马建峰

王朝百科·作者佚名  2011-02-21  
宽屏版  字体: |||超大  

马建峰

马建峰

西安电子科技大学校内特聘教授,计算机系统结构专业和密码学专业博士生导师,计算机网络与信息安全教育部/信息产业部重点实验室主任,计算机学院院长,陕西省优秀留学回国人员。1963年生于西安,1985年获陕西师范大学数学系理学学士;1988年3月获西安电子科技大学计算机系计算机软件专业工学硕士,1995年获西安电子科技大学信息工程系通信与电子系统专业工学博士。入选教育部千百人才计划。

2010年被评为长江学者特聘教授。

一、部分论文

1)王超,马建峰,“Design and Implementation of Survivable NetworkSystem”,LNCS 3645, Part II, 2005

2)王巍,马建峰,“Efficient Group KeyManagement for Dynamic Peer Networks”,LNCS 3794, 2005

3)曾勇,马建峰,“ATraffic Model of Intrusion Detection System and Its Applications”,LNAI3802,2005

4)李兴华,马建峰,“On the security of Canetti-Krawczyk model”,LNAI3802,2005

5)张帆,马建峰,“The Security proof of a 4-way handshake protocol inIEEE 802.11i”,LNAI 3802,2005

6)Zhang Yunkai, Wang Fangwei, WangChangguang, Ma Jianfeng,“Worm Propagation Modeling and Analysis onNetwork”,LNAI 3802, 2005

7)张帆,马建峰,“Security Analysis on ChineseWireless LAN Standard and Its Solution”,2005 International Workshop onWireless and Sensor Networks (ICPP 2005)

8)赖晓龙,马建峰,“可证明安全的802.11iRSN认证方案”,计算机学报,2005,28(12)

9)郭渊博,马建峰,王亚弟.“一种高效的基于图的攻击结构的秘密共享方案”,计算机研究与发展. 2005, 42(5)

10)郭渊博,马建峰,“基于博弈论框架的自适应网络入侵检测与响应”,系统工程与电子技术,2005, 27(5)

11)郭渊博,马建峰,“一种安全的分布式会议密钥分配方案及其实现”,系统工程与电子技术, 2005, 27(3)

12)俞艳苹,郭渊博,马建峰,“基于自适应大数表决机制的容忍入侵模型”,系统工程与电子技术,2005, 27(6)

13)胡永洁,郭渊博,马建峰.“基于排序机制的全序广播算法分类与性能分析”,系统工程与电子技术, 2005, 27(1)

14)ZHUJianming,MA Jianfeng. “Intrusion-Tolerant Based Survivable Model ofDatabase System”. Chinese Journal of Electronics, 2005, 14(3)

15)GUOYuanbo, MA Jianfeng. “A New and Efficient Secret Sharing in Graph-BasedProhibited Structures”. Chinese Journal of Electronics. 2005, 14(3)

16)GUO Yuanbo, MA Jianfeng. “Formal Specification of theIntrusion-Tolerant System by Using Object-Z”. Journal of InternetTechnology, 2005

17)GUO Yuanbo, MA Jianfeng, WANG Yadi. “AnIntrusion-Resilient Authorization and Authentication Framework for GridComputing Infrastructure”. International Conference on ComputationalScience 2005. Lecture Notes in Computer Science 3516, Springer-Verlag,Berlin, May 2005

18)GUO Yuanbo, MA Jianfeng. “An intrusion-tolerantauthorization and authentication scheme in distributed environments”.ACM SIGOPS Operating Systems Review, 2004, 38(4)

19)GUO Yuanbo, MAJianfeng, WANG Yadi. “Application of Cloud Models in Network SecuritySituation Assessment”. 6th International Symposium on Test andMeasurement Technology. Dalian, China. June 1-4,2005

20)GUO Yuanbo, MAJianfeng. “Secure and Intrusion-tolerant Authorization andAuthentication in Distributed Environments”. The 38th HawaiiInternational Conference on System Sciences. Jan 2005. IEEE Press

21)李兴华,马建峰,“Security Extension for the Canetti-Krawczyk Model inIdentity-based Systems”,中国科学(F辑),2005(1)

22)郭渊博,史庭俊,马建峰.一种容忍入侵结构的Z规格说明. 系统仿真学报. 2004, 16(12)

23)Wang Liangmin, MA Jianfeng,Yongzhao Zhan, “Enhancing the content of the intrusion alerts usinglogic correlation”, Content Computing,Lecture Notes in ComputerScience, LNCS 3309, Chi-Hung Chi, Kwok-Yan Lam (Eds.), Springer-VerlagBerlin Heidelberg 2004

24)Wang Chao and Ma Jianfeng, “AvailabilityAnalysis and Comparison of Different Intrusion-Tolerant Systems”,Content Computing,Lecture Notes in Computer Science, LNCS 3309,Chi-Hung Chi, Kwok-Yan Lam (Eds.), Springer-Verlag Berlin Heidelberg2004

25)GUO Yuanbo, MA Jianfeng. “An Efficient Construction of SecretSharing for Generalized Adversary Structure and Its Reduction”. SecondInternational Conference on Communications, Circuits and Systems. Jun17-29, 2004. IEEE Press

26)SHI Tingjun, MA Jianfeng. “A Fault-Tolerantand Secure Multi-Conference-Key Agreement Protocol”,InternationalConference on Communications, Circuits and Systems, (ICCCAS04),Jun17-29,2004, IEEE Press

27)ZHU Jianming, Wang Ninghong, MA Jianfeng. “Amicro-payment scheme for multiple-vendor in m-commerce”. IEEEInternational Conference on e-Commerce Technology for DynamicE-Business, 2004.9, IEEE Press

28)ZHU Jianming, MA Jianfeng. “A NewAuthentcation Scheme with Anonymity for Wireless Environment”. IEEETransactions on Consumer Electronics, 2004(2)

29)GUO Yuanbo, MAJianfeng. “Secret Sharing Scheme Realizing Generalized AdversaryStructure”. Journal of Computer Science and Technology, 2004(3)

30)GUOYuanbo, MA Jianfeng. “An Efficient and Secure Fault-tolerantConference-Key Distribution Protocol”. IEEE Transactions on ConsumerElectronics,2004(3)

31)李兴华,马建峰,“基于身份密码系统下Canetti-Krawczyk模型的安全扩展”,中国科学(E辑),2004(10)

32)李兴华,马建峰,“MobileIPv6中建立IPSec的一种新方法”,通信学报,2004(5);

33)朱建明,马建峰,“一种高效的具有用户匿名的无线认证协议”,通信学报,2004(5)

34)郭渊博,马建峰,“异步及不可靠链路环境下的先应式秘密共享”.电子学报,2004(3)

35)郭渊博,马建峰.“分布式环境下一种实用的先应式秘密共享方法”. 系统工程与电子技术, 2004(6)

36)GUO Yuanbo, MA Jianfeng.“An Efficient and Robust Conference Key Distribution Protocol”. The2003 International Conference on Computer Networks and MobileComputing. Oct 2003. IEEE Press

37)ZENG Yong, MA Jianfeng.“Pseudorandom Number Generators Based on Evolutionary Algorithm”. IEEEConference on Evolutionary Computation. Australia. Oct.2003 IEEE Press

38)Jian-Feng Ma等. “A New Group Signature Scheme and its Performance”.Chinese Journal of Electronics, No.3, 2001

39)Jian-Feng Ma等. “A NovelCollusion-Secure Fingerprinting Scheme for Digital Data Based on LinearCodes”. Journal of Software, No.3, 2002

40)Jian-Feng Ma等,”Efficientdesign of multiprocessor systems for fault detection and location”. IEEElectronics Letters, 1998.09.

41)Jian-Feng Ma等,”Decoding of the GolayCode”, IEE Electronics Letters, 1997.10

42)Jian-Feng Ma等,”Linear Codeswith Pless Structures”, IEE Electronics Letters, 1997.12

43)Jian-FengMa等,”Trellis Structures of Block Codes and Their Decoding”, Journal ofElectronics, No.2, 1997

44)Jian-Feng Ma等,”A novel concurrent errordetection/correction scheme for FFT”,Journal of Electronics, 1997.10

45)马建峰等,“容错数字信号处理系统的设计:方法及实现”.计算机学报,1997.01

46)马建峰等,“FFT网络有效的并发错误检测、定位和纠错”.计算机学报,1997.10

47)马建峰等,“容错矩阵分解与线性方程组求解”.计算机学报,1998.08

48)马建峰等,“一类新的适用于算法容错的加权校验和编码方案”.电子学报,1997.10

49)马建峰等,“一类循环码的神经网络软判决译码”.电子学报,1996.04

50)马建峰等,“两类新的线性分组码的译码”. 电子学报,1996.10

51)马建峰等,“Golay码的快速译码”.通信学报,No.4, 1996

52)马建峰等,“几类格的快速译码”,电子科学学刊,No.6,1996

53)马建峰等,“一类三元线性分组码的译码”,通信学报,No.6, 1996

二、主要著作

1)马建峰,郭渊博,“计算机系统安全”.西安电子科技大学出版社,2005

2)马建峰,朱建明,“无线局域网安全-方法与技术”.机械工业出版社,2005

3)王新梅、张焕国、马建峰等,“计算机中的编码技术”.人民邮电出版社,1999.(全国高技术重点图书)

三、科研获奖

1)“分组码快速译码研究”,1997.12,电子工业部科技进步三等奖;

2)“情报侦察数据融合专家系统及开发工具研究”,2001.12,国防科学技术委员会国防科学技术三等奖;

3)“计算机中的纠错码技术”,2001.12,国家新闻出版署第十界全国优秀科技图书三等奖;

4)“宽带无线IP网络系统安全技术”,中国通信学会科学技术成果二等奖,2005.12。

四、发明专利

1)宽带无线IP网络安全体系结构与安全实现方法(申请号:200410026211.9, 公开号:CN1585405A)

2)基于漫游密钥交换认证协议的无线局域网接入方法(申请号:200410025973.7, 公开号:CN1564626A)

3)宽带无线IP网络匿名连接方法(申请号:200410025972.2, 公开号:CN1564508A)

4)WAPI认证机制中的密钥协商方法(申请号:200510041822.5,公开号:CN1665183)

 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
 
© 2005- 王朝百科 版权所有