Showing 1 - 18 results of 18 for search 'MA Jian-feng1', query time: 0.04s
Refine Results
-
1
Hybrid wireless mesh protocol by YANG Kai1, MA Jian-feng1
Published 2009-01-01
Article -
2
Location based reliability differentiation service for WSN by ZENG Yong1, MA Jian-feng1
Published 2008-01-01
Article -
3
Anonymous access protocol for media independent information service by LI Guang-song1, MA Jian-feng1, JIANG Qi1
Published 2010-01-01
Article -
4
Trusted and anonymous authentication scheme for wireless networks by YANG Li1, MA Jian-feng 1, ZHU Jian-ming 2
Published 2009-01-01
Article -
5
Universally composable oblivious transfer protocol based on VSPH by LI Feng-hua1, FENG Tao1, MA Jian-feng1
Published 2007-01-01
Article -
6
Social network-based trustworthy routing in delay tolerant networks by YU Hai-zheng1, MA Jian-feng1, BIAN Hong3
Published 2010-01-01
Article -
7
Survey of wireless sensor network security techniques by PEI Qing-qi1, SHEN Yu-long1, MA Jian-feng1
Published 2007-01-01
Article -
8
Consistency of group key exchange protocols by CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2
Published 2008-01-01
Article -
9
Analysis of provably secure on-demand source routing in MANET by MAO Li-qiang1, MA Jian-feng1, LI Xing-hua1
Published 2009-01-01
Article -
10
Model of fuzzy risk assessment of the information system by ZHAO Dong-mei1, MA Jian-feng1, WANG Yue-sheng2
Published 2007-01-01
Article -
11
Access control model based on trusted computing for integrated avionics system by CUI Xi-ning1, 2, SHEN Yu-long1, MA Jian-feng1
Published 2009-01-01
Article -
12
Direct anonymous authentication scheme for wireless networks under trusted computing by YANG Li1, MA Jian-feng 1, PEI Qing-qi2, MA Zhuo 1
Published 2010-01-01
Article -
13
Universally composable secure trusted access protocol for WLAN Mesh networks by MA Zhuo1, MA Jian-feng1, ZENG Yong1, SHEN Yu-long1
Published 2008-01-01
Article -
14
Access control model and its application for collaborative information systems by LI Feng-hua1, WANG Wei1, MA Jian-feng1, LIU Hong-yue1
Published 2008-01-01
Article -
15
Identity-based roaming protocol with anonymity for heterogeneous wireless networks by JIANG Qi1, MA Jian-feng1, LI Guang-song1, LIU Hong-yue1
Published 2010-01-01
Article -
16
Two-hop cover-based access control scheme for wireless sensor networks by DU Zhi-qiang1, SHEN Yu-long1, MA Jian-feng1, ZHOU Li-hua1
Published 2010-01-01
Article -
17
Key infection and its applications in sensor networks by LIU Zhi-hong1, MA Jian-feng1, PANG Liao-jun1, PEI Qing-qi1
Published 2009-01-01
Article -
18
Improvement of the anonymity formalization based on strand space model by DONG Xue-wen1, NIU Wen-sheng2, MA Jian-feng1, XIE Hui1, MAO Li-qiang1
Published 2011-01-01
Article