ºº×壬1966ÄêÉú£¬°²»ÕÁù°²ÈË£¬ÏÖΪÑDz«APPÈë¿ÚÑDz«APPÈë¿Ú½ÌÊÚ£¬²©Ê¿£¬Ë¶Ê¿Éúµ¼Ê¦£¬½ÌÓý²¿¸ßµÈѧУÎĿƼÆËã»ú»ù´¡½Ìѧָµ¼Î¯Ô±»áίԱ£¬°²»ÕÊ¡¸ßµÈѧУѧ¿Æ´øÍ·ÈË£¬Ð£¼¶Öصãѧ¿Æ¡°¼ÆËã»úÓ¦Óü¼Êõ¡±Ñ§¿Æ´øÍ·ÈË¡£Ö÷Òª´ÓʼÆËã»úÍøÂç¡¢ÍøÂ簲ȫ¡¢ÏÖ´ú½ÌÓý¼¼ÊõµÈ·½ÃæµÄÑо¿¡£Ö÷³Ö»ò²ÎÓë¶àÏî¹ú¼Ò¼¶£¨863¡¢¹ú¼Ò×ÔÈ»»ù½ðµÈ£©ºÍÊ¡²¿¼¶ÏîÄ¿£¬·¢±íѧÊõÂÛÎÄËÄÊ®ÓàÆª¡£
ËùÊܽÌÓý
ѧʿ£¨1986Ä꣩ÑDz«APPÈë¿ÚÊýѧϵ
˶ʿ£¨1999Ä꣩¶«ÄÏ´óѧ¼ÆËã»ú¿ÆÑ§Ó빤³Ìϵ
²©Ê¿£¨2004Ä꣩¶«ÄÏ´óѧ¼ÆËã»ú¿ÆÑ§Ó빤³Ìϵ
Ö°³ÆÖ°Î»
1986Äê£1996Äê ÑDz«APPÈë¿ÚÖú½Ì¡¢½²Ê¦
2004Äê£ÏÖÔÚ ÑDz«APPÈë¿ÚÊýѧ¼ÆËã»ú¿ÆÑ§Ñ§Ôº¸±Ôº³¤
2005Äê£ÏÖÔÚ ½ÌÊÚ Ë¶Ê¿Éúµ¼Ê¦ °²»ÕÊ¡¸ßµÈѧУѧ¿Æ´øÍ·ÈË
¶þ¡¢ËùÊڿγÌ
Ñо¿Éú£º¸ß¼¶¼ÆËã»úÍøÂç¡¢¼ÆËã»úÍøÂ簲ȫ¡¢¼ÆËã»úÍøÂçÌåϵ½á¹¹
±¾¿ÆÉú£º²Ù×÷ϵͳ¡¢¼ÆËã»úÍøÂç¡¢¸ß¼¶ÓïÑÔ³ÌÐòÉè¼Æ¡¢¼ÆËã»ú¿ÆÑ§Óë¼¼Êõµ¼ÂÛ¡¢¼ÆËã»ú°²È«¼¼Êõ
Èý¡¢Ñо¿·½Ïò
¸ßÐÔÄܼÆËã»úÍøÂçÐÒ飬ÎÞÏßÍøÂçÐÒé£¬ÍøÂ簲ȫ£¬ÏÖ´ú½ÌÓý¼¼Êõ
ËÄ¡¢»ñ½±Çé¿ö£º
£¨1£©°²»Õʡģ·¶½Ìʦ£¬2007Äê
£¨2£©°²»ÕÊ¡½Ìѧ³É¹û½±¶þµÈ½±£º´óѧ¼ÆËã»ú»ù´¡ÎÞÖ½»¯¿¼ÊÔϵͳ(OTS)£¬µÚÒ»£¬2010Äê
£¨3£©°²»ÕÊ¡½Ìѧ³É¹ûÒ»µÈ½±£º¶à´ë²¢¾Ù£¬È«ÃæÌáÉý¸ßУÇàÄê½Ìʦ½ÌѧÄÜÁ¦£¬µÚÈý£¬2013Äê
Îå¡¢³Ðµ£¿ÎÌâ
£¨1£©¹ú¼Ò863ÏîÄ¿£ºHTTP°²È«Ä£ÐÍÑо¿¼°ÔÐÍϵͳ¿ª·¢£¨Ö÷³Ö£¬ÒѽáÌ⣩
£¨2£©½ËÕÊ¡¡°¾ÅÎ塱֨´ó¿Æ¼¼¹¥¹ØÏîÄ¿£º¿çÐÐÒµEDIÓ¦ÓÃϵͳ£¨Ö÷Òª²ÎÓ룬ÒѽáÌ⣩
£¨3£©¹ú¼Ò863ÏîÄ¿£ºExtranet¹Ø¼ü¼¼ÊõÑо¿£¨Ö÷Òª²ÎÓ룬ÒѽáÌ⣩
£¨4£©¹ú¼Ò×ÔÈ»¿ÆÑ§»ù½ðÖØ´óÏîÄ¿£º¸ßËÙÐÅÏ¢ÍøÖеĹؼü»ù´¡ÎÊÌ⣨Ö÷Òª²ÎÓ룬ÒѽáÌ⣩
£¨5£©¹ú¼Ò×ÔÈ»¿ÆÑ§»ù½ðÖØ´óÏîÄ¿£ºÏÂÒ»´úÍøÂç·þÎñÌåϵ½á¹¹¼°Æä¹Ø¼ü¼¼ÊõµÄÑо¿£¨Ö÷Òª²ÎÓ룬ÒѽáÌ⣩
£¨6£©°²»ÕÊ¡Èí¿ÆÑ§ÏîÄ¿£º°²»ÕÊ¡ÐÂÅ©´å½¨ÉèÖÐÐÅÏ¢×ÊԴƽ̨¹²Ïí»úÖÆÑо¿£¨Ö÷³Ö£¬ÒѽáÌ⣩
£¨7£©°²»ÕÊ¡×ÔÈ»¿ÆÑ§»ù½ðÏîÄ¿£ºÒì¹¹»·¾³Ï¿ÉËõ·Å¿É¿¿°²È«¶à²¥ÃÜÔ¿¸üм¼Êõ£¨Ö÷³Ö£¬ÒѽáÌ⣩
£¨8£©°²»ÕÊ¡¸ßУ×ÔÈ»»ù½ðÖØµã×ÊÖúÏîÄ¿£º°²È«¶à²¥ÖеÄ×éÃÜÔ¿¹ÜÀí¼¼Êõ£¨Ö÷³Ö£¬ÒѽáÌ⣩
£¨9£©°²»ÕÊ¡½ÌÓýÌü½ÌÑÐÏîÄ¿£º¼ÆËã»úÍøÂç¿Î³ÌÌåϵ½¨É裨Ö÷³Ö£¬ÒѽáÌ⣩
£¨10£©¶ÀÁ¢Ñ§Ôº¡°Ê®Ò»Î塱¹ú¼Ò¿ÎÌâ¡°ÎÒ¹ú¸ßУӦÓÃÐÍÈ˲ÅÅàÑøÄ£Ê½Ñо¿¡±×ÓÏîÄ¿£º¼ÆËã»úÍøÂç¿Î³ÌÌåϵ½¨É裨Ö÷³Ö£¬ÒѽáÌ⣩
£¨11£©°²»ÕÊ¡¾«Æ·¿Î³Ì£º¼ÆËã»ú»ù´¡£¨¹«¹²¿Î£©£¨Ö÷³Ö£¬ÒѽáÌ⣩
£¨12£©ÎߺþÊоö²ß×Éѯ¹«¿ªÕбê¿ÎÌ⣺½¨ÉèÎߺþÊý×Ö³ÇÊÐÑо¿£¨Ö÷³Ö£¬ÒѽáÌ⣩
£¨13£©ÎߺþÊоö²ß×Éѯ¹«¿ªÕбê¿ÎÌ⣺Îߺþ½¨Éè¡°Öǻ۳ÇÊС±Ñо¿£¨Ö÷³Ö£¬ÒѽáÌ⣩
£¨14£©°²»ÕÊ¡½ÌÓýÌüÖØ´ó½Ìѧ¸Ä¸ïÑо¿ÏîÄ¿£ºÃæÏò¼ÆËã˼άÅàÑøµÄ¸ßУ´óѧ¼ÆËã»ú»ù´¡½Ìѧ¸Ä¸ïÓëʵ¼ù£¨Ö÷³Ö£¬ÔÚÑУ©
Áù¡¢Ö÷ÒªÑо¿ÂÛÎÄÓë½Ì²Ä
£¨Ò»£©½Ì²Ä
£¨1£©¡¶´óѧ¼ÆËã»úÓ¦Óûù´¡¡·£¨µÚÒ»°æ£¬µÚ¶þ°æ£©£¬ºÏ·Ê£ºÖйú¿Æ¼¼´óѧ³ö°æÉ磬2006Ä꣬°²»ÕÊ¡¡°Ê®Ò»Î塱¹æ»®½Ì²Ä
£¨2£©¡¶CÓïÑÔ³ÌÐòÉè¼Æ½Ì³Ì£¨µÚ¶þ°æ£©¡·£¬±±¾©£ºÇ廪´óѧ³ö°æÉ磬2006Äê
£¨3£©¡¶InternetʵÓüòÃ÷½Ì³Ì¡·£¬±±¾©£ºÇ廪´óѧ³ö°æÉ磬2009Äê
£¨4£©¡¶CÓïÑÔ³ÌÐòÉè¼ÆÓ¦Óý̡̳·£¬±±¾©£º¿ÆÑ§³ö°æÉ磬2011Äê2ÔÂ
£¨5£©¡¶CÓïÑÔ³ÌÐòÉè¼Æ½Ì³Ì¡·£¬ÖØÇì£ºÖØÇì´óѧ³ö°æÉ磬2011Äê1ÔÂ
£¨6£©¡¶¼ÆËã»úÓ¦Óûù´¡°¸Àý½Ì³Ì¡·£¬±±¾©£º¿ÆÑ§³ö°æÉ磬2011Äê7ÔÂ
£¨7£©¡¶´óѧ¼ÆËã»úÓ¦Óûù´¡½Ì³Ì¡·£¬±±¾©£º¸ßµÈ½Ìѧ³ö°æÉ磬2011Äê6ÔÂ
£¨8£©¡¶´óѧ¼ÆËã»úÓ¦ÓÃʵÑé½Ì³Ì¡·£¬±±¾©£º¸ßµÈ½Ìѧ³ö°æÉ磬2012Äê8ÔÂ
£¨¶þ£©ÂÛÎÄ
£¨1£© ÐíÓ£¬¿ÂÃÎÑÅ£¬»ùÓڷǺÏ×÷²©ÞĵÄWBANs¹¦ÂÊ¿ØÖÆËã·¨[J]£¬ÏµÍ³·ÂÕæÑ§±¨£¬2018,30£¨4£©£º1601-1607.
£¨2£© ÁõÏîÑó, ÐíÓÂ. ¿ìËÙDCTÐÞ¼ôÔÚDSPÉϵÄÄÚ´æ·ÃÎÊÓÅ»¯·½·¨[J].µç×Óѧ±¨. 2016,44 (1): 227-232.
£¨3£©Yong Xu,Feng Liu.Hybrid
Key Management Scheme for Preventing Man-in-Middle Attack in Hetergeneous
Sensor Networks. 2017 3nd IEEE International Conference on Computer and
Communications (ICCC),Chengdu, China, ISBN:978-1-5090-6350-5, 2017:1421-1425.£¨EI£©
£¨4£© Yong Xu,Mengya
Ke,Fen Liu,Qianmin Zha. A Self-adaptive Power Control Algorithm Based on Game
Theory for Inter-WBAN Interference Mitigation.2016 2nd IEEE International
Conference on Computer and Communications (ICCC),Chengdu, China,
ISBN:978-1-5090-4498-6, 2016:2873-2877.£¨EI£©
£¨5£©ÎâÐñ溣¬ÐíÓ£¬ÕÅÑÇéª. »ùÓÚÖ¸ÎÆÄ£Ê½Æ¥ÅäµÄÎÞÏß´«¸ÐÆ÷ÍøÂçÃÜÔ¿Ô¤·ÖÅä·½°¸. ¼ÆËã»ú¹¤³Ì. 2015, 41(3):106-109
£¨6£©ÕÅÑÇ骣¬ÐíÓ£¬ÎâÐñæº. »ùÓÚËæ»ú½Ç¶ÈµÄÔöÇ¿ÐÍԴλÖÃÒþ˽±£»¤ÐÒ飬¼ÆËã»ú¹¤³ÌÓëÓ¦ÓÃ.2015,18:1-7.
£¨7£©Zhu Xiaowei£¬Xu Yong, Zhao Huanhuan. An Optimization
of Rekeying Scheme for Secure Multicast. 2010 International Conference on Web
Information Systems and Mining(WISM'10),2010.10.
£¨8£©Zhao Huanhuan£¬Xu Yong, Zhu
Xiaowei. Research on Update Strategy in Batch Group Re-keying. 2010
International Conference on Computer£¬Mechatronics,
Control and Electronic Engineering(CMCE 2010), 2010.8.
£¨9£©Yong Xu, Kechun Zhao, Wei Zhang. Research on an
Adaptive WKA Method in Secure Multicast[C]. Proceedings of the 2008
International Conference on Communications in Computing, CIC 2008, Las Vegas,
Nevada, USA, CSREA Press ISBN 1-60132-058-2£¬2008£º30-35. £¨EI£©
£¨10£© ÕÅ࣬ÐíÓ£¬ÕÔ¿Ë´¾.»ùÓÚPIM-DMʵʱÃÜÔ¿µÄ¸üзÂÕæ.¼ÆËã»ú¹¤³Ì.2007,12£º176-178.
£¨11£© ÐíÓ£¬ÅúÁ¿ÃÜÔ¿¸üÐÂÖÐÃÜÔ¿×éÖ¯·½·¨µÄÑо¿ÓëʵÏÖ[J]£¬¶«ÄÏ´óѧѧ±¨×ÔÈ»¿ÆÑ§°æ[J]£¬2006£¬36£¨3£©£º488-492. £¨EI£©
£¨12£© ÐíÓ£¬¿ÉËõ·Å°²È«¶à²¥Í¨ÐÅϵͳµÄÑо¿ºÍʵÏÖ[J]. ¼ÆËã»ú¹¤³ÌÓëÓ¦Óã¬2005£¬41£¨19£©£º116-118.
£¨13£© ÐíÓ£¬³Ââý£¬°²È«¶à²¥ÖлùÓÚ³ÉÔ±ÐÐΪµÄLKH·½·¨¨DR-LKH[J]. Èí¼þѧ±¨.
2005,16£¨4£©£º601-608. £¨EI£©
£¨14£© ÐíÓ£¬ÁèÁú£¬¹Ë¹ÚȺ. ¿É¿¿¿ÉËõ·Å°²È«¶à²¥ÃÜÔ¿¸üÐÂʵÏÖÑо¿[J]. ¼ÆËã»úÑо¿Óë·¢Õ¹. 2004, 41£¨6£©£º934-939.£¨EI£©
£¨15£© ÐíÓ£¬Ò¶Îý¾ý£¬Îâ¹úУ¬¹Ë¹ÚȺ. Ò»ÖÖ»ùÓÚHTTP°²È«Ä£Ð͵ÄÉè¼ÆºÍʵÏÖ[J]£¬¼ÆËã»ú¹¤³ÌÓëÓ¦Óã¬2002,38£¨8£©£º175-177.
£¨16£© ÐíÓ£¬Îâ¹úУ¬¹Ë¹ÚȺ. ÒòÌØÍøEDIµÄ°²È«Ñо¿¼°ÊµÏÖ[J]£¬¶«ÄÏ´óѧѧ±¨×ÔÈ»¿ÆÑ§°æ£¬2002,32£¨1£©£º1-5. £¨EI£©
£¨17£© Shu Kun£¬Xu Yong, Wu Guoxin. The
Research and Implement on HTTP Tunneling. Journal of Southeast University.
2000, 16£¨2£©£º52-57.
Æß¡¢ÁªÏµ·½Ê½
Email£ºyxull@ahnu.edu.cn