Showing 1 - 20 results of 29 for search 'MA Jian', query time: 0.04s
Refine Results
-
1
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks by GUO Jiang-hong, MA Jian-feng
Published 2011-01-01Get full text
Article -
2
Provable secure trusted protocol for network storage by DUAN Xin-dong, MA Jian-feng
Published 2011-01-01Get full text
Article -
3
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks by GUO Jiang-hong, MA Jian-feng
Published 2011-01-01Get full text
Article -
4
Location based reliability differentiation service for WSN by ZENG Yong1, MA Jian-feng1
Published 2008-01-01Get full text
Article -
5
New approach against Sybil attack in wireless sensor networks by FENG Tao1, MA Jian-feng2
Published 2008-01-01Get full text
Article -
6
Trusted routing based on D-S evidence theory in wireless mesh network by YANG Kai, MA Jian-feng, YANG Chao
Published 2011-01-01Get full text
Article -
7
UC secure one-time signature based broadcast authentication by ZHANG Jun-wei, MA Jian-feng, YANG Li
Published 2010-01-01Get full text
Article -
8
UC secure one-time signature based broadcast authentication by ZHANG Jun-wei, MA Jian-feng, YANG Li
Published 2010-01-01Get full text
Article -
9
P2PMP2: A Peer-to-Peer Leveraged Mobile Streaming System Based on Push and Pull by Niu Jianwei, Tang Yunqi, Ma Jian, Zhou Bing
Published 2009-01-01Get full text
Article -
10
Problems of power signal feature modeling for complex fluctuating load by WANG Xuewei, WU Di, YUAN Ruiming, MA Jian, LI Wenwen
Published 2025-02-01Get full text
Article -
11
Selection scheme of mobile sinks in wireless sensor networks by CHENG Long 1, CHEN Can-feng 2, MA Jian 2
Published 2008-01-01Get full text
Article -
12
Provably secure partially blind signature without trusted PKG by FENG Tao1, PENG Wei1, MA Jian-feng3
Published 2010-01-01Get full text
Article -
13
Universally composable oblivious transfer protocol based on VSPH by LI Feng-hua1, FENG Tao1, MA Jian-feng1
Published 2007-01-01Get full text
Article -
14
Effects of batch and fed-batch cultures on biomass and exopolysaccharide production of Lachnum calyculiforme by YE Ming, CHEN Wu-xi, PENG Wei, MA Jian, YANG Liu
Published 2010-11-01Get full text
Article -
15
Survey of wireless sensor network security techniques by PEI Qing-qi1, SHEN Yu-long1, MA Jian-feng1
Published 2007-01-01Get full text
Article -
16
Consistency of group key exchange protocols by CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2
Published 2008-01-01Get full text
Article -
17
A TWO-DIMENSION TIME-DOMAIN-THRESHOLD METHOD FOR LOAD SPECTRA EDITING AND ITS APPLICATION by YU JiaWei, MA JianJun, ZHENG SongLin, QIAN ChunLei
Published 2022-01-01Get full text
Article -
18
Consistency of group key exchange protocols by CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2
Published 2008-01-01Get full text
Article -
19
Analysis of provably secure on-demand source routing in MANET by MAO Li-qiang1, MA Jian-feng1, LI Xing-hua1
Published 2009-01-01Get full text
Article -
20
LIGHTWEIGHT DESIGN OF STEERING KNUCKLE BASED ON COMPREHENSIVE SENSITIVITY by MA Jian, YE NanHai, WU Rong, DENG Xin, HE Yun, WANG Li
Published 2018-01-01Get full text
Article