方黎明研究生导师介绍
姓名方黎明 性 别:  行政职务 :
专业技术职务副教授 办公电话 导师类别硕士生导师
最后学历博士毕业 最后学位博士 最后毕业学校南京航空航天大学
电子邮件fangliming@nuaa.edu.cn  
工作单位计算机科学与技术学院    
学科研究方向一:
专业名称网络空间安全 (招收硕士研究生)                                                                  学科代码11083900
密码学、区块链、可搜索公钥加密、物联网等
个人简历(学历、学术经历及社会兼职):


发表学术论文,出版专著情况:
[1]. Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi: A CCA-Secure Key-Policy Attribute-based Proxy Re-encryption in the Adaptive Corruption Model for Dropbox Data Sharing System. Designs,Codes & Crptography,2018. (SCI源刊, CCF B类)
[2]. Liming Fang, Chunpeng Ge, Zhiqiu Huang, Jiandong Wang. Privacy preserving cloud data sharing system with flexible control, Computers and Electrical Engineering. 2018. (SCI源刊,CCF C类)
[3]. Liming Fang, Chunpeng Ge, Zhiqiu Huang, Yao Wang, Jiandong Wang. A secure cloud data sharing system with flexible control, ROSENET2017.(EI/ISTP)
[4]. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang: Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science, 2012, 462(4):39-58. (SCI源刊, CCF B类)
[5]. Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren. A Key-Policy Attribute-based Proxy Re-encryption without Random Oracles, Computer Journal, 2016, 59(7): 970-982. [SCI,CCF B类]
[6]. Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren. Fuzzy Conditional Proxy Re-encryption. SCIENCE CHINA Information Sciences. 2013, 56(5):1-13.(SCI源刊,IF:0.5)
[7]. Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen and Liming Fang. Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics & Security 12(6): 1382-1392. 2017. (SCI源刊,CCF A类)
[8]. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Public Key Encryption with Keyword Search Secure Against Keyword Guessing Attacks without Random Oracle. Information Sciences.238:221–241, 2014. (SCI源刊,IF:3.64,CCF B类)
[9]. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Interactive conditional proxy re-encryption with fine grain policy. Journal of Systems and Software,2011, 84(12):2293-2302.(SCI源刊,IF:1.322,CCF B类)
[10]. Chunpeng Ge, Willy Susilo, Jiandong Wang, Liming Fang. Identity-based conditional proxy re-encryption with fine grain policy, Computer Standard & Interface. 2017, 52: 1-9. [SCI]
[11]. Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo: A ciphertext policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience. 2015, 27 (8) :2004-2027 (SCI)
[12]. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Hierarchical Conditional Proxy Re-encryption. Computer Standards and Interfaces, 2012, 34(4):380-389.(SCI源刊,IF:1.42)
[13]. Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong: A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559(EI、ISTP)
[14]. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. Proc. of CANS 2009. LNCS 5888, Heidelberg: Springer, 2009: 248-258. (EI/ISTP)
[15]. Yongjun Ren, Yaping Cheng, Jin Wang, Liming Fang: Data protection based on multifunction digital watermark in wireless sensor network. ICCST 2015: 37-41. . (EI/ISTP)
[16]. Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang: Reliable access control for multi-authority in cloud storage. ICCST 2015: 113-116. . (EI/ISTP)
[17]. Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Outsourced data tagging via authority and delegable auditing for cloud storage. ICCST 2015: 131-134. . (EI/ISTP)
[18]. Yongjun Ren, Jin Han, Jin Wang, Liming Fang: Privacy-preserving proof of storage in large group. ICCST 2015: 269-272. (EI/ISTP)
[19]. Yongjun Ren, Yaping Chen, Jin Wang, Liming Fang: Leakage Resilient Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 706-709.
[20]. Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang: Attributed Based Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 710-713.
[21]. Yongjun Ren, Jiang Xu, Jin Wang, Liming Fang: Oriented Group Provable Data Possession in Public Cloud. IIH-MSP 2014: 775-778.
[22]. Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage. IIH-MSP 2014: 779-782.
[23]. Yongjun Ren, Jian Shen, Jin Wang, Liming Fang: Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 795-798
[24]. Liming Fang, Willy Susilo, Jiandong Wang. Anonymous Conditional Proxy Re-encryption without Random Oracle. Proc. of ProvSec 2009. LNCS 5848, pp. 47-60. Heidelberg: Springer, 2009: 47-60. (EI)
[25]. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. International Journal of Digital Content Technology and its Applications. 2010, 4(9):151-160. (EI)
[26]. Liming Fang, Chunpeng Ge, Jiandong Wang, Yongjun Ren. Decryptable Public Key Encryption with Keyword Search Schemes. International Journal of Digital Content Technology and its Applications, 2010, 4(9):141-150. (EI)
[27]. Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian. Chosen-Ciphertext Secure Fuzzy Identity-Based Encryption without ROM. Journal of Shanghai Jiaotong University, 2008, 13(6):646-650.(EI)
[28]. Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. Proc. of CANS 2009. LNCS 5888, Heidelberg: Springer, 2009: 248-258. (EI)
[29]. Liming Fang, Willy Susilo, Jiandong Wang. Anonymous Conditional Proxy Re-encryption without Random Oracle. Proc. of ProvSec 2009. LNCS 5848, pp. 47-60. Heidelberg: Springer, 2009: 47-60. (EI)
[30]. Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian. Chosen-Ciphertext Secure Multi-authority Fuzzy Identity-Based Key Encapsulation without ROM. Proc. of 2008 International Conference on Computational Intelligence and Security, Vol. 1, 2008: 326-330. (EI)
[31]. Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian: Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. IACR Cryptology ePrint Archive 2008: 139 (2008)
[32]. Liming Fang, Jinyue Xia:Full Security: Fuzzy Identity Based Encryption. IACR Cryptology ePrint Archive 2008: 307 (2008)
[33]. Guoan Zhao, Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren: Improved unidirectional chosen-ciphertext secure proxy re-encryption. WCNIS 2010: 476-480(EI)
[34]. Guoan Zhao, Canghai Tan, Yongjun Ren, Liming Fang: An efficient unlinkable secret handshake protocol without ROM.WCNIS 2010: 486-490(EI)
[35]. Yuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu: Weighted Margin Multi-Class Core Vector Machines. CIS (1) 2008: 235-239(EI)
[36]. Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang. Identity-Based Key Issuing Protocol for Ad Hoc Networks. IEEE International Conference on Computational Intelligence and Security, 2007.12(EI)
[37]. 任勇军,王建东,庄毅,方黎明.基于属性的认证密钥协商协议.兰州大学学报,2010,46(2):103-110
[38]. 卞仕柱,王建东,任勇军,方黎明,夏金月.强安全高效的认证密钥交换协议.计算机工程, 2010,36 (07): 136-139
[39]. 夏金月,王建东,方黎明,任勇军,卞仕柱. ECK2007模型与其他密钥协商协议模型安全强弱关系的形式化证明. 南京航空航天大学学报英文版,2008,4(7):282-288. (EI)
[40]. Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian: Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols. IACR Cryptology ePrint Archive 2008: 479 (2008)
[41]. 任勇军,王建东,庄毅,方黎明.基于双线性对的秘密重分配方案.兰州大学学报2008,44(1):82-85
[42]. 任勇军,王建东,庄毅,方黎明.一种动态的Ad Hoc网络密钥管理方案.南京航空航天大学学报,2007,39(9):810-813(EI)
[43]. 任勇军,王建东,庄毅,方黎明.基于身份的Ad Hoc网络密钥分发协议.武汉大学学报,2007,40(5):133-136


科研成果获奖及专利:
1、 方黎明;葛春鹏;陈小杰,一种基于可搜索密文的智能家居安全访问方法及其系统,发明专利,专利申请日:2012-10-19,中国,申请号: 201210399443.3
2、 方黎明;葛春鹏,一种基于运动检测的智能家居监控方法及其系统,发明专利,专利申请日:2012-08-28,中国,申请号: 201210309639.9
3、 方黎明;陈小杰,一种万能遥控器关联方法及其系统,发明专利,专利申请日:2012-08-29,中国,申请号: 201210311865.0
4、 任勇军;顾彬;方黎明;王建东,基于sniffer的无线传感网的入侵检测方法,发明专利,专利申请日:2010-07-28,中国,申请号: 201010238738.3
5、 应华;方黎明,一种信息加密的无线灯联网系统及其加密通讯方法,发明专利,专利申请日:2011-06-23,中国,申请号: 201110171229.8
6、 任勇军;方黎明;葛春鹏;王建东,基于可搜索密文的WSN数据安全处理方法,发明专利,专利申请日:2010-07-28,中国,申请号:201010238740.0
7、 方黎明;葛春鹏,一种基于多agent的智能家居学习系统及方法,发明专利,专利申请日:2013-02-01,中国,申请号:201310040235.9
8、 王建东;孙婷;方黎明;朱新峰;孙茂圣;王丽娜,基于AES加密的机场噪声预测数据网络传输方法, 发明专利,专利申请日:2013-06-8,中国,申请号: CN201310226583.5
9、 赵国安;刘玉龙;薛琳强;方黎明;郁斌;田明,无线传感器网络中执行非对称密码的方法,发明专利,专利申请日:2010-04-29,中国,申请号: 201010159400.9
10、 方黎明, 徐圣, 陈小杰,一种智能家居网关, 实用新型,中国,申请号: 201220435047.7
11、 方黎明,葛春鹏,一种智能家居监控系统,实用新型,中国,申请号: 201220430638.5
12、 方黎明, 应华, 徐圣,一种节能插座控制电路,实用新型,中国,申请号: 201220643650.4

承担的科研项目情况:
1、 支持多条件复杂匹配的代理重加密研究,国家自然科学基金(青年基金),项目编号:61702236,2017.1-2019.12,参与,国家级项目
2、 可搜索公钥加密关键安全性问题的研究,国家自然科学基金(青年基金),项目编号:61300236,2014.1-2016.12,主持,国家级项目;
3、 带多关键字搜索的公钥加密的研究,江苏省基础研究(自然科学基金),项目编号:BK20130809,2013.9-2016.12,主持,省部级项目;
4、 基于多关键字的条件代理重加密的研究,中国博士后面上基金一等资助,项目编号:2013M530254,主持,省部级项目;
5、 支持多关键词匹配的可搜索公钥加密的研究,中国博士后科学基金特别资助,主持,省部级项目;
6、 支持复杂匹配搜索的可搜索公钥加密的研究, 江苏省博士后基金, 编号:1302137C,主持,省部级项目;
7、 云计算演化环境中的隐私建模与检测方法研究,国家自然科学基金(面上项目),项目编号:61272083,81万,2013.1-2016.12,参与,国家级项目;
8、 面向机场感知的噪声监测及其环境评估,国家自然基金重点项目,项目编号:61139002,280万,2011-2014,参与,国家级项目;
指导研究生情况:

备注:

方黎明,博士、博士后、副教授,是IEEE会员、计算机学会会员、国际密码学会会员。博士毕业于南京航天航空大学,获计算机应用技术博士学位,博士期间与澳大利亚知名密码学专家、教授Willy Susilo教授合作多篇论文,作为高级访问研究员曾在香港城市大学做博士后研究,2015年曾访问IEEE FELLOW施云庆教授。主要研究方向为密码学、网络安全、区块链,先后参与了多项研究课题,其中包含自然基金重点项目、863项目、澳大利亚项目:“ARC Future Fellowship FT0991397”等。目前主持国家自然科学基金青年基金一项,主持江苏省自然科学基金一项,获得中国博士后基金一等资助一项、博士后特别资助一项,江苏省博士后基金一项。申请各类专利十余项,共发表EI/SCI检索论文四十多篇,其中发表国际知名学术期刊《Information Sciences》论文1篇(IF:3.64,CCF B类),发表理论计算机科学领域重要学术期刊《Theoretical Computer Science》(IF:0.9,CCF B类)论文1篇, 发表密码学领域重要学术期刊《Designs, Codes and Cryptography》(IF: 1.009,CCF B类)论文1篇,发表网络安全领域重要学术期刊《IEEE Transactions on Information Forensics and Security》(IF: 4.332,CCF A类)论文1篇,软件领域国外知名SCI期刊《Journal of Systems and Software》(IF:1.322,CCF B类),国外知名SCI期刊《The Computer Journal》(IF:0.77,CCF B类),《Concurrency and Computation: Practice and Experience》(IF:1.13,CCF C类),《Computer Standards and Interfaces》(IF:1.42)各1篇,国内重要学术期刊《SCIENCE CHINA Information Sciences》1篇(IF:0.5,CCF B类)。曾获得创新中国大赛前五名,入选《学在南航》,获得南京航空航天大学优秀博士学位论文,获得2009年国际密码学与网络安全会议最佳论文奖。担任数个SCI国际期刊及国际会议的审稿人,包括Theoretical Computer Science、IEEE TIFS、IEEE TC、IEEE/ACM Transactions on Networking、Journal of Systems and Software、Mathematical Problems in Engineering、 Computer Standards and Interfaces、中国科学、AisaCrypt等。