Current location - Education and Training Encyclopedia - Graduation thesis - Wang Lina's Papers and Works
Wang Lina's Papers and Works
He has published more than 60 papers on computer security. Published the monograph "Network Multimedia Information Security Technology-Method and Application". Editor-in-Chief: Introduction to Information Security, Security and Secrecy of Information Systems, Information Hiding Technology and Application, Experimental Course of Information Hiding Technology, etc.

Main published periodical papers: (as of the end of 2008)

1., Wang Lina, Yu Rongwei, Kuang Bo, an automatic design method of key agreement protocol. Journal of Wuhan University (Science Edition), May 2009 (1): 89-92.

2. Zhang Lei, Wang Lina and Wang Dejun. Web page tamper-proof system model. Journal of Wuhan University (Science Edition), May 2009 (1):121-124.

3. Yu, Kuang Bo. A design method of remote proof security protocol. Journal of Communication, 29, 2008 (10):19-24.

4. Wang Lina, Zhao Lei, Guo Chi and Fang Zhejun. Secure access and routing model based on trust theory. Journal of Wuhan University (Information Science Edition), 2008,33 (10): 999-1002.

5. Fei Ruchun, Zhang. Group construction method of threshold visual cryptography scheme. Journal of Communication 2008,29 (10): 82-87.

6. Wang Lina, Tamia Liu and Yu. Research on stochastic game model for quantifying survivability of intrusion system. Microcomputer system, 29, 2008 (10):1794-1798.

7. Hao, Zhang. Secure digital watermarking scheme based on structure code, Journal of Wuhan University (Information Science Edition), 2008,33 (10):1070-1072.

8. Wang Lina, Yue Yuntao, Liuli, Wang Dejun, the design and implementation of Oracle database backup software. Journal of Wuhan University (Science Edition), 2008,54 (1): 60-64.

9. Hao, Research on Bare Metal Backup and Recovery Technology, Computer Application Research, 2008,25 (12): 3735-3738.

10. Cui, Rong Peng. New methods of anti-piracy. Dynamics of continuous discrete and impulsive systems. Algorithm, 2006, 13:964-966

1 1. Wang Lina, Guo Chi. Building hot snapshot copy based on Windows file system. Journal of Natural Science of Wuhan University, 2006,11(6):1503-1506.

12. Wang Dejun, Wang Lina. Efficient multi-resolution compression algorithm for disk-based backup and recovery. Journal of Wuhan University, Natural Science Edition, 2006,11(6):1609-1613.

13. Xiong Qi, Wang Lina, network data backup model based on disk and SAN, Computer Engineering, 2006,33 (4): 233 ~ 235.

14. Peng wenling, Wang Lina, research on intrusion tolerance mechanism based on role-based access control, journal of electronic science, 2005,33 (1): 91~ 95.

15. Li Li, Zhang, Feng Dengguo, Security Analysis of Key Exchange Protocol Based on Password Authentication. Journal of Electronics, 2005,33 (1):166 ~171.

16. Peng Wenling,,, Zhang,. Constructing intrusion tolerance software system. Journal of Wuhan University Natural Science Edition, 2005, 10( 1):47-50.

17., Zhang,,. Camouflage detection based on support vector machine. Journal of Natural Science of Wuhan University, 2005,10 (1):103-106.

18., Zhang,. Atomic electronic contract protocol based on convertible signature. Journal of Wuhan University Natural Science Edition, 2005, 10( 1):227-230.

19. Fei Ruchun, Wang Lina. Multi-strategy threshold decryption scheme. Journal of Wuhan University Natural Science Edition, 2005, 10( 1):243-247.

20. Xuan Jianhui,,, Zhang. Image watermarking denoising attack based on wavelet. Journal of Wuhan University Natural Science Edition, 2005, 10( 1):279-283.

2 1. Tu Guoqing, Zhang,. Analysis and application of integrity model of trusted platform. Journal of Wuhan University Natural Science Edition, 2005, 10( 1):35-38.

22. Peng Wenling, Zhang,. Research on the method of quantifying the credibility of intrusion tolerance system based on stochastic process. Computer Engineering, March, 20051(21).

23. Peng Wenling, Zhang. Research on network intrusion tolerance system based on finite automata. Microcomputer system, 2005,26 (8):1296 ~1300.

24. Lee Hyo Ri, Wang Lina. Propagation model of computer virus in network. Computer Engineering, 2005,31(18):153-155.

25. Peng Wenling, Zhang. A method for quantifying the credibility of intrusion tolerance system based on stochastic process. Computer Engineering, 2005,31(22): 7-8,35.

26. Zhang,. Off-line electronic token system for P2P transactions. Computer Engineering, 2005,31(16): 9-10, 13.

27. Wang Lina Wang Dejun. Research on disaster recovery system. Computer engineering, 2005,31(6): 43 ~ 45.

28. Ber Ber Zhang He. An improved undeniable protocol and its security analysis. Journal of Wuhan University, Natural Science Edition, 2004,9 (3)

29. Cui, Zhang, Fu Jianming, A Research Model of Parallel Intrusion Tolerance System-RC Model, chinese journal of computers, 2004,27 (4): 500 ~ 506.

30. Wang Lina, Fei Ruchun, Dong Xiaomei, Research on Access Control Scheme in Hierarchical System, Journal of Electronic Science, 2003,31(2):146 ~149.

3 1. Fei Ruchun, Wang Lina, (t, n) Secret sharing system based on RSA and one-way hash function, Journal of Software, 2003, 14( 1), 146~ 150.

32.,, Zhang, Intrusion Detection Method Based on Unsupervised Clustering, Journal of Electronic Science, 2003,31(11),1713 ~17.

33. Fei Ruchun, Wang Lina, Yu Ge, Threshold Digital Signature System Based on Discrete Logarithm and Quadratic Residue, Journal of Communication, 2002,23 (5), 65~69.

Main conference papers published: (as of the end of 2008)

1. Chi Guo, Zhao Lei, Wang Lina, Zhe Fang Jun. Secure network admission and routing model based on trust theory. Proceedings of the 9th International Conference on Young Computer Scientists, Zhangjiajie, 22 16-222 1, 2008. 1 1

2. Chiguo,,, Huang Lainv,. The essential analysis of "robust and fragile" Internet: load, capacity and avalanche effect of cascading failure. Proceedings of the 9th International Conference on Young Computer Scientists, Zhangjiajie, 2 149-2 153, 2008. 1 1

3. Chiguo, Huang Lainv,. Research on network behavior activity oriented to network survivability. Proceedings of the 2008 International Conference on Computing Intelligence and Security, Suzhou, vol. 1, pp. 432-435, 2008. 12.

4. Wang Lina and Lei Yuandong. Research on evaluation of trust model. Proceedings of 2008 International Conference on Computational Intelligence and Security (CIS 2008), Suzhou, Vol. 1, pp.345-349, 2008. 12.

5. Hu Donghui, Jiang. Detecting MB 1 with higher-order statistics. Proceedings of 2008 International Symposium on Computing Intelligence and Security (CISW, 2008), Suzhou, Volume 2, pp. 330-333, 2008. 12

6. Wang Dejun, Wang Lina and Song Jingbo. SEDBRS: a safe and efficient desktop backup and recovery system. Proceedings of the 1 International Symposium on Data, Privacy and Electronic Commerce (ISDPE 2007), pp. 304-309, Chengdu, 2007.

7. Wang Lina, Song Jingbo, Guo Chi and Wang Dejun. Desktop data backup system based on algorithm optimization. The 5th China Conference on Information Security and Communication Security (CCICS'07), Changsha, August 2007.

8. Hao, Zhang,. Secure spread spectrum watermark detection based on extended TPM. Proceedings of the 1 th International Symposium on Data, Privacy and E-commerce (ISDPE 2007), Chengdu, 2007.

9. Wang Lina, Guo Jingli and Luo Min. A more efficient voting scheme based on blind signature. Proceedings of 2006 International Conference on Computing Intelligence and Security, Guangzhou, 2006. 1 1

10. Peng, Zhang,. An improved worm prevention system based on universal vulnerability blocking. The first SKLOIS conference on information security and cryptography, Beijing, 2005. 12

1 1. Peng Wenling, Zhang, Chen Wei. Constructing distributed intrusion tolerance software system for high performance grid computing. Proceedings of the International Conference on High Performance Computing and Applications (HPCA2004). Shanghai, China, 2004

12. Song, Peng Rong,. Optimized key distribution scheme in threshold RSA. Proceedings of the Third International Conference on Information Security in 2004

13., Zhang,,, Min Ya. An improved intrusion detection model based on sub-coordination logic. SPIE proceedings of international optical engineering society, 2005

14. Xuan Jianhui, Zhang, Rotation, scaling and translation invariant image watermarking based on Radon transform. SPIE-proceedings of the international society of optical engineering

15. Li Li, and Zhang. Attacks on undeniable cryptographic protocols and their improvement, Proceedings of the 2003 International Symposium on Cryptography and Network Security, Miami, USA, 2003.

Main work: (as of the end of 2008)

1. Wang Lina, technical methods and applications of network multimedia information security, Wuhan University Press, 2003.

2. Liu Yuzhen, Wang Lina, Fu Jianming, Cryptography and Network Security, Electronic Industry Press, 2003.

3. Zhang, Information Hiding Technology and Application, Wuhan University Press, 2003.

4. Wang Lina, Guo Chi, Li Peng, Experimental Course of Information Hiding Technology, Wuhan University Press, 2003.

5. Wang Lina, comprehensive experimental course of information security. Wuhan University Press, 2005.

6. Wang Lina et al., Introduction to Information Security, Wuhan University Press, 2008.