CSA

编委详情

基本情况

赵华伟,三级教授,博士,博士后,硕士生导师,现任齐鲁工业大学金融学院金融科技系主任。兼任山东产研金融科技研究院副院长、山东省互联网金融工程技术研究中心副主任、区块链与数字经济国际产业合作联盟秘书长、山东省金融学会理事、山东省计算机学会网络空间安全专委会委员、山东省商用密码协议监事、中国计算机学会区块链专委会委员、山东省人工智能标准委员会委员、山东省高等学校创新创业教育导师。

 

研究领域

无线传感网的安全测试与评估、无线传感网密钥管理机制、躯感网密钥管理机制、基于生理特征的鉴别机制、金融移动支付安全解决方案、基于私有云的内网安全解决方案、网上银行安全解决方案、等级保护与信息安全审计

 

教育背景

2010年 博士后,上海交通大学和山东省科学院联合培养企业

2006年 博士,山东大学网络信息安全研究所

2003年 硕士,山东大学

2000年 学士,山东工业大学

 

论文发表

  1. Huawei Zhao, Jing Qin, Jiankun Hu*. An Energy Efficient Key Management Scheme for Body Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Vol.24, Iss.11, pp.2202-2210,2013
  2. Huawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu*. Key Negotiation Schemes for Body Sensor Networks on the Surface of the Human Body, International Journal of Autonomous and Adaptive Communications Systems,2014
  3. Huawei Zhao, Jing Qin, Minglei Shu, Jiankun Hu*. A Hash Chains Based Key Management Scheme for Wireless Sensor Networks, CSS 2012, LNCS 7672, pp.296308, Melbourne,2012.12.14-16
  4. Fei Han, Qin Jing, Zhao, Huawei, Hu Jiankun. A general transformation from KP-ABE to searchable encryption. Future Generation Computer Systems, Vol.30, Iss.1, pp .107-115, 2014
  5. Jia Yu*, Fanyu Kong, Huawei Zhao, Xianguo Cheng, Rong Hao, Xiangfa Guo. Non-Interactive Forward-Secure Threshold Signature without Random Oracles,Journal of Information Science and Engineering,Vol.28,No.3,pp.571-586,2012
  6. Jia Yu*, Rong Hao, Fanyu Kong, Xiangguo Cheng, Huawei Zhao, Yangkui Chen. Identity-Based Forward Secure Threshold Signature Scheme Based on Mediated RSA. International Journal of Computers and Applications, Vol. 32, No. 4, pp.469-475, 2010
  7. Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Huawei Zhao, Yangkui Chen. Cryptanalysis of a Type of Forward Secure Signatures and Multi-signatures. International Journal of Computers and Applications. ACTA Press. Vol. 32, No. 4, 2010. 476-481
  8. Nie Xiushan*Ju LiuSun Jiande, Zhao Huawei. Key-frame Based Robust Video Hashing Using Isometric Feature Mapping. J. Computational Information Systems, vol 7, no. 6, pp.2112-2119, June 2011
  9. Huawei Zhao, Jiankun Hu*, Jing Qin, Vijay Varadharajan. Hashed Random Key Pre-Distribution Scheme for Large Heterogeneous Sensor, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom 2012), pp.706-713, Liverpool, 2012.06.25-27
  10. H.W. Zhao*, L.Z. Liu. Self-Honesty in Strand Spaces Model, IEEE Int. Conf. Networks Security, Wireless Communications and Trusted Computing, pp.406-410, Wuhan, 2009.04.25-26
  11. H.W. Zhao*, R.X. Liu. A Scheme to Improve Security of SSL, IEEE Pacific-Asia Conf. Circuits, Communications and System, pp.401-404, Chengdu, 2009.0516-17
  12. Qin Jing*, Zhao Huawei, Wang Mingqiang. Non-interactive Oblivious Transfer Protocols, Int. Foru. Information Technology and Applications, pp.120-124,2009.05.15-17
  13. Zhao Huawei.A New Key Negotiation Method Based on Fuzzy Extractor Technology, The 2013 International Conference on Parallel and Distributed Processing Techniques and Applications, 2013.6
  14. A Roadmap for Key Management Scheme of Body Sensor Network Based Physiological Signal, The 2013 International Conference on Parallel and Distributed Processing Techniques and Applications, 2013.6
  15. Zhao Huawei, Liu Ruixia, Hiberarchy Cluster Model and Key Management in wireless sensor network, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing,2009
  16. 赵华伟,李大兴,”一种调和两种观点的安全协议分析方法”,计算机研究与发展,2006.7
  17. Zhao Huawei, Shu Mingle, Qin Jing, Hu Jiankun, A key management scheme between body sensor networks and the base station, Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, p 743-747
  18. Zhao Huawei, Hypercube-based Key Management in Wireless Sensor network, International Conference on Wireless Communications, Networking and Mobile Computing,2009
  19. Zhao Huawei, Zhang Wenyu, Definitions and analysis of integrity in strand spaces model, International Symposium on Electronic Commerce and Security, 2008,153-158
  20. Zhaohuawei, Physiological-Signal Based Key Negotiation Protocols for Body Sensor Networks: A Survey, Simulation Modelling Practice and Theory,2016,32-44
  21. Zhaohuawei, Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption, International Journal of Distributed Sensor Networks,2015,1-12
  22. Zhaohuawei, Efficient Key Management Scheme for Health Blockchain, CAAI Transactions on Intelligence Technology,2018,1-6
  23. Zhaohuawei, Lightweight Backup and Efficient Recovery Scheme for Health Blockchain, 2017 IEEE 13th International Symposium on Autonomous Decentralized Systems, 2017,229-234


分享
Top