Wang Guan

Name: Wang Guan

Gender: Male

Degrees: Master’s Degree

Title: Associate professor

E-mail : wangguan@bjut.edu.cn

Research Areas

Information security, Trusted computing, Information system

Publications

  1. Wang Guan, Yan Zhiwei. Optimization Design and Implementation of Application Layer Interface of Trusted Cryptography Module. Journal of Information Security Research,2020,6(04):354-361.

  2. Wang Guan, Liang Shihao. Security Enhancement Scheme of Hadoop KMS Based on SGX. Journal of Information Security Research,2019,5(06):514-520.

  3. Wang Guan, Yang Songsong. Research on SPI Protected Ranges Vulnerability. Software Guide,2018,17(12):204-207+2.

  4. Wang Guan, Hao Ranran,. Malicious Code Detection Method Based on WIG-GA Feature Selection Algorithm. Computer Science and Application,2018,8(03):266-274. DOI:10.12677/CSA.2018.83031.

  5. Wang Guan,Guo Yiqing,. Research on Trusted System Architecture and Virtual Certificate Chain in Cloud Environment. Computer Science and Application,2018,8(05):738-747. DOI:10.12677/CSA.2018.85082.

  6. Wang Guan,Wang Xiaoyan. Study on the Classification Scheme of Education Resources Based on Ontology via GA-KNN and Linear Programming. Computer Science and Application,2017,7(03):199-205. DOI:10.12677/CSA.2017.73025.

  7. Sun Liang, Chen Xiaochun, Wang Guan, Zheng Shujian .Verification Technology based on UEFI Firmware Trojan. Information Security and Communications Privacy,2016(07):89-93.

  8. Wang Guan, Yuan Huahao. Research of Virtual Trusted Cryptography Module's Secret Key Management Based on the Trusted Root Server. Netinfo Security,2016(04):17-22.

  9. Zhou Yihua,Wang wei,Wang Guan,Sun Liang.Remote Identity Authentication Based firmware. Information Security and Technology

  10. ,2016,7(03):35-39.

  11. Wang Guan,Shan Fuyuan. Research on Security Framework for Cloud Computing Server Platform. Computer Security,2014(12):10-12.

 

Personal Statement

Wang Guan is an Associate Professor and Master Supervisor in the Department of Information Security at Beijing University of Technology and is also a researcher in Beijing Key Laboratory of Trusted Computing. He presided over many large information systems. He has undertaken the research and compilation of many standards in information security and trusted computing, among which five standards have been approved as national standards. He has published more than 20 academic papers in major journals, and has many invention patents.