Showing 1 - 20 results of 26 for search 'Jianfeng MA', query time: 0.03s
Refine Results
-
1
-
2
UCAP:a PCL secure user authentication protocol in cloud computing by Xuefeng LI, Junwei ZHANG, Jianfeng MA
Published 2018-08-01
Article -
3
Information flow integrity measurement method using integrity threat tree by Qixuan WU, Jianfeng MA, Cong SUN
Published 2019-04-01
Article -
4
Attribute-based proxy signature scheme for unmanned aerial vehicle networks by Lei HE, Jianfeng MA, Dawei WEI
Published 2021-11-01
Article -
5
Survey of community privacy in social network by Zhongyuan JIANG, Xianyu CHEN, Jianfeng MA
Published 2021-04-01
Article -
6
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO
Published 2019-02-01
Article -
7
-
8
Privacy protection system based on Hook for Android by Xiaoyan ZHU, Hui ZHANG, Jianfeng MA
Published 2018-04-01
Article -
9
Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO
Published 2020-04-01
Article -
10
Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks by Shuai Fu, Jianfeng Ma, Hongtao Li, Changguang Wang
Published 2013-01-01
Article -
11
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI
Published 2021-10-01
Article -
12
Continuous location privacy protection mechanism based on differential privacy by Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA
Published 2021-08-01
Article -
13
-
14
Proof of storage with corruption identification and recovery for dynamic group users by Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA
Published 2022-10-01
Article -
15
Fast copy-move forgery detection algorithm based on group SIFT by Bin XIAO, Ruxia JING, Xiuli BI, Jianfeng MA
Published 2020-03-01
Article -
16
Blockchain-based distributed EHR fine-grained traceability scheme by Zuobin YING, Yuanping SI, Jianfeng MA, Ximeng LIU
Published 2021-05-01
Article -
17
Dummy location selection algorithm based on location semantics and query probability by Jie WANG, Chunru WANG, Jianfeng MA, Hongtao LI
Published 2020-03-01
Article -
18
Blockchain-based secure and fair crowdsourcing scheme by Junwei Zhang, Wenxuan Cui, Jianfeng Ma, Chao Yang
Published 2019-07-01
Article -
19
-
20
Data comparable encryption scheme based on cloud computing in Internet of things by Qian MENG, Jianfeng MA, Kefei CHEN, Yinbin MIAO, Tengfei YANG
Published 2018-04-01
Article