当前位置: X-MOL首页全球导师 国内导师 › 亢保元

个人简介

亢保元,男,教授,博士,硕士生导师。1987年毕业于宝鸡师范学院数学系,获得基础数学专业学士学位;1993年毕业于山西大学数学系,获得基础数学专业硕士学位;1999年毕业于西安电子科技大学通信工程学院,获得密码学专业博士学位。2007年3月至2008年3月在澳大利亚昆士兰科技大学信息安全学院留学访问。1993年7月至1999年7月在西北工业大学应用数学系任教;1999年7月至2009年7月在中南大学数学科学与计算技术学院任教;2009年7月调到天津工业大学计算机科学与软件学院工作。教学方面,多年来为本科生、研究生主讲过“离散数学”、“组合数学”、“高等数学”、“高等代数”、“概率论与数理统计”、“抽象代数”、“算法设计与分析”、“编码学”、“密码学”、“数字签名技术”、“信息安全”等课程;参加编写《密码学教程》、《线性代数与解析几何》两本教材;参加中南大学和西北工业大学教改项目三项;获得西北工业大学优秀教学成果二等奖一项;获得陕西省第二届青年教师高等数学讲课比赛二等奖。科研方面,目前主持天津市自然科学基金项目一项;参加完成国防预研基金项目一项;参加完成国家自然科学基金一项;参加完成湖南省自然科学基金两项;在国际、国内期刊及学术会议上发表论文七十余篇,SCI、EI收录论文二十余篇,应邀为多个国际学术期刊的论文审稿

研究领域

(1)数字签名(2)身份认证与密钥共识(3)安全电子商务协议

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1]Baoyuan,Kang,MuWang,Dongya,Jing,AnOff-LinePaymentSchemeforDigitalContentviaSubliminalChannel,Journalofinformationscienceandengineering,vol.34,pp.171-192(2018)[2]BaoyuanKang,DongyangShaoandJiaqiangWang,Afairelectronicpaymentsystemfordigitalcontentusingellipticcurvecryptography,JournalofAlgorithms&ComputationalTechnology,vol.12,no.1,pp.13-19,2018[3]BaoyuanKang,LinSi,HongJiang,ChunqingLi,MingmingXie,ID-BasedPublicAuditingProtocolforCloudDataIntegrityCheckingwithPrivacy-PreservingandEffectiveAggregationVerification,SecurityandCommunicationNetworks,Volume2018,ArticleID3205898,9pages,https://doi.org/10.1155/2018/3205898[4]BaoyuanKang,JiaqiangWangandDongyangShao,Certificatelesspublicauditingwithprivacypreservingforcloudassistedwirelessbodyareanetworks,Mobileinformationsystems,vol.2017,ArticleID2925465,5pages.https://doi.org/10.1155/2017/2925465[5]BaoyuanKang,JiaqiangWangandDongyangShao,Attackonprivacy-reservingpublicauditingschemesforcloudstorage,Mathematicalproblemsinengineering,vol.2017,ArticleID8062182,https://doi.org/10.1155/2017/8062182 [6]KangBaoyuan,WangMu,JingDongya,Anefficientcertificatelessaggregatesignaturescheme,Wuhanuniversityjournalofnaturalsciences,vol.22,no.2,2017,pp.165-170.[7]Kang,Baoyuan,Xu,Danhui,SecureElectronicCashSchemewithAnonymityRevocation,MobileInformationSystems,vol.2016,ArticleID2620141http://dx.doi.org/10.1155/2016/2620141[8]BaoyuanKang,DanhuiXu,Perfect-Mail:Asecuree-mailprotocolwithperfectforwardsecrecy,BritishJournalofMathematicsandComputerScience,vol.12,no.5,pp.1-11,2016[9]Kang,Baoyuan,Xu,Danhui,Asecurecertificatelessaggregatesignaturescheme,InternationalJournalofSecurityanditsApplications,vol.10,no.3,pp.55-68,2016[10]Kang,Baoyuan,Xu,Danhui,Anuntraceableoff-lineelectroniccashschemewithoutmerchantfrauds,InternationalJournalofHybridInformationTechnology,vol.9,no.1,pp.431-442,2016[11]Kang,Baoyuan,Xu,Danhui,Asecuremulti-receiverse-mailprotocol,InternationalJournalofMultimediaandUbiquitousEngineering,vol.11,no.11,pp.335-342,2016[12]BaoyuanKang,Ondelegatabilityofsomestrongdesignatedverifiersignatureschemes,Mathematicsproblemsinengineering,Volume2014,ArticleID761487,5pages,doi:10.1155/2014/761487.[13]BaoyuanKang,ColinBoyd,EdDawson,Anovelidentity-basedstrongdesignatedverifiersignaturescheme,JournalofSystemsandSoftware,vol.82,no.2,February,2009,pp.270-273[14]BaoyuanKang,ColinBoyd,EdDawson,Identity-basedstrongdesignatedverifiersignatureschemes:Attacksandnewconstruction.ComputersandElectricalEngineering,vol.35,no.1,January,2009,pp.49-53[15]BaoyuanKang,ColinBoyd,EdDawson,Anovelnonrepudiablethresholdmulti-proxymulti-signatureschemewithsharedverification.ComputersandElectricalEngineering,vol.35,no.1,January,2009,pp.9-17[16]BaoyuanKang,ID-basedaggregatesignatureschemewithconstantpairingcomputations:attackandnewconstruction,JournalofComputationalInformationSystems,vol.8,no.16,pp.6611-6618,2012[17]BaoyuanKang,DongyangShao,JiaqiangWang,ImprovedIncentive-BasedElectronicPaymentSchemeforDigitalContent,InternationalJournalofEngineeringResearchAndManagement(IJERM),vol.4,no.9,September2017[18]BaoyuanKang,AttacksonOneDesignatedVerifierProxySignatureScheme,Journalofappliedmathematics,Volume2012,ArticleID508981,6pages,doi:10.1155/2012/508981[19]BaoyuanKang,Onthesecurityofsomeaggregatesignatureschemes,Journalofappliedmathematics,Volume2012,ArticleID416137,10pages,doi:10.1155/2012/416137[20]BaoyuanKang,Newtypesofverifiablyencryptedsignatureschemes,AdvancedMaterialsResearch,vol.490-495,pp.914-918,2012,Mechatronics andIntelligentMaterialsII[21]BaoyuanKang,JinguangHanandQingjuWang,Anewthresholdmulti-proxymulti-signaturescheme,Journalofelectronics(china),no.4,2006,pp.560-563[22]BaoyuanKang,ImprovementonLin-Wu(t,n)-thresholdverifiablemult-secretsharingscheme,ChineseJournalofEngineeringMathematics,2006(5),pp881-885.[23]BaoyuanKang,Cryptanalysisonane-votingschemeovercomputernetwork,InternationalConferenceonComputerScienceandSoftwareEngineering,vol.3,December,2008,pp.826-829.[24]BaoyuanKang,JinguangHan,OntheSecurityofBlindSignatureandPartiallyBlindSignature,20102ndInternationalConferenceonEducationTechnologyandComputer.vol.5.June,2010,pp.206-208[25]BaoyuanKang,JinguangHan,AMorePracticalandEfficientThresholdProxySignatureScheme,20102ndInternationalConferenceonEducationTechnologyandComputer.vol.5,June,2010,pp.202-205[26]BaoyuanKang,JinguangHanandQingjuWang,OntheSecurityofProxyBlindMulti-signatureSchemewithoutaSecureChannel,20102ndInternationalConferenceonComputerEngineeringandTechnology.April,2010,vol.1,pp.62-64[27]BaoyuanKang,TongLu,CryptanalysisandImprovementonKey-InsulatedSignatureScheme,20101ndInternationalConferenceonComputerandAutomationEngineering.December,2010,pp.149-151

推荐链接
down
wechat
bug