首页-->人才培养-->研究生教育-->导师信息

谢琪(博士后、教授、博士生导师)

时间:2015-10-30 10:08:32 文章来源 :xuekb 浏览量:<span id="hitcount715254">1850</span><script src="http://search.hznu.edu.cn/zcms/counter?Type=Article&ID=715254&DomID=hitcount715254"></script>


1-谢琪_29070835

2005年在浙江大学获得博士学位,2007.7-2010.10年浙江大学计算机学院博士后,2009.9-2010.9年英国伯明翰大学计算机学院访问教授,2012年6月-8月香港城市大学计算机学院访问教授。目前为杭州师范大学国际服务工程学院教授、院长兼党委副书记,中国密码学会学术工作委员会委员,浙江省高校中青年学科带头人,浙江省教学名师、密码与网络安全杭州市重点实验室主任;曾任研究生部(处)副部(处)长、信息科学与工程学院副院长、杭州国际服务工程学院(信息科学与工程学院)副院长、杭州国际服务工程学院执行院长。

研究兴趣

主要研究兴趣为应用密码学、网络安全、信息技术教育等,包括认证与密码协商协议的分析与设计、数字签名的分析与设计、隐私保护、移动漫游认证、云计算中的隐私保护与认证、密钥协商等。主持国家自然科学基金面上项目、中国博士后基金(一等资助)、浙江省自然科学基金重点及一般项目、教育部协同育人项目及省新世纪高等教育教学改革项目等省部级及以上项目10项;参与国家973计划、国家科技部网络空间安全重大专项、十二五国家密码发展基金、国家自然科学基金和省自然科学基金等省部级及以上项目6项;获浙江省高等教育教学成果奖一等奖和二等奖各1项、党政机要密码科技成果奖三等奖1项(省部级)、高校科研成果二等奖1项。在《中国科学》、《计算机学报》、《PLoS One》、《International Journal of Distributed Sensor Networks》、《Applied Mathematics and Computation》、《IET Information Security》、《IEEE Transactions on Information Forensics & Security》、《IEEE Transactions on Industrial Informatics》、《Concurrency and Computation: Practice and Experience》、《Kuwait Journal of Science & Engineering》、《International Journal of Communication Systems》、《Security and Communication Networks》、《Wireless Personal Communications》、《Information Technology And Control》、《Nonlinear Dynamics》、《Journal of Medical Systems》、《Chinese Journal of Electronics》、《Scientia Iranica》、《Journal of Zhejiang University SCIENCE》、《SpringerPlus》、《SCIENCE CHINA Information Sciences》、《Computers and Electrical Engineering》、《Multimed Tools Appl》、《Arab J Sci Eng》等刊物发表一级期刊、SCI/EI收录的论文70余篇。

曾担任ISPEC2012、ACM ASIACCS2013国际会议共同主席,是多个国际会议的PC Member;也为下列期刊审阅稿件:IEEE Transactions on Information Forensics & Security、Peer-to-Peer Networking and Applications、Computer Methods and Programs in Biomedicine、International Journal of Ad Hoc and Ubiquitous Computing、International Journal of Foundations of Computer Science、The Computer Journal、Journal of Biomedical Informatics、IEEE Transactions on Smart Grid、Information Sciences、Information Technology and Control、International Journal of Communication Systems、Journal of Communications and Networks、Security and Communication Networks、KSII Transactions on Internet and Information Systems、INFORMATICA、The Journal of Systems and Software、Scientia Iranica、Nonlinear Dynamics、International Journal of Foundations of Computer Science、IEEE Access等。

教学工作

主要承担的课程有《密码学与网络安全基础》、《应用密码学》、《密码协议的分析与设计》、《信息技术教学设计》等。

招收研究生方向:网络空间安全、计算机应用技术(网络安全方向)、教育技术学(信息技术教育方向)

E-mail:qixie68@126.com

代表性著作及论文

[1] Qi Xie. A new authenticated key agreement for session initiation protocol, International Journal of Communication Systems, 2012; 25(1):47–54. SCI, IF=1.1

[2] Xie Qi. Provably secure convertible multi-authenticated encryption scheme, IET Information Security, 2012, 6( 2): 65–70. SCI, IF=0.623

[3] Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang. Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics & Security, 2017, 12(6):1382-1392. SCI, IF=4.332

[4] Guilin Wang, Jiangshan Yu and Qi Xie. Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks, IEEE Transactions on Industrial Informatics, 9(1): 294-302 (2013). SCI, IF=2.99

[5] Qi Xie, Guilin Wang, Fubiao Xia and Deren Chen. Self-Certified Proxy Convertible Authenticated Encryption: Formal Definitions And A Provably Secure Scheme. Concurrency and Computation: Practice and Experience,2014, 26(5): 1038-1051, SCI, IF=0.845

[6] Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang. Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Information Technology And Control, 2013, Vol.42, No.3,231-237. SCI, IF=0.667

[7] Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao and Na Dong. A practical anonymous authentication protocol for wireless roaming, Security and Communication Networks. 7(8): 1264-1273 (2014) SCI,

[8] Qi Xie, Bin Hu, Xiao Tan, Mengjie Bao, Xiuyuan Yu. Robust anonymous two-factor authentication scheme for roaming service in global mobility network, Wireless Personal Communications, 2014, 74(2): 601-614。SCI, IF=0.428

[9] Qi Xie, Jianmin Zhao, Xiuyuan Yu. Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement Scheme. Nonlinear Dynamics, 2013, Volume 74, Issue 4, pp 1021-1027, SCI, IF=3.009

[10] Qi Xie, Dongzhao Hong, Mengjie Bao, Na Dong and Duncan S. Wong. Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks, International Journal of Distributed Sensor Networks, vol. 2014, Article ID 325734, 7 pages, 2014. SCI, IF=0.727

[11] Qi Xie, Wenhao Liu, Shengbao Wang, Lidong Han, Bin Hu, Ting Wu. Improvement of a Uniqueness-and-Anonymity Preserving User Authentication Scheme for Connected Health Care, Journal of Medical Systems, (2014) 38:91. SCI,IF=1.78

[12] Qi Xie, Bin Hu, Na Dong, Duncan S. Wong. Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems, PLoS ONE 9(7): e102747. doi:10.1371/journal.pone.0102747 (2014). SCI,IF=4.078

[13] Bin Hu, Qi Xie, Mengjie Bao, Na Dong. Improvement of user authentication protocol with anonymity for wireless communications, Kuwait Journal of Science & Engineering, 41(1):155-169,2014。SCI, IF=0.075

[14] Qi Xie, Jun Zhang, Na Dong. Robust Anonymous Authentication Scheme for Telecare Medical Information Systems, Journal of Medical Systems.2013 Apr;37(2):1-8. SCI,IF=1.78

[15] Qi Xie. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme, Scientia Iranica (2012) 19 (6), 1856–1860. SCI, IF=0.537

[16] 谢琪,吴吉义,王贵林,刘文浩,陈德人,于秀源。 云计算中基于可转换代理签密的可证安全的认证协议,中国科学:信息科学,2012,42(3): 303-313

[17] Qi Xie, Zhixiong Tang, Kefei Chen. Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks, Computers and Electrical Engineering, 2017(59): 218-230. SCI

[18] Xie Qi (谢琪), Hu Bin (胡斌), Chen Ke-Fei (陈克非), Liu Wen-Hao (刘文浩) and Tan Xiao (谭肖). Chaotic maps and biometrics based anonymous three-party authenticated key exchange protocol without using passwords. Chinese Physics B, Vol. 24, No. 11 (2015) 110505,SCI, IF=1.392

[19] Qi Xie, Bin Hu, Ting Wu. Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card. Nonlinear Dynamics, 2015, 79(4 ): 2345-2358   SCI, IF=3.009

[20] Qi Xie*, Zhixiong Tang. Biometrics based authentication scheme for session initiation protocol. SpringerPlus, (2016) 5: 1045-1058. SCI, IF=0.982

代表性项目

[1] 谢琪主持(1/7). 云计算中具有隐私保护的认证机制研究, 浙江省自然科学基金重点项目(LZ12F02005),2012.1-2014.12

[2] 谢琪主持.可证明安全的若干认证与密钥交换协议研究,国家自然科学基金面上项目(61070153),2011-2013

[3] 谢琪参与(2/4). RSA不动点、复合加密及伪随机数,“十二五”国家密码发展基金支持项目,2012-2014

[4]. 谢琪骨干成员(3/8),国家重点基础研究发展计划(973计划),课题五:相关数学问题研究在密码分析和设计中的应用(2013CB834205),2013-2017

[5]. 谢琪(学术骨干).新型数据保护密码算法研究, 国家重点研发计划2017年度“网络空间安全”重点专项, 2017YFB0802000, 2018.1-2022.12