您当前浏览器版本过低,为了不影响您的使用,建议您使用最新的谷歌浏览器、火狐浏览器、 360浏览器,更换浏览器后使用更流畅!(注意!双核浏览器请切换为极速模式)
400-607-9388
  • 何泾沙
  • 所属院校: 北京工业大学
  • 所属院系: 信息学部
  • 职称:
  • 导师类型: 博导
  • 招生专业: 软件工程
  • 研究领域: 计算机网络、信息安全、互联网测试架构与技术、无线通信技术。
个人简介

个人简述:

任职情况: 1982.7-1983.8: 西安交通大学计算机教研室助教; 1984.6-1990.2: 美国马里兰大学电子与计算机工程系助研; 1990.2-1993.12: 美国IBM Corp.资深计算机科学家;· 1993.12-1996.12: 美国MCI Communications Inc.高级工程师; 1996.12-1997.8: 美国GRIC Communications Inc.首席工程师; 1997.8-2003.9: 美国Fujitsu Labs of America高级研究员; 2003.8至今: 北京工业大学教授、博士生导师、北京市特聘教授(2003.8-2006.7),软件学院副院长(2003.10-2011.1)。


科研工作:

[1] An Access Authentication Protocol for Trusted Handoff in Wireless Mesh Networks, Computer Standards & Interfaces, In Press. (SCI, EI)[2] On the Accuracy of Packet Delay Estimation in Distributed Service Networks, Journal of Network and Systems Management, 21(4), Dec. 2013, pp. 623-649. (SCI, EI)[3] On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things,International Journal of Distributed Sensor Networks, 2013(2013), Sept. 2013, pp. 1-13. (SCI, EI)[4] A New Trusted Roaming Protocol in Wireless Mesh Networks, International Journal of Sensor Networks, 14(2), Sept. 2013, pp. 109-119. (SCI)[5] Enabling End-to-End Secure Communication between Wireless Sensor Networks and the Internet, World Wide Web, 16(4), July 2013, pp. 515-540. (SCI, EI)[6] A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario, International Journal of Distributed Sensor Networks, 2012(2012), Dec. 2012, pp. 1-12. (SCI, EI)[7] Secure Localization in Wireless Sensor Networks with Mobile Beacons, International Journal of Distributed Sensor Networks, 2012(2012), Oct. 2012, pp. 1-11. (SCI, EI)[8] An Access Control Method based on Scenario Trust, International Journal of Computational Intelligence Systems, 5(5), Sept. 2012, pp. 942-952. (SCI, EI)[9] Secure Sensor Localization in Wireless Sensor Networks based on Neural Network, International Journal of Computational Intelligence Systems, 5(5), Sept. 2012, pp. 914-923. (SCI, EI)[10] Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification, International Journal of Computational Intelligence Systems, 4(5), Sept. 2011, pp. 768-776. (SCI)[11] Privacy Protection through Appropriate Interaction Patterns, China Communications, 8(4), July 2011, pp. 141-152. (SCI)[12] EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks, EURASIP Journal on Wireless Communications and Networking, 2011(2011), Jan. 2011. (SCI, EI)[13] Towards Critical Region Reliability Support for Grid Workflows, Journal of Parallel and Distributed Computing, 69(12), Dec. 2009, pp. 989-995. (SCI, EI)


教育背景:

1982.7: 西安交通大学计算机科学与技术学士学位;1984.12: 美国马里兰大学(University of Maryland)计算机工程硕士学位;1990.12: 美国马里兰大学(University of Maryland)计算机工程博士学位。

以上内容源自网络公开信息,仅作学术交流之目的,非为商业用途。
如若涉及侵权事宜,请及时与我们联络,我们将即刻修正或删除相关内容。
联系方式:+86 191 9534 4490。
确定
匹配导师

资料审核中

您的资料已提交成功!

我们的工作人员会将会在3-5个工作日内和您联系

返回