Showing 1 - 20 results of 29 for search 'Jian-feng MA', query time: 0.02s
Refine Results
-
1
Silicon transport and its “homeostasis” in rice by Sheng Huang, Jian Feng Ma
Published 2024-01-01Get full text
Article -
2
Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA
Published 2012-04-01Get full text
Article -
3
Protocol to enhance the security of Early data in TLS 1.3 by Xing-long ZHANG, Qing-feng CHENG, Jian-feng MA
Published 2017-12-01Get full text
Article -
4
Approach on runtime monitoring based on the embedded trusted platforms by Zhao-chang SUN, Jian-feng MA, Cong SUN, Di LU
Published 2017-10-01Get full text
Article -
5
Anonymous aggregator election protocol for wireless sensor networks by Shuai FU, Jian-feng MA, Hong-tao LI, GQi JIAN
Published 2015-02-01Get full text
Article -
6
Towards cooperation location privacy-preserving group nearest neighbor queries in LBS by Sheng GAO, Jian-feng MA, Qing-song YAO, Cong SUN
Published 2015-03-01Get full text
Article -
7
Anonymous aggregator election protocol for wireless sensor networks by Shuai FU, Jian-feng MA, Hong-tao LI, GQi JIAN
Published 2015-02-01Get full text
Article -
8
Composable information flow verification for service chain based on model checking by Ning XI, Jian-feng MA, Cong SUN, Di LU, Tao ZHANG
Published 2014-11-01Get full text
Article -
9
New remote authorization protocol for vehicle diagnosis by Zheng-da JIAO, Jian-feng MA, Cong SUN, Qing-song YAO
Published 2014-11-01Get full text
Article -
10
ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model by Xue-wen DONG, Chao YANG, Li-jie SHENG, Jian-feng MA
Published 2014-11-01Get full text
Article -
11
Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Published 2013-08-01Get full text
Article -
12
Multilevel access control for video database by Jin-bo XIONG, Zhi-qiang YAO, Jian-feng MA, Qi LI
Published 2012-08-01Get full text
Article -
13
Adaptively secure key-policy ABE scheme with fast decryption by Qi LI, Jian-feng MA, Jin-bo XIONG, Xi-meng LIU
Published 2014-11-01Get full text
Article -
14
Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Published 2013-08-01Get full text
Article -
15
ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model by Xue-wen DONG, Chao YANG, Li-jie SHENG, Jian-feng MA
Published 2014-11-01Get full text
Article -
16
Game theoretical routing protocol with fairness problem in wireless mesh networks by Wen-jiang JI, Jian-feng MA, You-liang TIAN, Zhuo MA
Published 2012-11-01Get full text
Article -
17
Routing metric based on interference measurement for multi-radio multi-channel wireless mesh networks by Wen-jiang JI, Jian-feng MA, Jun-wei ZHANG, Zhuo MA
Published 2013-04-01Get full text
Article -
18
Multi-authority attribute-based encryption with efficient revocation by Kai ZHANG, Jian-feng MA, Hui LI, Jun-wei ZHANG, Tao ZHANG
Published 2017-03-01Get full text
Article -
19
-
20
HPEngine: high performance XACML policy evaluation engine based on statistical analysis by De-hua NIU, Jian-feng MA, Zhuo MA, Chen-nan LI, Lei WANG
Published 2014-08-01Get full text
Article