WANG Lihua


WANG Lihua

J-GLOBAL         Last updated: Dec 13, 2019 at 18:55
 
Avatar
Name
WANG Lihua
Affiliation
National Institute of Information and Communications Technology
Degree
Master of Science(Harbin Institute of Technology(China)), Bachelor of science(Northeast Nomal University)
ORCID ID
0000-0002-7553-423X

Research Areas

 
 

Academic & Professional Experience

 
2019
 - 
Today
Senior Researcher, Cybersecurity Research Institute, National Institute of Information and Communications Technology
 
2003
 - 
2006
Dh.D. degree in Engineering, Graduate School of Systems and Information Engineering, University of Tsukuba
 
1991
 - 
1994
M.S. degree in Science, School of Mathematics, Harbin Institute of Technology
 
1984
 - 
1988
B.S. degree in Mathematics, Department of Mathematics, Northeast Normal University
 

Published Papers

 
Sangwook Kim, Masahiro Omori, Takuya Hayashi, Toshiaki Omori, Lihua Wang, Seiichi Ozawa
Proc. of Int. Conf. on Neural Information Processing   LNCS11304, 348-358   Dec 2018   [Refereed]
Lihua Wang, Yoshinori Aono, Le Trieu Phong
LNCS(11261) 93-111   Nov 2018   [Refereed]
Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang
IEEE Communications Magazine   56(11) 76-81   Nov 2018   [Refereed]
Jing Li, Licheng Wang, Lihua Wang, Xianmin Wang, Zhengan Huang, Jin Li
J. Concurrency and Computation: Practice and Experience      Jun 2018   [Refereed]
Shohei Kuri, Takuya Hayashi, Toshiaki Omori, Seiichi Ozawa, Yoshinori Aono, Le Trieu Phong, Lihua Wang, Shiho Moriai
2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017, Honolulu, HI, USA, November 27 - Dec. 1, 2017   1350-1357   2018   [Refereed]

Misc

 
A new MC public key cryptosystem (Chinese)
Journal of Harbin Institute of Technology   Vol. 35, No. 1, pp.126-128    2003
ID-Based Series-Parallel Multisignature Scheme for Multi-message from Bilinear Maps
Proc. International Workshop on Coding and Cryptograph (WCC2005), pp.265-274    2005
Transformation-Free Proxy Cryptosystems and Their Applications to Electronic Commerce
ACM Press   Proc. International Conference on Information Security (InfoSecu04), pp.92-98    2004
SIAM Journal on Discrete Mathematics   Volume 18, No.4, pp.663-678    2005
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and An Efficient Protocol for Multiple Keys
Springer-Verlag, Berlin   Proc. International Conference on Computational Intelligence and Security (CIS'05), LNAI 3802, pp. 198-203    2005

Books etc

 
『高等数学』
ハルビン工業大学出版社(中国語)   1995   
『数学実験』
ハルビン工業大学出版社(中国語)    2000   

Research Grants & Projects

 
R&D on proxy calculation for secure cloud computing
Japan Society for the Promotion of Science (JSPS): Grant-in-Aid for Scientific Research (C)
Project Year: Apr 2015 - Mar 2019    Investigator(s): WANG Lihua
Research on Next Generation Internet and Network Security
JSPS: A3 Foresight Program
Project Year: Aug 2011 - Jul 2016    Investigator(s): Nei Kato(Japan)、Zhenfu Cao(China)、Dan Keun Sung(Korea)
http://www.it.is.tohoku.ac.jp/a3program/index.html)
R&D of New Cryptographic Technologies with Long-Term Usability
Japan Society for the Promotion of Science (JSPS): Grant-in-Aid for Scientific Research (C)
Project Year: Apr 2011 - Mar 2014    Investigator(s): WANG Lihua