ShuangHe Peng
School of Computer and Information Technology
Beijing Jiaotong University


Chinese Version (HTML )

Contact Information

Office: East D309 Mechanical Engineering Building
Phone: (8610) 5168-2592
Email:
shhpeng@bjtu.edu.cn
Curriculum Vitae: pdf
Biography: html

Active Research Areas

  • System Security
  • Trusted Computing Technology
  • Cloud Computing

Graduated Students(Master)

  • Meng Fan (Now at Institute of Information Engineering, CAS )
  • YingJie Qin (Now at Alibaba)
  • ZhiGe Chen (Now at Meituan.com)
  • Zhuan Jin (Now at Iqiyi)
  • Maitisabier.TuerGong (Now at BJTU)
  • KeXiang Wang

Current Graduate Students(Masters)

  • Shuang Yao
  • QiaoFeng Zhou
  • Peiyao Liu

Journal Articles

  • ShuangHe Peng , ZhiGe Chen, DeEn Chen. Membership Proof and Verification in Authenticated Skip Lists based on Heap, China Communications, 13(6):195-204, 2016. ( PDF )
  • ShuangHe Peng , ZhiGe Chen, DeEn Chen. Performance analysis and comparison of data integrity authentication for authenticated skip lists, Journal of Beijing Jiaotong University, 40(2):58-62, 2016. ( PDF )
  • Rui Zhang, JiQian Liu, ShuangHe Peng . Research and Implementation of trust transition based on EFl, Computer Applications, 27(9):2174-2176, Sep.2007. ( PDF )
  • ShuangHe Peng , Zhen Han. Enhancing PC Security with a U-Key, IEEE Security & Privacy, 4(5):34-39, 2006. ( PDF )
  • ShuangHe Peng , Zhen Han, ChangXiang Shen. Security protocol and scheme for inter-realm information accessing, Journal of Computer Research and Development, 42(9):1587-1593, 2005. ( PDF )
  • ShuangHe Peng , Zhen Han. A Way to Extend the Authentication Capability of Application Boundary Security Device, Journal of Beijing Jiaotong University, 28(5):6-10, 2004. ( PDF )
  • ShuangHe Peng . The design and implementation of T=0 protocol of smart card based on USB control chip, Journal of computer applications, Vol.24, 2004.
  • ShuangHe Peng , GenXing Yang. The design and implementation of pseudo-SPI technology under 32-bits micro-processor, Journal of micro-computer and its applications, 21(2):25-27, 2002. ( PDF )
  • Bailu Guo,ShuangHe Peng , Xun Chen. Commercial Confidential Information Protection Technology Research based on TCM, Information Security and Communications Privacy, pages:80-84, 2014.3. ( PDF )
  • WeiMin Tang, Lan Gao, ShuangHe Peng , Zhen Han, ChangXiang Shen. Trust Enhancement of General Personal Computer Based on Removable TPM, Journal of Wuhan University(Nat.Sci.Ed.),55(1):22-26,2009.2. ( PDF )
  • WeiMin Tang, ShuangHe Peng , Zhen Han, ChangXiang Shen. A Role-Based Mandatory Access Control Model, Journal of Beijing Jiaotong University 34(2):95-100, 2010,4. ( PDF )

Publications in Conferences

  • ShuangHe Peng , YingJie Qin and ZhiGe Chen. A Simple and More Versatile Authentication Path Computation Algorithm for Binary Hash Tree, the Third ASE International Conference on Cyber Security, CyberSecurity2014, Pages: 1-8. ( PDF )
  • ShuangHe Peng , Meng Fan, YingJie Qin and ZhiGe Chen. A Public-Verifiable Secure Logging Scheme on Chinese Trusted Platform, Proceedings of the International Conference on Cyber Science and Engineering, CyberSE 2013, Pages:324-330. ( PDF )
  • ShuangHe Peng , JiQiang Liu. Trust Verification of Booting File in Real Mode Using Portable TPM, Proceedings of 2011 Cross-Strait Conference on Information Science and Technology and iCube, Pages:239-242. ( PDF )
  • ShuangHe Peng , Zhen Han. A Trusted Boot System Using Portable TPM on EFI based BIOS, Proceedings of 2010 Cross-Strait Conference on Information Science and Technology, Pages:161-164. ( PDF )
  • ShuangHe Peng , Zhen Han. The Design and Implementation of Portable TPM Device Driver based on Extensible Firmware Interface, 2009 International Conference on Multimedia Information Networking and Security, Mines'09, Pages:342-345. ( PDF )
  • ShuangHe Peng , Zhen Han. Trust of user using U-Key on trusted platform, 2006 8th International Conference on Signal Processing, ICSP 2006, Pages:3023-3026. (PDF )
  • WeiMin Tang , ShuangHe Peng , Zhen Han. Design and Implementation of UsbKey Device Driver based on Extensible Firmware Interface, 8th International Conference on Signal Processing, ICSP 2008,( PDF )
  • ShuangHe Peng , Zhen Han. Proxy cryptography for secure inter-domain information exchanges, 11th Pacific Rim International Symposium on Dependable Computing, PRDC 2005, Pages:193-199. ( PDF )
  • ShuangHe Peng , Zhen Han, KeJun Sheng. ID-Based Proxy Signature and Designated verifier Proxy Signature Scheme from Bilinear Maps, CCICS'2005, (PDF)
  • ShuangHe Peng , Zhen Han, JiQiang Liu. Security enhancement for two remote user authentication schemes, ICSP'2004, (PDF)

Software Copyrights

  • P.R.China Registration No. 2011SRBJ4103. Computer software (version 1.0) for the trusted verification of NTFS files in real mode. ShuangHe Peng , Zhen Han and JiQiang Liu, ( JPG).
  • P.R.China Registration No. 2008SRBJ5042. Computer software (version 1.0 ) of UKey driver in real mode. ShuangHe Peng , ( PDF)

Patents

  • P.R.China Patent Number: 201310495388.2. A new method to get authentication path for SkipLists based on Heap. ShuangHe Peng , Zhen Han and JiQiang Liu. Awarded: 01-2017 (Inventor), ( PDF).
  • P.R.China Patent Number: 201310341001.8. Method to get authentication path for a signing scheme using Merkle tree. ShuangHe Peng , Zhen Han and JiQiang Liu. Awarded: 05-2016 (Inventor), ( PDF).
  • P.R.China Patent Number: 200810238938. Method to verify boot files based on portable Trusted Platform Module. ShuangHe Peng , Zhen Han and JiQiang Liu. Awarded: 10-2008 (Inventor), ( JPG).
  • P.R.China Patent Number: 201110355883.4. Method to build hypervisor using hardware assisted virtualization before operation system is booted. ShuangHe Peng . Submitted: 10-2011 (Inventor), ( PDF)
  • P.R.China Patent Number: 201310495388.2. Method to get authentication path for skip list based on max heap. ShuangHe Peng . Submitted: 10-2013 (Inventor).

Teaching

Spring 2017
Teaching: Special Train on Program Design
Fall 2016
Teaching: Programming Language
Fall 2014
Teaching: Programming Language
Spring 2014
Teaching: Data Structure
Fall 2013
Teaching: Programming Language
Fall 2012
Teaching: Programming Language
Spring 2011
Teaching: Data Structure

Honor and Awards

  • Outstanding Teaching Award, School of Computer and Information Technology, Beijing Jiaotong University, 2014--.
  • Excellent Teachers in Charge of a Class, School of Computer and Information Technology, Beijing Jiaotong University, 2014.
  • Excellent Teachers in Charge of a Class, School of Computer and Information Technology, Beijing Jiaotong University, 2013.


  • Last modified: July 16 15:15:45 EDT 2017         © 2015-2017, ShuangHe Peng