<div class> <table width> <tbody> <tr> <td> 姓名:崔竞松</td> <td> 性别:男</td> </tr> <tr> <td> 职称:副教授</td> <td> 电话:18986213001</td> </tr> <tr> <td colspan> E-mail:jscui@whu.edu.cn QQ:106310240</td> </tr> <tr> <td colspan> 学历学位:博士</td> </tr> <tr> <td colspan> 硕/博士生导师:硕士生导师</td> </tr> <tr> <td colspan> 研究方向:信息安全、云安全、网络验证码</td> </tr> </tbody> </table> <p> 1997年毕业于武汉大学计算机科学与技术系软件专业,同年攻读武汉大学计算机应用专业硕士学位;<br/> 2000年入武汉大学数学与计算机学院攻读博士学位;<br/> 2003年获得博士学位,留校任教。<br/> <br/> 教学情况<br/> </strong> 本科生《网络安全》<br/> 硕士生《密码学应用技术》<br/> 博士生《安全协议分析》<br/> <br/> 科研工作<br/> </strong> 主持湖北省自然科学基金课题《基于动态视频的新型验证码设计》<br/> 主持武汉大学自主研究课题《基于立体动画的CAPTCHA理论与实现机制研究》<br/> 主持空天信息安全与可信计算教育部重点实验室(B类)开放基金《基于公钥密码的空天信息高效安全分发系统研究》<br/> 主持横向课题《虚拟化安全服务》《虚拟机管理系统》《电动车控制器设计》《路桥系统设计》<br/> 参加国家自然科学基金重大研究计划《面向城区综合环境的无人驾驶车辆平台及关键技术研究》<br/> 参加国家自然科学青年基金《基于本体的安全需求获取与分析方法研究》<br/> 参加国家自然科学青年基金《非线性密码函数与伪随机序列的研究》<br/> 参加横向课题《基于KVM的云安全系统》<br/> <br/> 获奖及专利<br/> </strong> 《基于磁盘的数据备份与恢复管理软件》获湖北省科技进步二等奖;<br/> 《一种并行容侵系统研究模型——RC模型》获中国科学技术协会颁发的第五届中国科协期刊优秀学术论文奖;<br/> 《一种快速分解大整数的小因子的优化分解树OFT算法》获湖北省科技厅颁发的湖北省第十届自然科学优秀学术论文三等奖<br/> 带领学生获2009和2010全国大学生信息安全竞赛二等奖,2010全国电子设计大赛信息安全邀请赛二等奖,2010VMware中国大学生云计算创意大赛一等奖<br/> 拥有密码算法相关专利1项,网络验证码相关专利1项,云安全相关专利3项</p> <p> <br/> <br/> <br/> <br/> <br/> 主要论文<br/> <br/> [1]. Hidden Process Detection Based on Virtual Machine<br/> Monitor, Jingsong Cui, Shasha Zhu, Yuzhong Wen, Xuhui Liu, Yu Yang, In 2010<br/> International Conference on Future Information Technology (ICFIT 2010),ChangSha,<br/> China, Dec 14th to 15th, 2010.<br/> <br/> [2]. A 3-layer Dynamic CAPTCHA Implementation,<br/> JingSong Cui, WuZhou Zhang, Yang Peng, el., In the 2nd International Workshop on<br/> Education Technology and Computer Science (ETCS 2010),Wuhan, China, March 6th to<br/> 7th, 2010.<br/> <br/> [3]. A CAPTCHA Implementation Based on Moving Objects Recognition<br/> Problem, Jing-Song Cui, Jing-Ting Mei, Wu-Zhou Zhang, el. , In the International<br/> Conference on E-Business and E-Government (ICEE 2010), Guangzhou, China, May 7th<br/> to 9th, 2010.<br/> <br/> [4]. Study on a Kind of 3-layer Dynamic CAPTCHA Construction<br/> Method, JingSong Cui, WuZhou Zhang, Yang Peng, el., Journal of Wuhan University<br/> of Technology, Vol32 No7, 2010<br/> <br/> [5]. Animation CAPTCHA Implementation Based on<br/> MOITP, JingSong Cui, LiJing Wang and WuZhou Zhang, In the 3rd International<br/> Conference on Information Sciences and Interaction Sciences, Aug. 2010<br/> <br/> [6]. A<br/> CAPTCHA Implementation Based on 3D Animation, Jing-Song Cui, Jing-Ting Mei, Xia<br/> Wang, el., In the 2009 International Conference on Multimedia Information<br/> Networking and Security (MINES 2009), Wuhan, China, November 18th to 20th, 2009.<br/> <br/> [7]. The research and application of security requirements analysis<br/> methodology of information systems, Jing-Song Cui, Da Zhang, In the 2nd<br/> International Conference on Anti-counterfeiting, Security and Identification,<br/> ASID 2008, p 30-36, 2008.<br/> <br/> [8]. The Optimized Subkeys Distribution Algorithm<br/> in Threshold RSA, Jingsong Cui, Rong Peng, Chinese Journal of Computers, No. 6,<br/> 2005<br/> <br/> [9]. A Parallel Model of Intrusion Tolerance System: RC Model, Jingsong<br/> Cui, Lina Wang, el. Chinese Journal of Computers, No. 4, 2004<br/> <br/> [10]. A New<br/> Approach to Anti-Piracy, Jingsong Cui, Lina Wang, DCDIS Series B, Applications<br/> and Algorithms, published in ICCSA 2006, ISSN 1492-8760, Watam Press<br/> <br/> [11]. A<br/> Fast Algorithm OFT To Factorize Small Factors Of Big Integer, Jingsong Cui, Rong<br/> Peng, Chinese Journal of Computers, No. 11, 2004<br/> <br/> [12]. The Optimized Key<br/> Distribution Scheme in Threshold RSA, Jingsong Cui, Rong Peng, Lina Wang,<br/> Proceedings of the 3rd international conference on information security: 18-21,<br/> Nov. 2004<br/> <br/> [13]. An Embedded Mechatronic Controller Architecture, Jingsong<br/> Cui, Yongqian Xiang, Rong Peng, Computer Engineering, Vol32, 2006<br/> <br/> [14]. The<br/> Fast Generation Big Prime in Restricted Environment, Jingsong Cui, Hang Tu, el.<br/> Computer Engineering, Vol29, 2003<br/> <br/> [15]. The Research Of Intrusion Tolerance<br/> System Based On State Transition Model, Jingsong Cui, Lina Wang, el., Computer<br/> Science, Vol30, 2003<br/> <br/> <br/> <br/> <br/> </p> </div>