Showing 1 - 20 results of 43 for search 'Jian-feng MA', query time: 0.03s
Refine Results
-
1
Secure and transparent data aggregation for wireless sensor networks by Jiang-hong GUO, Jian-feng MA
Published 2012-10-01
Article -
2
Provably secure private key protection scheme for smart mobile terminal by Jun MA, Jian-feng MA, Yuan-bo GUO
Published 2012-12-01
Article -
3
Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA
Published 2012-04-01
Article -
4
Improvement and formal proof on protocol Otway-Rees by Lai-feng LU, Xin-dong DUAN, Jian-feng MA
Published 2012-09-01
Article -
5
Protocol to enhance the security of Early data in TLS 1.3 by Xing-long ZHANG, Qing-feng CHENG, Jian-feng MA
Published 2017-12-01
Article -
6
Partially policy hidden CP-ABE supporting dynamic policy updating by Zuo-bin YING, Jian-feng MA, Jiang-tao CUI
Published 2015-12-01
Article -
7
Approach on runtime monitoring based on the embedded trusted platforms by Zhao-chang SUN, Jian-feng MA, Cong SUN, Di LU
Published 2017-10-01
Article -
8
Multi-authority ABS supporting dendritic access structure by Ruo MO, Jian-feng MA, Xi-meng LIU, Qi LI
Published 2017-07-01
Article -
9
Anonymous aggregator election protocol for wireless sensor networks by Shuai FU, Jian-feng MA, Hong-tao LI, GQi JIAN
Published 2015-02-01
Article -
10
Research on security of mobile payment for commercial bank by Xi CHEN, You-liang TIAN, Zhuo MA, Jian-feng MA
Published 2014-11-01
Article -
11
Towards cooperation location privacy-preserving group nearest neighbor queries in LBS by Sheng GAO, Jian-feng MA, Qing-song YAO, Cong SUN
Published 2015-03-01
Article -
12
Composable information flow verification for service chain based on model checking by Ning XI, Jian-feng MA, Cong SUN, Di LU, Tao ZHANG
Published 2014-11-01
Article -
13
New remote authorization protocol for vehicle diagnosis by Zheng-da JIAO, Jian-feng MA, Cong SUN, Qing-song YAO
Published 2014-11-01
Article -
14
Improved direct anonymous attestation scheme for mobile computing platforms by Li YANG, Jun-wei ZHANG, Jian-feng MA, Zhi-hong LIU
Published 2013-06-01
Article -
15
-
16
On-demand key management based on social attribute for opportunistic networks by Xi CHEN, Guang-song LI, You-liang TIAN, Jian-feng MA
Published 2012-12-01
Article -
17
Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Published 2013-08-01
Article -
18
Study of cross-domain identity authentication in SOA environment by Jing-jing GUO, Jian-feng MA, Xin-xin GUO, Tao ZHANG
Published 2016-11-01
Article -
19
Adaptively secure key-policy ABE scheme with fast decryption by Qi LI, Jian-feng MA, Jin-bo XIONG, Xi-meng LIU
Published 2014-11-01
Article -
20
Multi-language oriented automatic realization method for cryptographic protocols by Xing-hua LI, Shuai-tuan LI, Deng LI, Jian-feng MA
Published 2012-09-01
Article