当前位置: X-MOL首页全球导师 国内导师 › 夏喆

个人简介

个人简介: 夏喆,男,1982年7月出生,博士、武汉理工大学副教授、硕士生导师。2009年获得英国萨里大学(UniversityofSurrey)博士学位,2009年至2013年在英国萨里大学从事博士后研究,2017年至2018年在澳大利亚伍伦贡大学(UniversityofWollongong)进行访问学习,。近年来在TIFS、DCC、IETInformationSecurity、ACISP等国际期刊会议上发表学术论文40余篇。 教育经历: 2005.09–2009.06英国萨里大学,信息安全,博士,导师:Prof.SteveSchneider 2004.09–2005.08英国萨里大学,信息系统,硕士,导师:Prof.SteveSchneider 2000.09–2004.06武汉大学,计算机科学与技术,学士 工作经历: 2013.02–至今武汉理工大学,计算机学院,副教授 2017.12–2018.12澳大利亚伍伦贡大学,计算机与信息学院,访问学者,合作导师:穆怡 2009.04–2013.02英国萨里大学,计算机学院,博士后,合作导师:Prof.SteveSchneider 专著: AamoIorliam,AnthonyHo,NormanPoh,XiZhaoandZheXia.Benford'sLawforClassificationofBiometricImages.achapterinIETbookUser-CentricPrivacyandSecurityinBiometrics,2017. TheaPeacock,PeterY.A.Ryan,SteveSchneiderandZheXia.Verifiablevotingsystems.AchapterinComputerandInformationSecurityHandbook(2ndedition).MorganKaufmannEds(animprintofElsevierInc.),2013. 承担项目: 湖北省自然科学基金“物联网中认证与密钥协商机制研究”,2017CFB303,2017.01-2018.12,5万元,主持 武汉市应用基础研究计划“基于云平台的大规模固件安全分析关键技术研究”,2016010101010004,2016.08-2018.08,30万元,参与 国家科技支撑计划课题“国家网络信息安全实验平台”子课题,2012BAH45B01,攻击路径及协议分析系统,2015.09-2016.08,69万元,参与 湖北省自然科学基金重点项目,2015CFA069,物联网系统安全可靠性建模与分析技术研究,2015.01-2017.12,20万元,参与 中央高校基本科研业务费基础研究项目,2014-IV-020,抗胁迫全程可验证远程安全投票协议的设计与分析,2014.01-2015.10,5万,主持 英国EPSRC项目,EP/G025797/1,TrustworthyVotingSystems,2009.04-2013.02,150万英镑,参与

研究领域

主要研究方向为密码学和信息安全。

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

期刊论文: YanweiZhou,BoYang,YiMu,ZheXia.Continuousleakage-resilientidentity-basedencryptionwithleakageamplification.ToappearatDesigns,CodesandCryptography.(CCFB) YanweiZhou,BoYang,ZheXia,YiMu,TaoWang.Anonymousandupdatableidentity-basedhashproofsystem.ToappearatIEEESystemJournal. TaoWang,BoYang,HongyuLiu,YongYu,GuoyongQiu,ZheXia.Analternativeapproachtopublicclouddataauditingsupportingdatadynamics.ToappearatSoftComputing.(CCFC) XinWang,BoYang,ZheXia.AsecuredatasharingschemewithcheatingdetectionbasedonChaum-Pedersenprotocolforcloudstorage.ToappearatFrontiersofInformationTechnology&ElectronicEngineering. ZheXia,YiningLiu,Ching-FangHsu,Chin-ChenChang.Aninformationtheoreticallysecuree-lotteryschemebasedonsymmetricbivariatepolynomials.Symmetry11(1):88,2019. YiningLiu,YanpingWang,XiaofenWang,ZheXia,JingfangXu.Privacy-preservingrawdatacollectionwithoutatrustedauthorityforIoT.ComputerNetworks148:340-348,2019.(CCFB) YanweiZhou,BoYang,YiMu,ZheXia.Continuousleakage-resilientaccesscontrolforwirelesssensornetworks.AdHocNetworks80:41-53,2018.(CCFC) XinWang,BoYang,ZheXia,YanqiZhao,HuifangYu.Acheatingdetectableprivacy-preservingdatasharingschemeforcloudcomputing.SecurityandCommunicationNetworks6174830:1-6174830:13,2018.(CCFC) QiqiLai,BoYang,YongYu,ZheXia,YanweiZhou,YuanChen.Updatableidentity-basedhashproofsystembasedonlatticesanditsapplicationtoleakage-resilientpublic-keyencryptionschemes.JournalofComputerScienceandTechnology33(6):1243-1260,2018. MingwuZhang,JiajunHuang,HuaShen,ZheXia,YongDing.Consecutiveleakage-resilientandupdatablelossytrapdoorfunctionsandapplicationinsensitivebig-dataenvironments.IEEEAccess6:43936-43945,2018. ZheXia,ZhengTong,MinXiao,Chin-ChenChang.Aframeworkforpracticalandreceipt-freeremotevoting.IETInformationSecurity,12(4):326-3312018.(CCFC) LeinHarn,Ching-FangHsu,ZheXia,JunweiZhou.Howtosharesecretefficientlyovernetworks.SecurityandCommunicationNetworks.2017.(CCFC) HanbingYao,NanaXing,JunweiZhou,ZheXia.SecureIndexforResource-ConstraintMobileDevicesinCloudComputing.IEEEAccess.DOI:10.1109/ACCESS.2016.2622299. YiningLiu,QiZhong,ZheXia,DibiaoHe.ASecureDataBackupSchemeUsingMulti-FactorAuthentication.IETInformationSecurity.2016.(CCFC) YiningLiu,GaoLin,ChiCheng,ZheXia.APrivacy-PreservingHealthDataAggregationScheme.KSIITransactionsonInternetandInformationSystems.2016 MorganLlewellyn,SteveSchneider,ZheXia,ChrisCulnane,JamesHeather,PeterY.A.Ryan,ShriramkrishnanSrinivasan.Testingvoters'understandingofasecuritymechanismusedinverifiablevoting.USENIXJournalofElectionTechnologyandSystems(JETS).2013. PeterY.A.Ryan,DavidBismark,JamesHeather,SteveSchneiderandZheXia.PrêtàVoter:aVoter-VerifiableVotingSystem.InIEEETransactionsonInformationForensicsandSecurity(SpecialIssueonElectronicVoting),volume4,number4,pages662—673.December2009.(CCFA) DavidLundin,HelenTreharne,PeterY.A.Ryan,SteveSchneider,JamesHeatherandZheXia.Tearanddestroy:chainvotinganddestructionproblemssharedbyPrêtàVoterandPunchscanandasolutionusingvisualencryption.IntheEATCSFundamentaInformaticae(JournalofFundamentalInformatics),2006,pp1001-1019. 会议论文: ZheXia,ZhenYang,ShengwuXiong,ChingfangHsu.Game-basedsecurityproofsforsecretsharingschemes.Inthe2ndInternationalConferenceonSecurityandIntelligentComputingandBig-DataServices(SICBS2018),December14-16,2018,Guilin,China. ZheXia,BoYang,MingwuZhang,YiMu.Anefficientandprovablysecureprivatepolynomialevaluationscheme.Inthe14thInternationalConferenceonInformationSecurityPracticeandExperience(ISPEC2018).September25-27,2018,TokyoJapan. YiningLiu,YanpingWang,XiaofenWang,ZheXia.Privacy-preservingdatacollectionformobilephonesensingtasks.Inthe14thInternationalConferenceonInformationSecurityPracticeandExperience(ISPEC2018).September25-27,2018,TokyoJapan. ZheXia,LiuyingSun,BoYang,YanweiZhou,MinwuZhang.Verifiablesecretsharingbasedonhyperplanegeometrywithitsapplicationstooptimalresilientproactivecryptosystems.Inthe23stAustralasianConferenceonInformationSecurityandPrivacy(ACISP2018).July11-13,2018,Wollongong,Australia.(CCFC) LiuyingSun,AnthonyHo,ZheXia,JiagengChen,XuzheHuang,YidanZhang.DetectionandClassificationofMaliciousPatternsinNetworkTrafficusingBenford'sLaw.Asia-PacificSignalandInformationProcessingAssociationAnnualSummitandConference2017(APSIPAASC2017). ZheXia,BassomaDiallo,MinXiao.ALightweightPrivacyPreservingSchemeforSmartGrid.2016InternationalConferenceonComputing,AnalyticsandSecurityTrends. ZheXia,XiaoyunYang,MinXiaoandDebiaoHe.ProvablySecureThresholdPaillierEncryptionBasedonHyperplaneGeometry.Inthe21stAustralasianConferenceonInformationSecurityandPrivacy(ACISP2016).July4-6,2016,Melbourne,Australia.(CCFC) PengyuZhou,MinXiaoandZheXia.Amessageauthenticationmethodforwirelesssensornetworksusingpolynomialinterpolation.Inthe2ndInternationalSymposiumonDependableComputingandInternetofThings(DCIT2015),November2015,WuhanChina. XiaoyunYang,ZheXiaandMinXiao.Verifiablesecretsharinganddistributedkeygenerationbasedonhyperplanegeometry.Inthe2ndInternationalSymposiumonDependableComputingandInternetofThings(DCIT2015),November2015,WuhanChina. SriramkrishnanSrinivasan,ChrisCulnane,JamesHeather,SteveSchneiderandZheXia.CounteringballotstuffingandincorporatingeligibilityverifiabilityinHelios.Inthe8thInternationalConferenceonNetworkandSystemSecurity(NSS2014),volumn8792ofLectureNotesofComputerScience.October,2014.Xi'an,China. XiaoYang,ZhengTong,ZheXiaandYiningLiu.Generatingverifiablerandomnumberswithoutatrustedparty.Inthe2014ChinaCommunicationsSecurityConference(CSC2014),May2014.Beijing,China. JamesHeather,ChrisCulnane,SteveSchneider,SriramkrishnanSrinivasanandZheXia.Solvingthediscretelogarithmproblemforpackingcandidatepreferences.Inthe8thInternationalConferenceonAvailability,ReliabilityandSecurity(CD-ARES2013),volumn8128ofLectureNotesinComputerScience.IEEEComputerSociety.September2013.Regensburg,Germany. MorganLlewellyn,SteveSchneider,ZheXia,ChrisCulnane,JamesHeather,PeterY.A.Ryan,ShriramkrishnanSrinivasan.Testingvoters'understandingofasecuritymechanismusedinverifiablevoting.Inthe2013USENIXElectronicVotingTechnologyWorkshop(EVT2013),collaboratedwithUSENIXSecuritySymposium2013.August2013,Washinton,D.C.,US. CraigBurton,ChrisCulnane,JamesHeather,TheaPeacock,PeterY.A.Ryan,SteveSchneider,SriramkrishnanSrinivasan,VanessaTeague,RolandWenandZheXia.UsingPrêtàVoterintheVictorianStateelections.Inthe2012USENIXElectronicVotingTechnologyWorkshop(EVT2012),collaboratedwithUSENIXSecuritySymposium2012.August2012.Bellevue,WA,US. CraigBurton,ChrisCulnane,JamesHeather,TheaPeacock,PeterY.A.Ryan,SteveSchneider,SriramkrishnanSrinivasan,VanessaTeague,RolandWenandZheXia.AsupervisedverifiablevotingprotocolfortheVictorianElectoralCommission.Inthe5thInternationalConferenceonElectronicVoting(EVOTE2012).ManuelJ.Kripp,MelanieVolkamer,RüdigerGrimm(Eds),volume205ofLectureNotesinInformatics(LNI).July2012.Bregenz,Austria. SteveSchneider,SriramkrishnanSrinivasan,ChrisCulnane,JamesHeatherandZheXia.PrêtàVoterwithwrite-ins.Inthe3rdInternationalConferenceonE-votingandIdentity(VOTE-ID2011).volume7985ofLectureNotesofComputerScience,Springer-Verlag.September2011.Tallinn,Estonia. ChrisCulnane,DavidBismark,JamesHeather,SteveSchneider,SriramkrishnanSrinivasanandZheXia.Authenticationcodes.Inthe2011USENIXElectronicVotingTechnologyWorkshop(EVT2011),collaboratedwithUSENIXSecuritySymposium2011.August2011.SanFrancisco,California,US. SteveSchneider,MorganLlewellyn,ChrisCulnane,JamesHeather,SriramkrishnanSrinivasanandZheXia.FocusgroupviewsonPrêtàVoter1.0.Inthe2ndInternationalWorkshoponRequirementsEngineeringforE-votingSystems(RE-Vote2011).August2011.Trento,Italy. ZheXia,ChrisCulnane,JamesHeather,HugoJonker,PeterY.A.Ryan,SteveSchneiderandSriramkrishnanSrinivasan.VersatilePrêtàVoter:handlingmultipleelectionmethodswithaunifiedinterface.Inthe11thInternationalConferenceonCryptologyinIndia(Indocrypt2010).Volume6498ofLectureNotesofComputerScience,pages98-114,Springer-Verlag.December2010,Hyderabad,India. DavidBismark,JamesHeather,RogerPeel,PeterY.A.Ryan,SteveSchneiderandZheXia.ExperiencesgainedfromthefirstPrêtàVoterimplementation.Inthe1stInternationalWorkshoponRequirementsEngineeringforE-votingSystems(RE-Vote2009).August2009.Atlanta,Georgia,US. ZheXia,SteveSchneider,JamesHeatherandJacquesTraoré.Analysis,improvementandsimplificationofthePrêtàVoterwithPaillierencryption.Inthe2008USENIXElectronicVotingTechnologyWorkshop(EVT2008),collaboratedwithUSENIXSecuritySymposium2008,.July2008.SanJose,California,US. SebastienFoulle,SteveSchneider,JacquesTraoréandZheXia.Threatanalysisofapracticalvotingschemewithreceipts.Inthe1stInternationalConferenceonE-votingandIdentity(VOTE-ID2007).Volume4896ofLectureNotesofComputerScience,pages156-165,Springer-Verlag.October2007.Bochum,Germany. ZheXia,SteveSchneider,JamesHeather,PeterY.A.Ryan,DavidLundin,RogerPeelandPhilipHoward.PrêtàVoter:All-In-One.InIAVoSSWorkshoponTrustworthyElections(WOTE2007),June2007.Ottawa,Canada. ZheXiaandSteveSchneider.Anewreceipt-freee-votingschemebasedonblindsignature.InIAVoSSWorkshoponTrustworthyElections(WOTE2006).June2006.Cambridge,UK.

学术兼职

曾担任澳大利亚学术委员会(ARC)信息安全方向评审及ESORICS,EVT,Vote-ID等国际学术会议程序委员会委员(PCMember)。目前担任SCI期刊《JournalofInformationSecurityandApplication》的副主编(AssociateEditor),以及多个信息安全专刊的编委。

推荐链接
down
wechat
bug