkCoding",IEEETRANSACTIONSONCOMPUTERS,64(3):882-883,2015 Zhu,Hui;Xue,Yingfang;Chen,Xiaofeng;Li,Qiang;Li,Hui,V-MGSM:AMultilevelandGroupingSecurityVirtualizationModelforMobileInternetService,MOBILEINFORMATIONSYSTEMS,1-9,2015 WangB,LiB,LiH,Panda:PublicAuditingforSharedDatawithEfficientUserRevocationintheCloud,IEEETransactionsonServiceComputing,8(1):92-106,2015 2014 SunW,WangB,CaoN,LiM,LouW,YHouY,LiH,VerifiablePrivacy-PreservingMulti-keywordTextSearchintheCloudSupportingSimilarity-basedRanking,IEEETransactionsonParallelandDistributedSystems,IEEETRANSACTIONSONPARALLELANDDISTRIBUTEDSYSTEMS,25(11):3025-3035,2014 Wang,Boyang;Li,Hui;Liu,Xuefeng;Li,Fenghua;Li,Xiaoqing,EfficientPublicVerificationontheIntegrityofMulti-OwnerDataintheCloud,JOURNALOFCOMMUNICATIONSANDNETWORKS,16(6):592-599 Zhang,Yinghui;Chen,Xiaofeng;Li,Jin;Li,Hui,GenericconstructionforsecureandefficienthandoffauthenticationschemesinEAP-basedwirelessnetworks,COMPUTERNETWORKS,75:192-211,seriesA,2014 Li,Chen;Lu,Rongxing;Li,Hui;Chen,Le;Li,Xiaoqing,Commenton"ANovelHomomorphicMACSchemeforAuthenticationinNetworkCoding",IEEECOMMUNICATIONSLETTERS,18(12):2129-2132,2014 CaoJ,MaM,LiH,ZhangY,ASurveyonSecurityAspectsforLTEandLTE-ANetworks,IEEECommunicationsSurveys&Tutorials,Vol.16,No.1,pp.283-302,2014 Xiang,Xinyin;Li,Hui;Wang,Mingyu;Liu,Zhenhua,Hiddenattribute-basedsigncryptionschemeforlattice,SecurityandCommunicationNetworks,11(7):1780-1787,2014 WangB,LiB,LiH,Oruta:Privacy-PreservingPublicAuditingforSharedDataintheCloud,IEEETransactionsonCloudComputing,2(1):43-56,2014 LvX,MuY,LiH,Non-interactiveKeyEstablishmentforBundleSecurityProtocolofSpaceDTNs,IEEETransactionsonInformationForensicsandSecurity,9(1):5-13,2014 ChengzheLai;HuiLi;XiaohuiLiang;RongxingLu;KuanZhang;XueminShen,CPAL:aconditionalprivacy-preservingauthenticationwithaccesslinkabilityforroamingservice,IEEEInternetofThingsJournal,1(1):46-57,2014 Wang,Boyang;Li,Hui;Liu,Xuefeng,SecureMatch:Privacy-preservinggroupmatchinginsocialnetworksforlargegroups,JournalofComputationalInformationSystems,10(2):665-672,2014 Han,Qi;Zhang,Yinghui;Chen,Xiaofeng;Li,Hui;Quan,Jiaxiang,Efficientandrobustidentity-basedhandoffauthenticationforEAP-basedwirelessnetworks,ConcurrencyComputationPracticeandExperience,26(8):1561-1573,2014 Li,Xiaoqing;Li,Hui;AsurveyondatadisseminationinVANETs,CHINESESCIENCEBULLETIN,59(32):4190-4200 2013 Lv,Chao;Ma,Maode;Li,Hui;Ma,Jianfeng;Zhang,YaoyuAnnovelthree-partyauthenticatedkeyexchangeprotocolusingone-timekey,JournalofNetworkandComputerApplications,v36,n1,p498-503,January2013 LaiC,LiH,LuR,ShenXS,SE-AKA:AsecureandefficientgroupauthenticationandkeyagreementprotocolforLTEnetworks,ComputerNetworks,Vol.57,No.17,pp.3492-3510,2013 2012 YinghuiZhang,XiaofengChen,HuiLi,Key-EvolvingHierarchicalID-BasedSigncryption,theComputerJournal,accepted,TheComputerJournal(2012)doi:10.1093/comjnl/bxs154Firstpublishedonline:December2,2012, JinCao,MaodeMa,HuiLi,YueyuZhang,ChengzheLai,AnUniformHandoverAuthenticationbetweenE-UTRANandNon-3GPPAccessNetworks,IEEETransactiononWirelessCommunication,Vol.11,No.10,2012,pp3644-3650 LvXixiang,LiHui,WangBaocang,Groupkeyagreementforsecuregroupcommunicationindynamicpeersystems,JournalofParallelandDistributedComputing,v72,n10,p1195-1200,October JinCao,HuiLi,MaodeMa,YueyuZhang,ChengzheLai,AsimpleandrobusthandoverauthenticationbetweenHeNBandeNBinLTEnetworks,ComputerNetworks,56(8),2012,2119-2131 BoyangWang,HuiLi,JinCao,AnefficientMACschemeforsecurenetworkcodingwithprobabilisticdetection,FrontiersofComputerScienceVolume6,Number4(2012),429-441 C.Lv,M.Ma,H.Li,andJ.Ma,Asecurityenhancedauthenticationandkeydistributionprotocolforwirelessnetworks,SecurityandCommunicationNetworks,5(4):343-352(2012), C.Lv,M.Ma,H.Li,J.Ma,andB.NiuSecurityenhancementofthecommunicationefficientAUTHMAC_DHprotocols,SecurityandCommunicationNetworks,5(6):674-680(2012) ChengzheLai,HuiLi,YueyuZhang,JinCao:SecurityIssuesonMachinetoMachineCommunications.KSIITransactionsonInternetandInformationSystems,6(2):198-514(2012) ChaoLv,HuiLi,JianfengMa,BenNiu:Vulnerabilityanalysisoflightweightsecuresearchprotocolsforlow-costRFIDsystems.InternationalJournalofRadioFrequencyIdentificationTechnologyandApplications,4(1):3-12(2012) ZhituSu,ChunhuiSun,HuiLi,JianfengMa:AmethodforefficientparallelcomputationofTatepairing.InternationalJournalofGridandUtilityComputing3(1):43-52(2012) 2011 Lv,Xixiang;Li,Hui;Wang,Baocang,Identity-basedkeydistributionformobileAdHocnetworks,FRONTIERSOFCOMPUTERSCIENCEINCHINAvol.5.No.4,442-447,2011.12 Lv,Chao;Li,H;Ma,JF;Niu,B;VulnerabilityAnalysisofEllipticCurve-BasedRFIDProtocol,CHINACOMMUNICATIONS,Vol.8,No.4,pp153-158 Lai,Chengzhe;Li,Hui;Zhang,Yueyu;Cao,Jin,AfastseamlesshandoffschemebetweenIEEE802.11andEPSnetworksusingoptimizedproxymobileIPv6,InternationalJournalofDigitalContentTechnologyanditsApplications,v5,n8,p81-91,2011 SunChunhui,LiHui,Yangyang,ChenJie,Researchonfault-electromagneticattackonblockcipher,JournalofConvergenceInformationTechnology,Vol.6No.11,409-4172011. Su,Zhitu;Sun,Chunhui;Li,Hui;Ma,Jianfeng,Fastcomputationoftatepairingusingellipticcurveswithprimesubgrouporderofprothform,AdvancesinInformationSciencesandServiceSciences,v3,n7,p384-393,August2011 Lv,Chao,LiHui,Ma,Jianfeng;Zhao,Meng,SecurityanalysisoftworecentlyproposedRFIDauthenticationprotocols,FrontiersofComputerScienceinChina,v5,n3,p335-340,September2011 YongWang,HuiLi,WeidongZhang.DesignofMultiuserIntermediateRelaySafetyCommunicationBasedonSharingSignalsSubspaceBeamforming.AdvancedScienceLetters,Vol.4.,Mo.2,pp606-609,2011.2. SunYinxia,LiHui,ID-basedSigncryptionKEMtoMultipleRecipients,ChineseJournalofElectronics,Vol.20,No.2,317-322,2011 YongWang,HuiLi.ANovelConvexOptimizationforReceiveAntennaSelection.AppliedMechanicsandMaterials,v186,p611-615,2011,NewTrendsandApplicationsofComputer-AidedMaterialandEngineering Lv,Chao;Li,Hui;Ma,Jianfeng;Niu,Ben;Jiang,Haiyang,Securityanalysisofaprivacy-preservingECC-basedgrouping-proofprotocol,JournalofConvergenceInformationTechnology,v6,n3,p113-119,March2011 YongWang,HuiLiandXiyuanWang.RobustnessofWeightingReceiveAntennaSelectionAlgorithm.WirelessPersonalCommunication,Vol.61,No.1,pp69-67,2011 2010andbefore YongWang,HuiLi.ANovelAntennaSelectionSchemeforAmplify-and-ForwardMIMORelaySystems.JournalofElectromagneticWavesandApplications,2010,24(11/12).1530-1542. XudongZhu,HuiLi,ZhijingLiu,BehaviorClusteringforAnomalyDetection,ChinaCommunications,2010:7(6). ZhuHui,LiHui,MoCan,Asteampatternmatchingmethodfortrafficanalysis,ChinaCommunication,2010.No.6 Zhaobin,KouWeidong,LiHui,DangLanjun,ZhangJun,Effectivewatermarkingschemeintheencrypteddomainforbuyer-sellerwatermarkingprotocol,InformationSciences,v180,n23,p4672-4684,2010, SunYinxia,LiHui,Short-ciphertextandBDH-basedCCA2securecertificatelessencryption,ScienceChinaInformationScience,2010,No.10,Vol.532005-2015 SunYinxia,LiHui.EfficientSigncryptionbetweenTPKCandIDPKCandItsMulti-ReceiverConstruction,ScienceChina-InformationSciences,2010.3 DangLanjun,KouWeidong,LiHui,ZhangJunwei,CaoXuefei,ZhaoBin,FanKai,EfficientID-basedRegistrationProtocolFeaturedwithUserAnonymityinMobileIPNetworks,IEEETransactiononWirelessCommunication,FEB,2010,VoL9,No.2pp594-604 XixiangLv,HuiLi.ID-basedauthenticatedgroupkeyagreementfrombilinearmaps.Front.Comput.Sci.China,2010.2 ZHOUYe-jun,LIHui,MAJian-feng,SecureNetworkCodingAgainsttheContaminationandEavesdroppingAdversaries,ChineseJournalofElectronics,2009.7

学术兼职

ACMSIGSACCHINA主席,中国密码学会理事、安全协议专委会委员,中国中文信息学会大数据安全与隐私保护专委会副主任,中国电子学会信息论分会委员,IEEE学会会员。

推荐链接
down
wechat
bug