成人影院

Welcome to Da-Zhi Sun’s Home Page [中文版]


  Email
  Address School of Computer Science and Technology, Tianjin University, No. 135, Yaguan Road, Tianjin Haihe Education Park, Tianjin 300350, PR China
  Office 55-B-407
  Fax +86-022-27406538

Brief Biography

Da-Zhi Sun received the Ph.D. degree under the supervision of Prof. in Computer Science and Technology from Shanghai Jiao Tong University, in 2006. From 2007 to 2011, Dr Sun performs the postdoctoral research under the supervision of Prof. in the Institute of Advanced Computing Technology at Beihang University. Dr Sun now is an associate  professor in the School of Computer Science and Technology at Tianjin University. Dr Sun’s current research interests include information and network security, trusted computing, and applied cryptography.


Publications

2017
[1] Da-Zhi Sun and Guang-Quan Xu, One-round provably secure yoking proof for RFID applications,  in: Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications-TrustCom 2017, IEEE, 2017, pp. 315-322.

2016
[1] Da-Zhi Sun and Xiao-Hong Li, , in: Kwok-Yan Lam and Chi-Hung Chi (Eds), Proceedings of the 18th International Conference on Information and Communications Security-ICICS 2016, LNCS 9977, Springer-Verlag, 2016,
 pp. 403-417.

[2] Da-Zhi Sun and Ji-Dong Zhong, , Wireless Personal Communications 91(3) (2016) 1085-1093.

[3] Zhong-Yuan Hao, Wei Guo, Ji-Zeng Wei, and Da-Zhi Sun, ,  in: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications-TrustCom 2016, IEEE, 2016, pp. 584-589.

2015

[1] Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, and Mohammad Reza Aref, , Cryptology ePrint Archive, Report 2015/037 (2015).

[2] Shao-Guang Geng, Xiao-Hong Li, Zhi-Yong Feng, and Da-Zhi Sun, , in: Proceedings of the 20th International Conference on Engineering of Complex Computer Systems-ICECCS 2015, IEEE, 2015, pp. 186-189.

2013

[1] Da-Zhi Sun and Zhen-Fu Cao, y, Cryptologia 37(4) (2013) 345-355.

[2] Da-Zhi Sun, Jian-Xin Li, Zhi-Yong Feng, Zhen-Fu Cao, and Guang-Quan Xu, , Personal and Ubiquitous Computing 17(5) (2013) 895-905.

[3] Da-Zhi Sun, Jin-Peng Huai, and Zhen-Fu Cao, , Information Sciences 223 (2013) 331-334.

[4] Jian-Xin Li, Xu-Dong Liu, Lu Liu, Da-Zhi Sun, and Bo Li, , Telecommunication Systems 52(2) (2013) 1353-1365.

[5] Xiu-Ming Tian, Guang-Quan Xu, Xiao-Hong Li, Zhi-Yong Feng, and Da-Zhi Sun, , Journal of Internet Technology 14(5) (2013) 825-834.

[6] Rui Xu, Guang-Quan Xu, Da-Zhi Sun, Xiao-Hong Li, and Zhi-Yong Feng, , in: Dickson K. W. Chiu, Min-Hong Wang, Elvira Popescu, Qing Li, Rynson Lau, Timothy K. Shih, Chu-Sing Yang, and Demetrios G. Sampson (Eds), Proceedings of the 12th International Conference on Advances in Web-Based Learning-ICWL 2013, LNCS 8390, Springer-Verlag, 2015, pp. 96-103.

2012

[1] Da-Zhi Sun and Ji-Dong Zhong, , IEEE Transactions on Consumer Electronics 58(4) (2012) 1246-1252.

[2] Da-Zhi Sun, Jin-Peng Huai, and Jian-Xin Li, , Information Processing Letters 112(22) (2012) 876-879.

[3] Da-Zhi Sun, , Cryptology ePrint Archive, Report 2012/031 (2012).

[4] Wei Guo, Ya-Ling Liu, Song-Hui Bai, Ji-Zeng Wei, and Da-Zhi Sun, , Transactions of Tianjin University 18(4) (2012) 237-242.

[5] Yan-Hua Liu, Wei Guo, Ya Tan, Ji-Zeng Wei, Da-Zhi Sun, , in: Proceedings of Contemporary Research on E-business Technology and Strategy, Communications in Computer and Information Science, Volume 332, Springer Berlin Heidelberg, pp. 250-258, 2012.

2011

[1] Jing-Wei Hu, Wei Guo, Ji-Zeng Wei, Yi-Song Chang, and Da-Zhi Sun, , in: Proceedings of 2011 Fourth International Symposium on Parallel Architectures, Algorithms, and Programming (PAAP), IEEE, pp. 345-349, 2011.

2010

[1] Zeng Peng, Kim-Kwang Raymond Choo, and Da-Zhi Sun, , IEEE Transactions on Consumer Electronics 56(2) (2010) 566-569.

[2] Jian-Xin Li, Bo Li, Lin-Lin Meng, and Da-Zhi Sun, , in: Proceedings of IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), IEEE,  pp. 854-859, 2010.

2009

[1] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, Jian-Xin Li, , International Journal of Computational Methods 6(2) (2009) 307-315.

[2] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, Jian-Xin Li, Jia-Wan Zhang, and Zhi-Yong Feng, , IEEE Transactions on Industrial Electronics 56(6) (2009) 2284-2291.

[3] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, and Jian-Xin Li, , Computer Communications 32(6) (2009) 1015-1017.

2008

[1] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, Jia-Wan Zhang, and Zhi-Yong Feng, , IEEE Transactions on Consumer Electronics 54(4) (2008) 1784-1789.

[2] Da-Zhi Sun and Zhen-Fu Cao, , International Journal of Network Security 6(1) (2008) 116-120.

2007

[1] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, and Zhen-Fu Cao, , IEEE Transactions on Consumer Electronics 53(4) (2007) 1718-1723.

[2] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, and Jia-Wan Zhang, , Applied Mathematics and Computation 190(2) (2007) 1848-1854.

[3] Da-Zhi Sun, , Applied Mathematics and Computation 188(1) (2007) 411-416.

2006

[1] Da-Zhi Sun, Research on several basic authentication problems under distributing environments, PhD Thesis, 2006. (In Chinese)

[2] Da-Zhi Sun, Zhen-Fu Cao, and Yu Sun, , Applied Mathematics and Computation 176(1) (2006) 280-292.

[3] Zhen-Fu Cao and Da-Zhi Sun, , in: Proceedings of 2006 International Conference on Machine Learning and Cybernetics-ICMLC'06, IEEE, 2006, pp. 2818-2822.

2005

[1] Da-Zhi Sun, Ji-Dong Zhong, and Yu Sun, , Applied Mathematics and Computation 170(2) (2005) 1185-1193.

[2] Da-Zhi Sun and Zhen-Fu Cao, Novel forgery method on some password authentication schemes, Journal of Computation Information Systems 1(3) (2005) 471-475.

[3] Da-Zhi Sun and Zhen-Fu Cao, , Applied Mathematics and Computation 168(2) (2005) 927-932.

[4] Da-Zhi Sun and Zhen-Fu Cao, , in: Li-Po Wang and Yao-Chu Jin (Eds), Proceedings of Second International Conference on Fuzzy Systems and Knowledge Discovery-FSKD'05, LNAI 3614, Springer-Verlag, 2005, pp. 596-599.

[5] Da-Zhi Sun, Zhen-Fu Cao, and Yu Sun, , Applied Mathematics and Computation 167(1) (2005) 572-575.

[6] Da-Zhi Sun, Zhen-Fu Cao, and Yu Sun, , Applied Mathematics and Computation 164(3) (2005) 675-678.


Patents

[1] Da-Zhi Sun, Ji-Zhou Sun, Jia-Wan Zhang, A scalar multiplication algorithm against simple power analysis attacks, Application No. 200810154231.2, Patent No. ZL 2008 1 0154231.2. (Submitted to State Intellectual Property Office of the PRC)

[2] Da-Zhi Sun, Yue-Jiao Wang, Zhi-Yong Feng, An efficient cryptographic hash-based authentication method for wireless sensor networks, Application No. 201210578596.4, Patent No. ZL 2012 1 0578596.4. (Submitted to State Intellectual Property Office of the PRC)

[3] Da-Zhi Sun, Yue-Jiao Wang, Xiao-Hong Li, A modified RFID authentication method based on the HB+ protocol, Application No. 201210185839.8, Patent No. ZL 2012 1 0185839.8. (Submitted to State Intellectual Property Office of the PRC)

[4] Da-Zhi Sun, Ya-Jiao Mao, Xiao-Hong Li, Guang-Quan Xu, An efficient ownership transfer method for RFID system, Application No. 201410068882.5, Patent No. ZL 2014 1 0068882.5. (Submitted to State Intellectual Property Office of the PRC)

[5] Da-Zhi Sun
, Bo-Wei Yang, Xiao-Hong Li, An improvement on the sliding-window exponentiation algorithm, Application No. 201410726861.8. (Submitted to State Intellectual Property Office of the PRC)

[6] Da-Zhi Sun
, Ze-Guang Zhu, Xiao-Hong Li, Guang-Quan Xu, A secure concurrency control method for real-time database, Application No. 201510264204.0. (Submitted to State Intellectual Property Office of the PRC)


Courses

SEG 2180081: Modern Cryptography - Spring 2008|Spring 2009|Fall 2009|Fall 2010.

CSTG 2160157: Modern Cryptography - Spring 2009|Fall 2009|Fall 2010|Fall 2011|Spring 2013|Spring 2014|Spring 2016|Spring 2018.

CSTG 2160245: Security in Computing - Spring 2010|Spring 2011|Spring 2012|Spring 2013|Spring 2014|Spring 2015|Spring 2016|Spring 2018.

2090907: Modern Cryptography - Spring 2014.

2090923: Wireless Network Security - Fall 2014.

S216C001: Cryptography and Network Security - Spring 2012|Spring 2013|Spring 2014|Spring 2015|Spring 2016.

S216E608: Cryptography and Information Security - Fall 2012|Fall 2013|Fall 2014|Spring 2015|Fall 2015|Fall 2016.


Professional Activity

1 August 2017-4 August 2017, Attend the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Sydney, Australia.

December 2016- , Visit Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Australia supported by China Scholarship Council. Research collaborator: Prof. .

29 November 2016-2 December 2016, Attend the 18th International Conference on Information and Communications Security (ICICS 2016), Singapore, Pictures.

2012, Invite Prof. to give a technical talk in the School of Computer Science and Technology at Tianjin University.

2011, Attend the 2011 FTRA International Symposium on Advances in Cryptography, Security, and Applications for Future Computing (ACSA 11), Jeju, Korea.

2010, Visit Japan Advanced Institute of Science and Technology, Pictures.


Last update: 01-Jul-2017