Photo Gallery


You are now here Home > Academics > Professors >

CS:Qi Xia

published: 2015-12-09 21:17:39       hits: 

name : Qi Xia Sex: Female phone: 13980060339
email: office-address: Main Building B1-201, QingShui Campus
PH.D  Supervisor: No Master Supervisor Yes
major: Computer Science and Technology
research interst: Network Information Security, Cryptography, Colud Computing,Security Protocol
Biography: Dr. Xia received her Ph.D. degree from the University Electronic Science and Technology of China (UESTC) in 2010, M.S. degree in 2006. She jioned UESTC as a teacher in 2002. She joined the  University of Pennsylvania, United States, during 2013-2014 as a visiting scholar. She has published more than ten papers. She got the First Award for Science and Technology Progress of Sichuan Province in 2010 and the Second National Award for Science and Technology Pragress in 2012. 
Education experience: Study Abroad: University of Pennsylvania, (as a government-sponsored, Visiting Scholar)
Research Topic: the Security of the Public E-healthe Information System
Date: Aug. 2013 – Aug. 2014
Ph. D. Degree: School of Computer Science & Engineering, UESTC
Computer Application, Sep 2007 – Dec. 2010
M. Sc. Degree: School of Computer Science & Engineering, UESTC
Computer Software and Theory, Sep. 2004 – Dec. 2006
B.Sc. Degree: School of Computer Science & Engineering, UESTC
Computer Science and Technology, Sep. 1998 – July 2002
Selected Publications: [1] Xia Qi, Xu Chunxiang, Yu Yong. Key substitution attacks on some verifiably encrypted signature schemes. High Technology Letters,2011,vol.18(2):136-140
[2] Xia Qi, Xu Chunxiang, Yu Yong. Key replacement attack on two certificateless signature schemes without random oracles. Key Engineering Materials, v 439-440, 2010: 1606-1611.
[3] Xia Qi, Xu Chunxiang. Cryptanalysis of two identity based signcryption schemes. 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009. 2009: 292-294.
[4] Xia Qi, Gao Jianbin, Xu Chunxiang. A new watermarklng algorithm based on slowly feature analysis,. 2008 International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA 2008. 2008: 70-72.
[5] Xia Qi, Xu Chunxiang, Gao Jianbin. Cryptanalysis and improvement of a proxy signature scheme. Journal of Computer Applications. 2009(2):353-355
[6] Xia Qi, Xu Chunxiang. Security analysis of a verifiably encrypted signature scheme. Journal of Computer Engineering and Applications. 2009, 45(30): 13-15
Books: [1] Fagen Li, Qi Xia, Yong Yu. A new identity based signcryption without random oracles. Book chapter 1, Encryption: Methods, Software and Security. Nova Science Publishers
[2] Haigang Gong, Qi Xia, etc, Computer Networks,  Apr. 2009, Electronic Industry Press.