您好,欢迎来到达州工业云! 平台首页 企业驾驶舱 帮助中心 企业登录 企业注册

HI,欢迎使用达州工业云平台!

账号必须大于2位

创新资源平台
服务平台首页>协同创新>专家库>专家详情

李建华(教授)

所属单位:区域光纤通信网与新型光通信系统国家重点实验室

担任职务:

擅长领域:

联系方式:021-62932899 邮箱:登录后查看

现任上海交通大学网络空间安全学院院长,上海交通大学电子信息与电气工程研究院常务副院长,信息内容分析技术国家工程实验室主任, 网络信息安全管理监控与服务教育部工程研究中心主任。

主要成就

[1]      信息系统安全管理理论及应用,机械工业出版社,李建华,陈秀真,周宁,张竞, 2009。
[2]      信息内容安全管理及应用,机械工业出版社,李建华,李翔,李生红,刘功申,马颖华, 2010。

[3]      黑客攻防技术与实践,机械工业出版社,李建华,单蓉胜,李昀,陈楠, 2009。

[4]      Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credent,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY ,Lian Bin,Chen Gongliang,Ma Maode,Li Jianhua,2015

[5]      Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards,IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS,Li Xiangxue,Qiu Weidong,Zheng Dong,Chen Kefei,Li Jianhua,2010

[6]      Passive Image-Splicing Detection by a 2-D Noncausal Markov Model,IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOG,Zhao Xudong,Wang Shilin,Li, Shenghong,Li, Jianhua,2015

[7]      Proposed Security Mechanism for XMPP-Based Communications of ISO/IEC/IEEE 21451 Sensor Networks,IEEE SENSORS JOURNAL,Guo Longhua,W, Jun,Xia Zhengmin,Li Jianhua,2015

[8]      Security improvement on a timestamp-based password authentication scheme,IEEE TRANSACTIONS ON CONSUMER ELECTRONICS,Wang YJ,Li JH,2004

[9]      A New Ultralightweight RFID Authentication Protocol with Permutation,IEEE COMMUNICATIONS LETTERS,Tian Yun,Chen Gongliang,Li Jianhua,2012

[10]  Toward Optimizing Cauchy Matrix for Cauchy Reed-Solomon Code,IEEE COMMUNICATIONS LETTERS,Li Xiangxue,Zheng Qingji,Qian Haifeng,Zheng Dong, Li Jianhua,2009

[11]  Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint,FUTURE GENERATION COMPUTER SYSTEMS,Wang Kai,Li Jianhua,Pan Li,2010

[12]  An anti-attack model based on complex network theory in P2P networks,PHYSICA A,Peng Hao,Lu Songnian,Zhao Dandan,Zhang Aixin,Li Jianhua,2012

[13]  Escrowable identity-based authenticated key agreement protocol with strong security,COMPUTERS & MATHEMATICS WITH APPLICATIONS,Ni Liang,Chen Gongliang,Li Jianhua,2013

[14]  Security analysis and improvement of a user-friendly remote authentication protocol,APPLIED MATHEMATICS AND COMPUTATION,Wang YJ,Li JH,2005

[15]  Evaluating the transmission rate of covert timing channels in a network,COMPUTER NETWORKS,Zi Xiaochao,Yao Lihong,Jiang Xinghao,Pan Li,Li Jianhua,2011