dblp.uni-trier.dewww.uni-trier.de

Jianfeng Ma Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
42EEHongbin Zhang, Jianfeng Ma, Yinchuan Wang, Qingqi Pei: An Active Defense Model and Framework of Insider Threats Detection and Sense. IAS 2009: 258-261
41EEXiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang: An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. IAS 2009: 287-290
40EELiqiang Mao, Jianfeng Ma, Xuewen Dong: Towards Provably Secure On-demand Source Routing in MANET. IAS 2009: 299-302
39EEYulong Shen, Qijian Xu, Zuoshun Wu, Hao Yin, Jianfeng Ma: A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. IAS 2009: 423-426
38EEFengHua Li, Wei Wang, Jianfeng Ma, Haoxin Su: Action-Based Access Control for Web Services. IAS 2009: 637-642
37EEYejun Zhou, Hui Li, Jianfeng Ma: Secure Error-Correction Network Coding in a Randomized Setting. ISA 2009: 570-577
36EEJunzhi Yan, Jianfeng Ma, Hongyue Liu: Key hierarchies for hierarchical access control in secure group communications. Computer Networks 53(3): 353-364 (2009)
35EEAyong Ye, Jianfeng Ma, Xiaohong Jiang, Susumu Horiguchi: Robust Node Positioning in Wireless Sensor Networks. IEICE Transactions 92-B(6): 2023-2031 (2009)
34EEFangwei Wang, Yunkai Zhang, Jianfeng Ma: Modeling and analysis of a self-learning worm based on good point set scanning. Wireless Communications and Mobile Computing 9(4): 573-586 (2009)
2008
33EEChangguang Wang, Xu Bai, Shuai Fu, Jianfeng Ma: Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents. CSSE (3) 2008: 546-549
32EEYiling Wen, Jianfeng Ma: An Aggregate Signature Scheme with Constant Pairing Operations. CSSE (3) 2008: 830-833
31EEYaHui Li, Ding Yong, Jianfeng Ma: Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks. EUC (2) 2008: 10-15
30EEZhuo Ma, Jianfeng Ma, Yulong Shen: Provably Secure Trusted Access Protocol for WLAN Mesh Networks. EUC (2) 2008: 43-48
29EEZhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon: A pairwise key establishment scheme for heterogeneous sensor networks. HeterSanet 2008: 53-60
28EEWei Wang, Jianfeng Ma, Sang-Jae Moon: CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks. ICC 2008: 1551-1555
27EEFengHua Li, Wei Wang, Jianfeng Ma, Zhenguo Ding: Enhanced Architecture of TPM. ICYCS 2008: 1532-1537
26EEZhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon: Keying material based key pre-distribution scheme. ISI 2008: 218-221
25 Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon: Keying Material Based Key Pre-distribution Scheme for Sensor Networks. Ad Hoc & Sensor Wireless Networks 6(1-2): 67-89 (2008)
24EEYejun Zhou, Hui Li, Jianfeng Ma: Secure Network Coding Against the Contamination and Eavesdropping Adversaries CoRR abs/0805.2286: (2008)
23EETao Feng, FengHua Li, Jianfeng Ma, Sang-Jae Moon: A new approach for UC security concurrent deniable authentication. Science in China Series F: Information Sciences 51(4): 352-367 (2008)
2007
22EEXinghua Li, Jianfeng Ma, Sang-Jae Moon: Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. NPC 2007: 306-314
21EEJianfeng Ma, Prakash Krishnaswami, X. J. Xin: A truly meshless pre- and post-processor for meshless analysis methods. Advances in Engineering Software 38(1): 9-30 (2007)
20EEFan Zhang, Jianfeng Ma, Sang-Jae Moon: Universally composable anonymous Hash certification model. Science in China Series F: Information Sciences 50(3): 440-455 (2007)
2006
19EEXinghua Li, Sang-Jae Moon, Jianfeng Ma: On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. ACNS 2006: 340-348
18EEWei Wang, Jianfeng Ma, Sang-Jae Moon: Ternary Tree Based Group Key Management in Dynamic Peer Networks. CIS 2006: 513-522
17EEQingqi Pei, Kefeng Fan, Jinxiu Dai, Jianfeng Ma: An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices. CIS 2006: 750-757
16EELiang-min Wang, Jianfeng Ma, Chao Wang, A. C. Kot: Fault and intrusion tolerance of wireless sensor networks. IPDPS 2006
15EEJoongHyo Oh, Sang-Jae Moon, Jianfeng Ma: An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment. IEICE Transactions 89-A(3): 826-829 (2006)
2005
14 Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I Springer 2005
13 Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II Springer 2005
12EEYong Zeng, Jianfeng Ma: Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. CIS (2) 2005: 228-235
11EEXinghua Li, Jianfeng Ma, Sang-Jae Moon: On the Security of the Canetti-Krawczyk Model. CIS (2) 2005: 356-363
10EEYunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma: Worm Propagation Modeling and Analysis on Network. CIS (2) 2005: 476-481
9EEFan Zhang, Jianfeng Ma, Sang-Jae Moon: The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. CIS (2) 2005: 488-493
8EEYuanbo Guo, Jianfeng Ma: A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. HICSS 2005
7EEChao Wang, Jianfeng Ma, Jianming Zhu: Design and Implementation of Survivable Network Systems. ICIC (2) 2005: 376-385
6EEFan Zhang, Jianfeng Ma: Security Analysis on Chinese Wireless LAN Standard and Its Solution. ICPP Workshops 2005: 436-443
5EEYuanbo Guo, Jianfeng Ma, Yadi Wang: An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. International Conference on Computational Science (3) 2005: 229-236
4EEWei Wang, Jianfeng Ma, Sang-Jae Moon: Efficient Group Key Management for Dynamic Peer Networks. MSN 2005: 753-762
2004
3EEChao Wang, Jianfeng Ma: Availability Analysis and Comparison of Different Intrusion-Tolerant Systems. AWCC 2004: 161-166
2EEYuanbo Guo, Jianfeng Ma: Practical Secret Sharing Scheme Realizing Generalized Adversary Structure. J. Comput. Sci. Technol. 19(4): 564-569 (2004)
1EEYuanbo Guo, Jianfeng Ma: An intrusion-tolerant authorization and authentication scheme in distributed environments. Operating Systems Review 38(4): 45-51 (2004)

Coauthor Index

1Xu Bai [33]
2Yiu-ming Cheung [13] [14]
3Jinxiu Dai [17]
4Zhenguo Ding [27]
5Xuewen Dong [40]
6Kefeng Fan [17]
7Tao Feng [23]
8Shuai Fu [33]
9Yuanbo Guo [1] [2] [5] [8]
10Yue Hao [13] [14]
11Susumu Horiguchi [35]
12Qiping Huang [25] [26] [29]
13Xiaohong Jiang [35]
14Licheng Jiao [13] [14]
15Yong-Chang Jiao [13] [14]
16A. C. Kot [16]
17Prakash Krishnaswami [21]
18FengHua Li [23] [27] [38]
19Hui Li [24] [37] [41]
20Xiaoqing Li [41]
21Xinghua Li [11] [19] [22]
22YaHui Li [31]
23Hongyue Liu [36]
24Jiming Liu [13] [14]
25Zhihong Liu [25] [26] [29]
26Zhuo Ma [30]
27Liqiang Mao [40]
28Sang-Jae Moon [4] [9] [11] [15] [18] [19] [20] [22] [23] [25] [26] [28] [29]
29JoongHyo Oh [15]
30Qingqi Pei [17] [42]
31Yulong Shen [30] [39]
32Haoxin Su [38]
33Changguang Wang [10] [33]
34Chao Wang [3] [7] [16]
35Fangwei Wang [10] [34]
36Liang-min Wang [16]
37Wei Wang [4] [18] [27] [28] [38]
38Yadi Wang [5]
39Yinchuan Wang [42]
40Yuping Wang [13] [14]
41Yiling Wen [32]
42Zuoshun Wu [39]
43X. J. Xin [21]
44Qijian Xu [39]
45Junzhi Yan [36]
46Ayong Ye [35]
47Hao Yin [39]
48Hujun Yin [13] [14]
49Ding Yong [31]
50Yong Zeng [12]
51Fan Zhang [6] [9] [20]
52Hongbin Zhang [42]
53Weidong Zhang [41]
54Yunkai Zhang [10] [34]
55Yejun Zhou [24] [37]
56Jianming Zhu [7]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)