Curriculum Vitae
Name: Jingliang Zhang
Current position: Associate Professor
Contact Information:
School of Mathematical Sciences,
OceanUniversity of China,
238 Songling Road,
Qingdao, China, 266100
Email: zjlmlz@ouc.edu.cn
Office Phone:
Education:
Ph.D. in Cryptography ,September 2008
School of Telecommunications Engineering, XidianUniversity, P. R. China,
M. Sc. in Basic Mathematics ,September 1996
Department of Mathematics, Shaanxi Normal University, P. R. China,
B. Sc. in Mathematics Education ,September 1992
Department of Mathematics, Shandong Normal University, P. R. China
Professional Experience:
1999—present: in Department of Mathematics at Ocean University of China
Current position: Associate Professor
Teaching Courses: Advanced Mathematics, Discrete Mathematics, Modern Algebra, Cryptography
2012: worked in Department of Electrical and Computer Engineering, University of
Florida, U.S., as Visitor Scholar
Research Interests:
Information Security, Cryptographic Theory and Electronic Business
Grants:
1.National Natural Science Foundation of China (No. 61103199), Security Analysis of Public Key Cryptographic Algorithms and RSA Modulus Based on LFSR. 2012.1-20145.12
Selected Publications:
2.Jingliang Zhang, Lizhen Ma, Rong Sun, Yumin Wang. More efficient VLR group signature satisfying exculpability. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.7 (2008), pp. 1831-1835.
3.Jingliang Zhang, Shichong Tan, Yumin Wang. Dynamic fair e-cash system without special trustees. Journal of Computational Information Systems , 4(4) ( 2008), pp. 1423-1427.
4.Jingliang Zhang, Lizhen Ma, Wanli Su and Yumin Wang. Privacy-preserving authentication based on short group signature in vehicular networks. In: the First International Symposium on Data, Privacy, and E-Commerce, Chengdu, China, IEEE Computer Society, 2007, pp. 138-142, (SDPEC 2007).
5.Jingliang Zhang, Lizhen Ma and Yumin Wang. Fair e-cash system without trustees for multiple banks. In: Workshop on 2007 International Conference on Computational Intelligence and Security, Harbin, China, IEEE Computer Society, 2007, pp. 585-587, (ICCIS 2007).