南京航空航天大学考研研究生导师简介-方黎明

本站小编 Free考研网/2019-05-27

导师姓名:方黎明
性别:男
人气指数:114

所属院校:南京航空航天大学
所属院系:计算机科学与技术学院
职称:副教授
导师类型:硕导
招生专业:网络空间安全


通讯方式 :
电子邮件:fangliming@nuaa.edu.cn


科研工作 :
发表学术论文,出版专著情况:
[1].Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi: A CCA-Secure Key-Policy Attribute-based Proxy Re-encryption in the Adaptive Corruption Model for Dropbox Data Sharing System. Designs,Codes Crptography,2018. (SCI源刊, CCF B类)
[2].Liming Fang, Chunpeng Ge, Zhiqiu Huang, Jiandong Wang. Privacy preserving cloud data sharing system with flexible control, Computers and Electrical Engineering. 2018. (SCI源刊,CCF C类)
[3].Liming Fang, Chunpeng Ge, Zhiqiu Huang, Yao Wang, Jiandong Wang. A secure cloud data sharing system with flexible control, ROSENET2017.(EI/ISTP)
[4].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science, 2012, 462(4):39-58. (SCI源刊, CCF B类)
[5].Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren. A Key-Policy Attribute-based Proxy Re-encryption without Random Oracles, Computer Journal, 2016, 59(7): 970-982. [SCI,CCF B类]
[6].Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren. Fuzzy Conditional Proxy Re-encryption. SCIENCE CHINA Information Sciences. 2013, 56(5):1-13.(SCI源刊,IF:0.5)
[7].Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen and Liming Fang. Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics Security 12(6): 1382-1392. 2017. (SCI源刊,CCF A类)
[8].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Public Key Encryption with Keyword Search Secure Against Keyword Guessing Attacks without Random Oracle. Information Sciences.238:221?241, 2014. (SCI源刊,IF:3.64,CCF B类)
[9].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Interactive conditional proxy re-encryption with fine grain policy. Journal of Systems and Software,2011, 84(12):2293-2302.(SCI源刊,IF:1.322,CCF B类)
[10].Chunpeng Ge, Willy Susilo, Jiandong Wang, Liming Fang. Identity-based conditional proxy re-encryption with fine grain policy, Computer Standard Interface. 2017, 52: 1-9. [SCI]
[11].Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo: A ciphertext policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience. 2015, 27 (8) :2004-2027 (SCI)
[12].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Hierarchical Conditional Proxy Re-encryption. Computer Standards and Interfaces, 2012, 34(4):380-389.(SCI源刊,IF:1.42)
[13].Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong: A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559(EI、ISTP)
[14].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. Proc. of CANS 2009. LNCS 5888, Heidelberg: Springer, 2009: 248-258. (EI/ISTP)
[15].Yongjun Ren, Yaping Cheng, Jin Wang, Liming Fang: Data protection based on multifunction digital watermark in wireless sensor network. ICCST 2015: 37-41. . (EI/ISTP)
[16].Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang: Reliable access control for multi-authority in cloud storage. ICCST 2015: 113-116. . (EI/ISTP)
[17].Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Outsourced data tagging via authority and delegable auditing for cloud storage. ICCST 2015: 131-134. . (EI/ISTP)
[18].Yongjun Ren, Jin Han, Jin Wang, Liming Fang: Privacy-preserving proof of storage in large group. ICCST 2015: 269-272. (EI/ISTP)
[19].Yongjun Ren, Yaping Chen, Jin Wang, Liming Fang: Leakage Resilient Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 706-709.
[20].Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang: Attributed Based Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 710-713.
[21].Yongjun Ren, Jiang Xu, Jin Wang, Liming Fang: Oriented Group Provable Data Possession in Public Cloud. IIH-MSP 2014: 775-778.
[22].Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage. IIH-MSP 2014: 779-782.
[23].Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 795-798
[24].Liming Fang, Willy Susilo, Jiandong Wang. Anonymous Conditional Proxy Re-encryption without Random Oracle. Proc. of ProvSec 2009. LNCS 5848, pp. 47-60. Heidelberg: Springer, 2009: 47-60. (EI)
[25].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. International Journal of Digital Content Technology and its Applications. 2010, 4(9):151-160. (EI)
[26].Liming Fang, Chunpeng Ge, Jiandong Wang, Yongjun Ren. Decryptable Public Key Encryption with Keyword Search Schemes. International Journal of Digital Content Technology and its Applications, 2010, 4(9):141-150. (EI)
[27].Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian. Chosen-Ciphertext Secure Fuzzy Identity-Based Encryption without ROM. Journal of Shanghai Jiaotong University, 2008, 13(6):646-650.(EI)
[28].Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. Proc. of CANS 2009. LNCS 5888, Heidelberg: Springer, 2009: 248-258. (EI)
[29].Liming Fang, Willy Susilo, Jiandong Wang. Anonymous Conditional Proxy Re-encryption without Random Oracle. Proc. of ProvSec 2009. LNCS 5848, pp. 47-60. Heidelberg: Springer, 2009: 47-60. (EI)
[30].Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian. Chosen-Ciphertext Secure Multi-authority Fuzzy Identity-Based Key Encapsulation without ROM. Proc. of 2008 International Conference on Computational Intelligence and Security, Vol. 1, 2008: 326-330. (EI)
[31].Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian: Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. IACR Cryptology ePrint Archive 2008: 139 (2008)
[32].Liming Fang, Jinyue Xia:Full Security: Fuzzy Identity Based Encryption. IACR Cryptology ePrint Archive 2008: 307 (2008)
[33].Guoan Zhao, Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren: Improved unidirectional chosen-ciphertext secure proxy re-encryption. WCNIS 2010: 476-480(EI)
[34].Guoan Zhao, Canghai Tan, Yongjun Ren, Liming Fang: An efficient unlinkable secret handshake protocol without ROM.WCNIS 2010: 486-490(EI)
[35].Yuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu: Weighted Margin Multi-Class Core Vector Machines. CIS (1) 2008: 235-239(EI)
[36].Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang. Identity-Based Key Issuing Protocol for Ad Hoc Networks. IEEE International Conference on Computational Intelligence and Security, 2007.12(EI)
[37].任勇军,王建东,庄毅,方黎明.基于属性的认证密钥协商协议.兰州大学学报,2010,46(2):103-110
[38].卞仕柱,王建东,任勇军,方黎明,夏金月.强安全高效的认证密钥交换协议.计算机工程, 2010,36 (07): 136-139
[39].夏金月,王建东,方黎明,任勇军,卞仕柱. ECK2007模型与其他密钥协商协议模型安全强弱关系的形式化证明. 南京航空航天大学学报英文版,2008,4(7):282-288. (EI)
[40].Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian: Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols. IACR Cryptology ePrint Archive 2008: 479 (2008)
[41].任勇军,王建东,庄毅,方黎明.基于双线性对的秘密重分配方案.兰州大学学报2008,44(1):82-85
[42].任勇军,王建东,庄毅,方黎明.一种动态的Ad Hoc网络密钥管理方案.南京航空航天大学学报,2007,39(9):810-813(EI)
[43].任勇军,王建东,庄毅,方黎明.基于身份的Ad Hoc网络密钥分发协议.武汉大学学报,2007,40(5):133-136

科研成果获奖及专利:
1、方黎明葛春鹏陈小杰,一种基于可搜索密文的智能家居安全访问方法及其系统,发明专利,专利申请日:2012-10-19,中国,申请号: **3.3
2、方黎明葛春鹏,一种基于运动检测的智能家居监控方法及其系统,发明专利,专利申请日:2012-08-28,中国,申请号: **9.9
3、方黎明陈小杰,一种万能遥控器关联方法及其系统,发明专利,专利申请日:2012-08-29,中国,申请号: **5.0
4、任勇军顾彬方黎明王建东,基于sniffer的无线传感网的入侵检测方法,发明专利,专利申请日:2010-07-28,中国,申请号: **8.3
5、应华方黎明,一种信息加密的无线灯联网系统及其加密通讯方法,发明专利,专利申请日:2011-06-23,中国,申请号: **9.8
6、任勇军方黎明葛春鹏王建东,基于可搜索密文的WSN数据安全处理方法,发明专利,专利申请日:2010-07-28,中国,申请号:**0.0
7、方黎明;葛春鹏,一种基于多agent的智能家居学习系统及方法,发明专利,专利申请日:2013-02-01,中国,申请号:**5.9
8、王建东;孙婷;方黎明;朱新峰;孙茂圣;王丽娜,基于AES加密的机场噪声预测数据网络传输方法, 发明专利,专利申请日:2013-06-8,中国,申请号: CN**3.5
9、赵国安刘玉龙薛琳强方黎明郁斌田明,无线传感器网络中执行非对称密码的方法,发明专利,专利申请日:2010-04-29,中国,申请号: **0.9
10、方黎明, 徐圣, 陈小杰,一种智能家居网关, 实用新型,中国,申请号: **7.7
11、方黎明,葛春鹏,一种智能家居监控系统,实用新型,中国,申请号: **8.5
12、方黎明, 应华, 徐圣,一种节能插座控制电路,实用新型,中国,申请号: **0.4

承担的科研项目情况:
1、支持多条件复杂匹配的代理重加密研究,国家自然科学基金(青年基金),项目编号:**,2017.1-2019.12,参与,国家级项目
2、可搜索公钥加密关键安全性问题的研究,国家自然科学基金(青年基金),项目编号:**,2014.1-2016.12,主持,国家级项目;
3、带多关键字搜索的公钥加密的研究,江苏省基础研究(自然科学基金),项目编号:BK**,2013.9-2016.12,主持,省部级项目;
4、基于多关键字的条件代理重加密的研究,中国博士后面上基金一等资助,项目编号:2013M530254,主持,省部级项目;
5、支持多关键词匹配的可搜索公钥加密的研究,中国博士后科学基金特别资助,主持,省部级项目;
6、支持复杂匹配搜索的可搜索公钥加密的研究, 江苏省博士后基金, 编号:**C,主持,省部级项目;
7、云计算演化环境中的隐私建模与检测方法研究,国家自然科学基金(面上项目),项目编号:**,81万,2013.1-2016.12,参与,国家级项目;
8、面向机场感知的噪声监测及其环境评估,国家自然基金重点项目,项目编号:**,280万,2011-2014,参与,国家级项目;


相关话题/发明专利 基金 系统 网络 博士后