Showing 1 - 20 results of 28 for search 'MA Jian-feng', query time: 0.03s
Refine Results
-
1
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks by GUO Jiang-hong, MA Jian-feng
Published 2011-01-01
Article -
2
Provable secure trusted protocol for network storage by DUAN Xin-dong, MA Jian-feng
Published 2011-01-01
Article -
3
Hybrid wireless mesh protocol by YANG Kai1, MA Jian-feng1
Published 2009-01-01
Article -
4
Location based reliability differentiation service for WSN by ZENG Yong1, MA Jian-feng1
Published 2008-01-01
Article -
5
New approach against Sybil attack in wireless sensor networks by FENG Tao1, MA Jian-feng2
Published 2008-01-01
Article -
6
Trusted routing based on D-S evidence theory in wireless mesh network by YANG Kai, MA Jian-feng, YANG Chao
Published 2011-01-01
Article -
7
UC secure one-time signature based broadcast authentication by ZHANG Jun-wei, MA Jian-feng, YANG Li
Published 2010-01-01
Article -
8
Design of anonymous authentication protocol for RFID by DENG Miao-lei, MA Jian-feng, ZHOU Li-hua
Published 2009-01-01
Article -
9
Provably secure partially blind signature without trusted PKG by FENG Tao1, PENG Wei1, MA Jian-feng3
Published 2010-01-01
Article -
10
Anonymous access protocol for media independent information service by LI Guang-song1, MA Jian-feng1, JIANG Qi1
Published 2010-01-01
Article -
11
Trusted and anonymous authentication scheme for wireless networks by YANG Li1, MA Jian-feng 1, ZHU Jian-ming 2
Published 2009-01-01
Article -
12
Universally composable oblivious transfer protocol based on VSPH by LI Feng-hua1, FENG Tao1, MA Jian-feng1
Published 2007-01-01
Article -
13
Social network-based trustworthy routing in delay tolerant networks by YU Hai-zheng1, MA Jian-feng1, BIAN Hong3
Published 2010-01-01
Article -
14
Survey of wireless sensor network security techniques by PEI Qing-qi1, SHEN Yu-long1, MA Jian-feng1
Published 2007-01-01
Article -
15
Consistency of group key exchange protocols by CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2
Published 2008-01-01
Article -
16
Analysis of provably secure on-demand source routing in MANET by MAO Li-qiang1, MA Jian-feng1, LI Xing-hua1
Published 2009-01-01
Article -
17
Model of fuzzy risk assessment of the information system by ZHAO Dong-mei1, MA Jian-feng1, WANG Yue-sheng2
Published 2007-01-01
Article -
18
Access control model based on trusted computing for integrated avionics system by CUI Xi-ning1, 2, SHEN Yu-long1, MA Jian-feng1
Published 2009-01-01
Article -
19
Direct anonymous authentication scheme for wireless networks under trusted computing by YANG Li1, MA Jian-feng 1, PEI Qing-qi2, MA Zhuo 1
Published 2010-01-01
Article -
20
Universally composable secure trusted access protocol for WLAN Mesh networks by MA Zhuo1, MA Jian-feng1, ZENG Yong1, SHEN Yu-long1
Published 2008-01-01
Article