The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Jianfeng Ma" ( http://dblp.L3S.de/Authors/Jianfeng_Ma )

  Author page on DBLP  Author page in RDF  Community of Jianfeng Ma in ASPL-2

Publication years (Num. hits)
2004-2005 (17) 2006-2008 (29) 2009 (21) 2010 (19) 2011 (23) 2012 (22) 2013 (36) 2014 (30) 2015 (46) 2016 (41) 2017 (32)
Publication types (Num. hits)
article(184) incollection(1) inproceedings(129) proceedings(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 23 occurrences of 21 keywords

Results
Found 317 publication records. Showing 316 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Xu An Wang, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, Xiaoshuang Luo Cost-effective secure E-health cloud system using identity based cryptographic techniques. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xinghua Li, Jiajia Liu, Qingsong Yao, Jianfeng Ma Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qi Jiang 0001, Sherali Zeadally, Jianfeng Ma, Debiao He Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tao Jiang, Xiaofeng Chen 0001, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou Secure and Efficient Cloud Data Deduplication With Randomized Tag. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yinbin Miao, Jianfeng Ma, Fushan Wei, Zhiquan Liu, Xu An Wang, Cunbo Lu VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Search on Bibsonomy Peer-to-Peer Networking and Applications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Li Yang, Yaping Tian, Jin Li, Jianfeng Ma, Junwei Zhang Identifying opinion leaders in social networks with topic limitation. Search on Bibsonomy Cluster Computing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jianfeng Ma, Linan Qi, Lizhi Deng Efficiency measurement and decomposition in hybrid two-stage DEA with additional inputs. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xu An Wang, Jianfeng Ma, Fatos Xhafa, Baodong Qin, Mingwu Zhang New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service. Search on Bibsonomy IJWGS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xu An Wang, Fatos Xhafa, Jianfeng Ma, Yunfei Cao, Dianhua Tang Reusable garbled gates for new fully homomorphic encryption service. Search on Bibsonomy IJWGS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jiahao Dai, Jiajia Liu, Yongpeng Shi, Shubin Zhang, Jianfeng Ma Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks. Search on Bibsonomy IEEE Trans. Vehicular Technology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qingfeng Cheng, Xinglong Zhang, Jianfeng Ma ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment. Search on Bibsonomy J. Medical Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Di Lu, Jianfeng Ma, Cong Sun, XinDi Ma, Ning Xi Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meixia Miao, Jianfeng Wang, Jianfeng Ma, Willy Susilo Publicly verifiable databases with efficient insertion/deletion operations. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Limin Shen, Futai Zhang, Yinxia Sun, Jianfeng Ma An efficient revocable ID-based encryption scheme in the standard model. Search on Bibsonomy IJES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pengbin Feng, Jianfeng Ma, Cong Sun Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection. Search on Bibsonomy Mobile Information Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen Distributed Secure Service Composition with Declassification in Mobile Clouds. Search on Bibsonomy Mobile Information Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Limin Shen, Jianfeng Ma, Ximeng Liu, Fushan Wei, Meixia Miao A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Linbo Luo, Xiangting Hou, Jinghui Zhong, Wentong Cai, Jianfeng Ma Sampling-based adaptive bounding evolutionary algorithm for continuous optimization problems. Search on Bibsonomy Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hai Liu, Xinghua Li, Mengfan Xu, Ruo Mo, Jianfeng Ma A fair data access control towards rational users in cloud storage. Search on Bibsonomy Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yanguo Peng, Jiangtao Cui, Hui Li, Jianfeng Ma A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud. Search on Bibsonomy Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hui Li, Sourav S. Bhowmick, Jiangtao Cui, Jianfeng Ma Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Qi Jiang 0001, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen Chilamkurti A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Search on Bibsonomy Int. Journal of Network Management The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xinghua Li, Meixia Miao, Hai Liu, Jianfeng Ma, Kuan-Ching Li An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism. Search on Bibsonomy Soft Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuling Shang, Liyuan Sun, Chunquan Li, Jianfeng Ma Test of Mechanical Failure for Via Holes and Solder Joints of Complex Interconnect Structure. Search on Bibsonomy J. Electronic Testing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qingfeng Cheng, Siqi Lu, Jianfeng Ma Analysis and improvement of the Internet-Draft IKEv3 protocol. Search on Bibsonomy Int. J. Communication Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jingjing Guo, Jianfeng Ma, Xinghua Li, Junwei Zhang, Tao Zhang An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2017 DBLP  BibTeX  RDF
1Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang 0001, Junwei Zhang, Limin Shen, Zhiquan Liu VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Search on Bibsonomy Pervasive and Mobile Computing The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Danping Li, Chao Yang, Chengzhou Li, Qi Jiang 0001, Xiaofeng Chen, Jianfeng Ma, Jian Ren A client-based secure deduplication of multimedia data. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cong Sun, Pengbin Feng, Teng Li, Jianfeng Ma Data-Oriented Instrumentation against Information Leakages of Android Applications. Search on Bibsonomy COMPSAC (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cong Sun, Ning Xi, Jianfeng Ma Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition. Search on Bibsonomy COMPSAC (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cong Sun, Qingsong Yao, Jianfeng Ma Certia: Certifying Interface Automata for Cyber-Physical Systems. Search on Bibsonomy SMARTCOMP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen 0001, Jianfeng Ma, Yong Qi Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain. Search on Bibsonomy ICDCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, Haiyong Bao Efficient and privacy-preserving skyline computation framework across domains. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, Baodong Qin Privacy-Preserving Patient-Centric Clinical Decision Support System on Na├»ve Bayesian Classification. Search on Bibsonomy IEEE J. Biomedical and Health Informatics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yichuan Wang, Santosh Chandrasekhar, Mukesh Singhal, Jianfeng Ma A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Search on Bibsonomy Cluster Computing The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhiquan Liu, Jianfeng Ma, Zhongyuan Jiang, Yinbin Miao LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment. Search on Bibsonomy TIIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yichuan Wang, Jianfeng Ma, Xiang Lu, Di Lu, Liumei Zhang Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Search on Bibsonomy IJGUC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ximeng Liu, Baodong Qin, Robert H. Deng, Rongxing Lu, Jianfeng Ma A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tao Jiang, Xiaofeng Chen 0001, Jianfeng Ma Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaofeng Chen 0001, Jin Li 0002, Jian Weng, Jianfeng Ma, Wenjing Lou Verifiable Computation over Large Database with Incremental Updates. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jiajia Liu, Zhihong Liu, Yong Zeng, Jianfeng Ma Cooperative Jammer Placement for Physical Layer Security Enhancement. Search on Bibsonomy IEEE Network The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qi Jiang 0001, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He A privacy preserving three-factor authentication protocol for e-Health clouds. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Limin Shen, Jianfeng Ma, Ximeng Liu, Meixia Miao A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks. Search on Bibsonomy J. Medical Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qi Jiang 0001, Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. Search on Bibsonomy J. Medical Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yinbin Miao, Jianfeng Ma, Ximeng Liu, Fushan Wei, Zhiquan Liu, Xu An Wang m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting. Search on Bibsonomy J. Medical Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zuobin Ying, Hui Li 0005, Jianfeng Ma, Junwei Zhang, Jiangtao Cui Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kai Zhang, Jianfeng Ma, Jiajia Liu, Hui Li 0005 Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jun Ye, Xiaofeng Chen 0001, Jianfeng Ma Improved algorithm for secure outsourcing of modular exponentiations with high checkability. Search on Bibsonomy IJAHUC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhiquan Liu, Jianfeng Ma, Zhongyuan Jiang, Hui Zhu, Yinbin Miao LSOT: A Lightweight Self-Organized Trust Model in VANETs. Search on Bibsonomy Mobile Information Systems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xinghua Li, Ermeng Wang, Weidong Yang, Jianfeng Ma DALP: A demand-aware location privacy protection scheme in continuous location-based services. Search on Bibsonomy Concurrency and Computation: Practice and Experience The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yinbin Miao, Jianfeng Ma, Zhiquan Liu Revocable and anonymous searchable encryption in multi-user setting. Search on Bibsonomy Concurrency and Computation: Practice and Experience The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Junwei Zhang, Fangqiong Du, Jianfeng Ma, Chao Yang Position based key exchange: defnitions and implementations. Search on Bibsonomy J. Comm. Inform. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cong Sun, Jianfeng Ma, Qingsong Yao On the architecture and development life cycle of secure cyber-physical systems. Search on Bibsonomy J. Comm. Inform. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shuai Fu, Jianfeng Ma, Hongtao Li, Qi Jiang 0001 A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pengbin Feng, Cong Sun, Jianfeng Ma Measuring the risk value of sensitive dataflow path in Android applications. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma A new method to deduce counterexamples in secure routing protocols based on strand space model. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yinbin Miao, Jiajia Liu, Jianfeng Ma Efficient keyword search over encrypted data in multi-cloud setting. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei 0001 Dynamic game model of botnet DDoS attack and defense. Search on Bibsonomy Security and Communication Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong, Danwei Chen Secure, efficient and revocable multi-authority access control system in cloud storage. Search on Bibsonomy Computers & Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hui Li 0005, Jiangtao Cui, Bingqing Shen, Jianfeng Ma An intelligent movie recommendation system through group-level sentiment analysis in microblogs. Search on Bibsonomy Neurocomputing The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fushan Wei, Jianfeng Ma, Qi Jiang 0001, Jian Shen, Chuangui Ma Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Search on Bibsonomy ITC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qi Jiang 0001, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xu An Wang, Fatos Xhafa, Weiyi Cai, Jianfeng Ma, Fushan Wei Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Search on Bibsonomy Computers & Electrical Engineering The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhihong Liu, Jiajia Liu, Nei Kato, Jianfeng Ma, Qiping Huang Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity. Search on Bibsonomy INFOCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qi Jiang 0001, Bingyan Li, Jianfeng Ma, Youliang Tian, Yuanyuan Yang Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing. Search on Bibsonomy ICCCS (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hui Li, Jiangtao Cui, Xiaobin Lin, Jianfeng Ma Improving the utility in differential private histogram publishing: Theoretical study and practice. Search on Bibsonomy BigData The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tao Jiang, Xiaofeng Chen 0001, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou Towards Efficient Fully Randomized Message-Locked Encryption. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control. Search on Bibsonomy SAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhihong Liu, Jiajia Liu, Nei Kato, Jianfeng Ma, Qiping Huang On cooperative jamming in wireless networks with eavesdroppers at arbitrary locations. Search on Bibsonomy ICC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Linbo Luo, Cheng Chai, Suiping Zhou, Jianfeng Ma Modeling Gap Seeking Behaviors for Agent-based Crowd Simulation. Search on Bibsonomy CASA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qi Jiang 0001, Bingyan Li, Jianfeng Ma On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems. Search on Bibsonomy BWCCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen 0001, Jianfeng Ma Location-Sensitive Data Sharing in Mobile Cloud Computing. Search on Bibsonomy BWCCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu Distributed Secure Service Composition with Declassification in Mobile Network. Search on Bibsonomy NaNA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen Secure service composition with information flow control in service clouds. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tao Jiang, Xiaofeng Chen 0001, Jin Li 0002, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu Towards secure and reliable cloud storage against data re-outsourcing. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaofeng Chen 0001, Xinyi Huang, Jin Li 0002, Jianfeng Ma, Wenjing Lou, Duncan S. Wong New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qi Jiang 0001, Jianfeng Ma, Xiang Lu, Youliang Tian An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Search on Bibsonomy Peer-to-Peer Networking and Applications The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen A full lifecycle privacy protection scheme for sensitive data in cloud computing. Search on Bibsonomy Peer-to-Peer Networking and Applications The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan LTPPM: a location and trajectory privacy protection mechanism in participatory sensing. Search on Bibsonomy Wireless Communications and Mobile Computing The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cong Gao, Jianfeng Ma, Shangwei Zhang A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment. Search on Bibsonomy IJDSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chao Yang, Jianfeng Ma, Jian Ren Provable Ownership of Encrypted Files in De-duplication Cloud Storage. Search on Bibsonomy Ad Hoc & Sensor Wireless Networks The full citation details ... 2015 DBLP  BibTeX  RDF
1Jiajia Liu, Nei Kato, Jianfeng Ma, Naoto Kadowaki Device-to-Device Communication in LTE-Advanced Networks: A Survey. Search on Bibsonomy IEEE Communications Surveys and Tutorials The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaofeng Chen 0001, Jin Li 0002, Xinyi Huang, Jianfeng Ma, Wenjing Lou New Publicly Verifiable Databases with Efficient Updates. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jianfeng Ma A two-stage DEA model considering shared inputs and free intermediate measures. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiajia Liu, Nei Kato, Jianfeng Ma, Toshikazu Sakano Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility. Search on Bibsonomy IEEE Trans. Wireless Communications The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tianwei Che, Jianfeng Ma, Na Li, Chao Wang A Security Quantitative Analysis Method For Access Control Based on Security Entropy. Search on Bibsonomy I. J. Network Security The full citation details ... 2015 DBLP  BibTeX  RDF
1Huanguo Zhang, Wenbao Han, Xuejia Lai, Dongdai Lin, Jianfeng Ma, Jianhua Li Survey on cyberspace security. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Junwei Zhang, Jianfeng Ma, Chao Yang, Li Yang Universally composable secure positioning in the bounded retrieval model. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hongtao Li, Jianfeng Ma, Shuai Fu A privacy-preserving data collection model for digital community. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cong Gao, Jianfeng Ma, Zhiquan Liu, XinDi Ma An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Youliang Tian, Changgen Peng, Dongdai Lin, Jianfeng Ma, Qi Jiang 0001, Wenjiang Ji Bayesian mechanism for rational secret sharing scheme. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Li Yang, Jianfeng Ma, Wenjing Lou, Qi Jiang 0001 A delegation based cross trusted domain direct anonymous attestation scheme. Search on Bibsonomy Computer Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fushan Wei, Jianfeng Ma, Chuangui Ma, Xinghua Li A two-factor authenticated key exchange protocol based on RSA with dynamic passwords. Search on Bibsonomy IJES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong Attribute Based Multisignature Scheme for Wireless Communications. Search on Bibsonomy Mobile Information Systems The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jianfeng Ma, Xianchen Ge, Nick H. Duong, Shuting Lei Numerical investigation of restricted contact cutting tool in machining of AISI 1045 steel. Search on Bibsonomy IJMR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xu An Wang, Jianfeng Ma, Xiaoyuan Yang 0002 A new proxy re-encryption scheme for protecting critical information systems. Search on Bibsonomy J. Ambient Intelligence and Humanized Computing The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu Large universe decentralized key-policy attribute-based encryption. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chao Yang, Jian Ren, Jianfeng Ma Provable ownership of files in deduplication cloud storage. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Junwei Zhang, Jianfeng Ma, Chao Yang Protocol Derivation System for the Needham-Schroeder family. Search on Bibsonomy Security and Communication Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 316 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license