当前位置: X-MOL首页全球导师 国内导师 › 高伟

个人简介

学习经历 大学本科 1996.9-2000.7 鲁东大学 理学学士 数学与应用数学 全日制 硕士研究生 2000.9-2003.6 广州大学 理学硕士 应用数学 全日制 博士研究生 2003.9-2006.12 湖南大学 理学博士 应用数学 全日制 博士后研究 2010.9-2012.8 上海交通大学 博士后 计算机科学与技术 在职 访问学者 2011.10-2012.4 University of Wollongong,在职 访问学者 2009.9-2009.10 University of Birmingham,在职 工作经历 2007.5-至今 鲁东大学 数学与统计科学学院 近年来获得奖励情况和荣誉称号 1.山东省第三届师范生类高校学生从业技能大赛,优秀辅导教师奖,2015年 2.鲁东大学第三届师范类学生从业技能大赛,优秀辅导教师奖,2015年 3.鲁东大学第二届“我最喜爱的教师”提名奖,2015年 4.鲁东大学学士学位论文优秀指导教师,2014年 5.鲁东大学先进工作者,2015-2018年 6. 鲁东大学教学观摩大赛一等奖,2013年

研究领域

密码学与信息安全

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Wei Gao, Guilin Wang, Xueli Wang, Zhenguang Yang, ID-based threshold signatures based on bilinear Pairings, Informatica, 2009, 20(4): 461-476 Wei Gao, Fei Li, Xueli Wang, Chameleon hash without key exposure based on Schnorr signature. Computer standards & interfaces, 2009, 31(2): 282-285 Wei Gao, Xueli Wang, Dongqing Xie, Chameleon hashes sithout key exposure based on factoring. Journal of computer science and technology, 2007, 22(1): 109-113 Wei Gao, Kefei Chen., Guilin Wang, Designated condition one-time signatures, International Conference on Internet and Distributed Computing Systems, LNCS, 2012,7646: 253-263, Fujian, China, 2012.11.21-11.23 Wei Gao, Zhenyou Wang, Fei Li, Lie Chen, An efficient threshold signature scheme without random oracles, Proceedings of the 2009 international conference on computational intelligence and security, IEEE Computer Society, 2009, 400-404, Beijing, China, 2009.12.11-12.14 Wei Gao, Guilin Wang, Xueli Wang, Fei Li, One-round ID-based blind signature scheme without ROS assumption, The second international conference on pairing-based cryptography (Pairing 2008), LNCS, 2008, 5209: 316-331, Egham, UK, 2008.09.01-09.03 Wei Gao, Fei Li, Banghai Xu, An abuse-free optimistic fair exchange protocol based on BLS signature, Proceedings of the 2008 international conference on computational intelligence and security, IEEE Computer Society, pp.278-282, 2008.12.12-12.17 Fei Li, Wei Gao,Kefei Chen,Guilin Wang, A certificateless signature and public auditing with trust level 3+.Journal of Ambient Intelligence and Humanized Computing, 2017, online,DOI:10.1007/s12652-017-0553 -x Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Efficient identity-based threshold signature scheme from bilinear pairings in standard model, International Journal of Internet Protocol Technology, 2014, 8(2/3): 107-115 Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao, An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation, IEEE Transactions on Information Forensics and Security, 2014, 9(12): 2302-2313 Jianhua Yu, Xueli Wang, Wei Gao, Improvement and applications of secure outsourcing of scientific computations, J. Ambient Intelligence and Humanized Computing 6(6): 763-772 (2015) Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu, A brief survey on secure multi-party computing in the presence of rational parties, J. Ambient Intelligence and Humanized Computing, 6(6): 807-824 (2015) Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, A brief survey on secure multi-party computing in the presence of rational parties, Journal of Ambient Intelligence and Humanized Computing, 2015, 6(6): 1-18 Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen, Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited, Oxford Computer Journal, 2015, 58(10): 2747 - 2757 Gang Sheng, Chunming Tang, Wei Gao, Ying Yin, MD-VC Matrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication, The 10th International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, 2016.09.28-09.30 Fei Li, Wei Gao, Dongqing Xie, Chunming Tang,Certificateless Cryptography with KGC Trust Level 3 Revisited, International Conference on Cloud Computing and Security 2017, ICCCS (2), pp.7292-304, Nanjing, China, 2017.06.16-06.18. Fei Li, Wei Gao, Jianhua Yan, Xuan Wang, Round-optimal ID-based dynamic authenticated group key agreement, International Journal of High Performance Systems Architecture, 2016, 6(3): 153-161 Fei Li, Wei Gao, Xuan Wang, Jianhua Yan, An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings, The 10th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2016, IEEE Computer Society, pp.468- 472, Fukuoka, Japan, 2016.07.06-07.082.Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security, INFORMATICA, 2017, 28(2): 215-235 Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Efficient Identity-based Threshold Decryption Scheme from Bilinear Pairings. Frontiers of Computer Science, 2018, 12(1):177-189 Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Chunmig Tang, Double-authentication-preventing signatures revisited:new definition and construction from chameleon hash. Frontiers of Information Technology & Electronic Engineering, 2019, 20(2):176-186

推荐链接
down
wechat
bug