ÑDz«APPÈë¿Ú

ÑDz«APPÈë¿Ú: ÑDz«APPÈë¿Ú

ÁªÏµÎÒÃÇ Ê¦´óÊ×Ò³

ÑDz«APPÈë¿Ú:

ÑDz«APPÈë¿Ú:

ÑDz«APPÈë¿Ú:ÐíÓÂ

·¢²¼ÈÕÆÚ£º2018-03-05 ä¯ÀÀ´ÎÊý£º ·¢²¼ÈË£ºÍõÕý¶«

Ò»¡¢¸öÈ˼ò½é

 

        

ºº×壬1966ÄêÉú£¬°²»ÕÁù°²ÈË£¬ÏÖΪÑDz«APPÈë¿ÚÑDz«APPÈë¿Ú½ÌÊÚ£¬²©Ê¿£¬Ë¶Ê¿Éúµ¼Ê¦£¬½ÌÓý²¿¸ßµÈѧУÎĿƼÆËã»ú»ù´¡½Ìѧָµ¼Î¯Ô±»áίԱ£¬°²»ÕÊ¡¸ßµÈѧУѧ¿Æ´øÍ·ÈË£¬Ð£¼¶Öصãѧ¿Æ¡°¼ÆËã»úÓ¦Óü¼Êõ¡±Ñ§¿Æ´øÍ·ÈË¡£Ö÷Òª´ÓʼÆËã»úÍøÂç¡¢ÍøÂ簲ȫ¡¢ÏÖ´ú½ÌÓý¼¼ÊõµÈ·½ÃæµÄÑо¿¡£Ö÷³Ö»ò²ÎÓë¶àÏî¹ú¼Ò¼¶£¨863¡¢¹ú¼Ò×ÔÈ»»ù½ðµÈ£©ºÍÊ¡²¿¼¶ÏîÄ¿£¬·¢±íѧÊõÂÛÎÄËÄÊ®ÓàÆª¡£

 

ËùÊܽÌÓý

    Ñ§Ê¿£¨1986Ä꣩ÑDz«APPÈë¿ÚÊýѧϵ

    Ë¶Ê¿£¨1999Ä꣩¶«ÄÏ´óѧ¼ÆËã»ú¿ÆÑ§Ó빤³Ìϵ

    ²©Ê¿£¨2004Ä꣩¶«ÄÏ´óѧ¼ÆËã»ú¿ÆÑ§Ó빤³Ìϵ

Ö°³ÆÖ°Î»

    1986Ä꣭1996Äê ÑDz«APPÈë¿ÚÖú½Ì¡¢½²Ê¦

    2004Ä꣭ÏÖÔÚ ÑDz«APPÈë¿ÚÊýѧ¼ÆËã»ú¿ÆÑ§Ñ§Ôº¸±Ôº³¤

    2005Ä꣭ÏÖÔÚ ½ÌÊÚ Ë¶Ê¿Éúµ¼Ê¦ °²»ÕÊ¡¸ßµÈѧУѧ¿Æ´øÍ·ÈË

 

¶þ¡¢ËùÊڿγÌ

   Ñо¿Éú£º¸ß¼¶¼ÆËã»úÍøÂç¡¢¼ÆËã»úÍøÂ簲ȫ¡¢¼ÆËã»úÍøÂçÌåϵ½á¹¹

   ±¾¿ÆÉú£º²Ù×÷ϵͳ¡¢¼ÆËã»úÍøÂç¡¢¸ß¼¶ÓïÑÔ³ÌÐòÉè¼Æ¡¢¼ÆËã»ú¿ÆÑ§Óë¼¼Êõµ¼ÂÛ¡¢¼ÆËã»ú°²È«¼¼Êõ

 

Èý¡¢Ñо¿·½Ïò

   ¸ßÐÔÄܼÆËã»úÍøÂçЭÒ飬ÎÞÏßÍøÂçЭÒé£¬ÍøÂ簲ȫ£¬ÏÖ´ú½ÌÓý¼¼Êõ

 

ËÄ¡¢»ñ½±Çé¿ö£º

£¨1£©°²»Õʡģ·¶½Ìʦ£¬2007Äê

£¨2£©°²»ÕÊ¡½Ìѧ³É¹û½±¶þµÈ½±£º´óѧ¼ÆËã»ú»ù´¡ÎÞÖ½»¯¿¼ÊÔϵͳ(OTS)£¬µÚÒ»£¬2010Äê

£¨3£©°²»ÕÊ¡½Ìѧ³É¹ûÒ»µÈ½±£º¶à´ë²¢¾Ù£¬È«ÃæÌáÉý¸ßУÇàÄê½Ìʦ½ÌѧÄÜÁ¦£¬µÚÈý£¬2013Äê

 

Îå¡¢³Ðµ£¿ÎÌâ

£¨1£©¹ú¼Ò863ÏîÄ¿£ºHTTP°²È«Ä£ÐÍÑо¿¼°Ô­ÐÍϵͳ¿ª·¢£¨Ö÷³Ö£¬ÒѽáÌ⣩

£¨2£©½­ËÕÊ¡¡°¾ÅÎ塱֨´ó¿Æ¼¼¹¥¹ØÏîÄ¿£º¿çÐÐÒµEDIÓ¦ÓÃϵͳ£¨Ö÷Òª²ÎÓ룬ÒѽáÌ⣩

£¨3£©¹ú¼Ò863ÏîÄ¿£ºExtranet¹Ø¼ü¼¼ÊõÑо¿£¨Ö÷Òª²ÎÓ룬ÒѽáÌ⣩

£¨4£©¹ú¼Ò×ÔÈ»¿ÆÑ§»ù½ðÖØ´óÏîÄ¿£º¸ßËÙÐÅÏ¢ÍøÖеĹؼü»ù´¡ÎÊÌ⣨Ö÷Òª²ÎÓ룬ÒѽáÌ⣩

£¨5£©¹ú¼Ò×ÔÈ»¿ÆÑ§»ù½ðÖØ´óÏîÄ¿£ºÏÂÒ»´úÍøÂç·þÎñÌåϵ½á¹¹¼°Æä¹Ø¼ü¼¼ÊõµÄÑо¿£¨Ö÷Òª²ÎÓ룬ÒѽáÌ⣩

£¨6£©°²»ÕÊ¡Èí¿ÆÑ§ÏîÄ¿£º°²»ÕÊ¡ÐÂÅ©´å½¨ÉèÖÐÐÅÏ¢×ÊԴƽ̨¹²Ïí»úÖÆÑо¿£¨Ö÷³Ö£¬ÒѽáÌ⣩

£¨7£©°²»ÕÊ¡×ÔÈ»¿ÆÑ§»ù½ðÏîÄ¿£ºÒì¹¹»·¾³Ï¿ÉËõ·Å¿É¿¿°²È«¶à²¥ÃÜÔ¿¸üм¼Êõ£¨Ö÷³Ö£¬ÒѽáÌ⣩

£¨8£©°²»ÕÊ¡¸ßУ×ÔÈ»»ù½ðÖØµã×ÊÖúÏîÄ¿£º°²È«¶à²¥ÖеÄ×éÃÜÔ¿¹ÜÀí¼¼Êõ£¨Ö÷³Ö£¬ÒѽáÌ⣩

£¨9£©°²»ÕÊ¡½ÌÓýÌü½ÌÑÐÏîÄ¿£º¼ÆËã»úÍøÂç¿Î³ÌÌåϵ½¨É裨Ö÷³Ö£¬ÒѽáÌ⣩

£¨10£©¶ÀÁ¢Ñ§Ôº¡°Ê®Ò»Î塱¹ú¼Ò¿ÎÌâ¡°ÎÒ¹ú¸ßУӦÓÃÐÍÈ˲ÅÅàÑøÄ£Ê½Ñо¿¡±×ÓÏîÄ¿£º¼ÆËã»úÍøÂç¿Î³ÌÌåϵ½¨É裨Ö÷³Ö£¬ÒѽáÌ⣩

£¨11£©°²»ÕÊ¡¾«Æ·¿Î³Ì£º¼ÆËã»ú»ù´¡£¨¹«¹²¿Î£©£¨Ö÷³Ö£¬ÒѽáÌ⣩

£¨12£©ÎߺþÊоö²ß×Éѯ¹«¿ªÕбê¿ÎÌ⣺½¨ÉèÎߺþÊý×Ö³ÇÊÐÑо¿£¨Ö÷³Ö£¬ÒѽáÌ⣩

£¨13£©ÎߺþÊоö²ß×Éѯ¹«¿ªÕбê¿ÎÌ⣺Îߺþ½¨Éè¡°Öǻ۳ÇÊС±Ñо¿£¨Ö÷³Ö£¬ÒѽáÌ⣩

£¨14£©°²»ÕÊ¡½ÌÓýÌüÖØ´ó½Ìѧ¸Ä¸ïÑо¿ÏîÄ¿£ºÃæÏò¼ÆËã˼άÅàÑøµÄ¸ßУ´óѧ¼ÆËã»ú»ù´¡½Ìѧ¸Ä¸ïÓëʵ¼ù£¨Ö÷³Ö£¬ÔÚÑУ©

 

Áù¡¢Ö÷ÒªÑо¿ÂÛÎÄÓë½Ì²Ä

£¨Ò»£©½Ì²Ä

£¨1£©¡¶´óѧ¼ÆËã»úÓ¦Óûù´¡¡·£¨µÚÒ»°æ£¬µÚ¶þ°æ£©£¬ºÏ·Ê£ºÖйú¿Æ¼¼´óѧ³ö°æÉ磬2006Ä꣬°²»ÕÊ¡¡°Ê®Ò»Î塱¹æ»®½Ì²Ä

£¨2£©¡¶CÓïÑÔ³ÌÐòÉè¼Æ½Ì³Ì£¨µÚ¶þ°æ£©¡·£¬±±¾©£ºÇ廪´óѧ³ö°æÉ磬2006Äê

£¨3£©¡¶InternetʵÓüòÃ÷½Ì³Ì¡·£¬±±¾©£ºÇ廪´óѧ³ö°æÉ磬2009Äê

£¨4£©¡¶CÓïÑÔ³ÌÐòÉè¼ÆÓ¦Óý̡̳·£¬±±¾©£º¿ÆÑ§³ö°æÉ磬2011Äê2ÔÂ

£¨5£©¡¶CÓïÑÔ³ÌÐòÉè¼Æ½Ì³Ì¡·£¬ÖØÇì£ºÖØÇì´óѧ³ö°æÉ磬2011Äê1ÔÂ

£¨6£©¡¶¼ÆËã»úÓ¦Óûù´¡°¸Àý½Ì³Ì¡·£¬±±¾©£º¿ÆÑ§³ö°æÉ磬2011Äê7ÔÂ

£¨7£©¡¶´óѧ¼ÆËã»úÓ¦Óûù´¡½Ì³Ì¡·£¬±±¾©£º¸ßµÈ½Ìѧ³ö°æÉ磬2011Äê6ÔÂ

£¨8£©¡¶´óѧ¼ÆËã»úÓ¦ÓÃʵÑé½Ì³Ì¡·£¬±±¾©£º¸ßµÈ½Ìѧ³ö°æÉ磬2012Äê8ÔÂ

£¨¶þ£©ÂÛÎÄ 

£¨1£© ÐíÓ£¬¿ÂÃÎÑÅ£¬»ùÓڷǺÏ×÷²©ÞĵÄWBANs¹¦ÂÊ¿ØÖÆËã·¨[J]£¬ÏµÍ³·ÂÕæÑ§±¨£¬2018,30£¨4£©£º1601-1607.

£¨2£© ÁõÏîÑó, ÐíÓÂ. ¿ìËÙDCTÐÞ¼ôÔÚDSPÉϵÄÄÚ´æ·ÃÎÊÓÅ»¯·½·¨[J].µç×Óѧ±¨. 2016,44 (1): 227-232.

£¨3£©Yong Xu,Feng Liu.Hybrid Key Management Scheme for Preventing Man-in-Middle Attack in Hetergeneous Sensor Networks. 2017 3nd IEEE International Conference on Computer and Communications (ICCC),Chengdu, China, ISBN:978-1-5090-6350-5, 2017:1421-1425.£¨EI£©

£¨4£© Yong Xu,Mengya Ke,Fen Liu,Qianmin Zha. A Self-adaptive Power Control Algorithm Based on Game Theory for Inter-WBAN Interference Mitigation.2016 2nd IEEE International Conference on Computer and Communications (ICCC),Chengdu, China, ISBN:978-1-5090-4498-6, 2016:2873-2877.£¨EI£©

£¨5£©ÎâÐñ溣¬ÐíÓ£¬ÕÅÑÇéª. »ùÓÚÖ¸ÎÆÄ£Ê½Æ¥ÅäµÄÎÞÏß´«¸ÐÆ÷ÍøÂçÃÜÔ¿Ô¤·ÖÅä·½°¸. ¼ÆËã»ú¹¤³Ì. 2015, 41(3):106-109

£¨6£©ÕÅÑÇ骣¬ÐíÓ£¬ÎâÐñæº. »ùÓÚËæ»ú½Ç¶ÈµÄÔöÇ¿ÐÍԴλÖÃÒþ˽±£»¤Ð­Ò飬¼ÆËã»ú¹¤³ÌÓëÓ¦ÓÃ.2015,18:1-7.

£¨7£©Zhu Xiaowei£¬Xu Yong, Zhao Huanhuan. An Optimization of Rekeying Scheme for Secure Multicast. 2010 International Conference on Web Information Systems and Mining(WISM'10),2010.10.

£¨8£©Zhao Huanhuan£¬Xu Yong, Zhu Xiaowei.  Research on Update Strategy in Batch Group Re-keying. 2010 International Conference on Computer£¬Mechatronics, Control and Electronic Engineering(CMCE 2010), 2010.8.

£¨9£©Yong Xu,  Kechun  Zhao, Wei Zhang. Research on an Adaptive WKA Method in Secure Multicast[C]. Proceedings of the 2008 International Conference on Communications in Computing, CIC 2008, Las Vegas, Nevada, USA, CSREA Press ISBN 1-60132-058-2£¬2008£º30-35. £¨EI£©

£¨10£©  ÕÅ࣬ÐíÓ£¬ÕÔ¿Ë´¾.»ùÓÚPIM-DMʵʱÃÜÔ¿µÄ¸üзÂÕæ.¼ÆËã»ú¹¤³Ì.2007,12£º176-178.

£¨11£©  ÐíÓ£¬ÅúÁ¿ÃÜÔ¿¸üÐÂÖÐÃÜÔ¿×éÖ¯·½·¨µÄÑо¿ÓëʵÏÖ[J]£¬¶«ÄÏ´óѧѧ±¨×ÔÈ»¿ÆÑ§°æ[J]£¬2006£¬36£¨3£©£º488-492. £¨EI£©

£¨12£©  ÐíÓ£¬¿ÉËõ·Å°²È«¶à²¥Í¨ÐÅϵͳµÄÑо¿ºÍʵÏÖ[J]. ¼ÆËã»ú¹¤³ÌÓëÓ¦Óã¬2005£¬41£¨19£©£º116-118.

£¨13£©  ÐíÓ£¬³Ââý£¬°²È«¶à²¥ÖлùÓÚ³ÉÔ±ÐÐΪµÄLKH·½·¨¨DR-LKH[J]. Èí¼þѧ±¨. 2005,16£¨4£©£º601-608. £¨EI£©

£¨14£©  ÐíÓ£¬ÁèÁú£¬¹Ë¹ÚȺ. ¿É¿¿¿ÉËõ·Å°²È«¶à²¥ÃÜÔ¿¸üÐÂʵÏÖÑо¿[J]. ¼ÆËã»úÑо¿Óë·¢Õ¹. 2004, 41£¨6£©£º934-939.£¨EI£©

£¨15£©  ÐíÓ£¬Ò¶Îý¾ý£¬Îâ¹úУ¬¹Ë¹ÚȺ. Ò»ÖÖ»ùÓÚHTTP°²È«Ä£Ð͵ÄÉè¼ÆºÍʵÏÖ[J]£¬¼ÆËã»ú¹¤³ÌÓëÓ¦Óã¬2002,38£¨8£©£º175-177.

£¨16£©  ÐíÓ£¬Îâ¹úУ¬¹Ë¹ÚȺ. ÒòÌØÍøEDIµÄ°²È«Ñо¿¼°ÊµÏÖ[J]£¬¶«ÄÏ´óѧѧ±¨×ÔÈ»¿ÆÑ§°æ£¬2002,32£¨1£©£º1-5. £¨EI£©

£¨17£©  Shu Kun£¬Xu Yong, Wu Guoxin. The Research and Implement on HTTP Tunneling. Journal of Southeast University. 2000, 16£¨2£©£º52-57.

 

Æß¡¢ÁªÏµ·½Ê½

Email£ºyxull@ahnu.edu.cn

ÑDz«APPÈë¿Ú-¹Ù·½ÍøÕ¾