dblp.uni-trier.dewww.uni-trier.de

Jianfeng Ma

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
33EEJunzhi Yan, Jianfeng Ma, Hongyue Liu: Key hierarchies for hierarchical access control in secure group communications. Computer Networks 53(3): 353-364 (2009)
32EEFangwei Wang, Yunkai Zhang, Jianfeng Ma: Modeling and analysis of a self-learning worm based on good point set scanning. Wireless Communications and Mobile Computing 9(4): 573-586 (2009)
2008
31EEChangguang Wang, Xu Bai, Shuai Fu, Jianfeng Ma: Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents. CSSE (3) 2008: 546-549
30EEYiling Wen, Jianfeng Ma: An Aggregate Signature Scheme with Constant Pairing Operations. CSSE (3) 2008: 830-833
29EEZhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon: A pairwise key establishment scheme for heterogeneous sensor networks. HeterSanet 2008: 53-60
28EEWei Wang, Jianfeng Ma, Sang-Jae Moon: CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks. ICC 2008: 1551-1555
27EEFengHua Li, Wei Wang, Jianfeng Ma, Zhenguo Ding: Enhanced Architecture of TPM. ICYCS 2008: 1532-1537
26EEZhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon: Keying material based key pre-distribution scheme. ISI 2008: 218-221
25 Zhihong Liu, Jianfeng Ma, Qiping Huang, Sang-Jae Moon: Keying Material Based Key Pre-distribution Scheme for Sensor Networks. Ad Hoc & Sensor Wireless Networks 6(1-2): 67-89 (2008)
24EEYejun Zhou, Hui Li, Jianfeng Ma: Secure Network Coding Against the Contamination and Eavesdropping Adversaries CoRR abs/0805.2286: (2008)
23EETao Feng, FengHua Li, Jianfeng Ma, Sang-Jae Moon: A new approach for UC security concurrent deniable authentication. Science in China Series F: Information Sciences 51(4): 352-367 (2008)
2007
22EEXinghua Li, Jianfeng Ma, Sang-Jae Moon: Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. NPC 2007: 306-314
21EEJianfeng Ma, Prakash Krishnaswami, X. J. Xin: A truly meshless pre- and post-processor for meshless analysis methods. Advances in Engineering Software 38(1): 9-30 (2007)
20EEFan Zhang, Jianfeng Ma, Sang-Jae Moon: Universally composable anonymous Hash certification model. Science in China Series F: Information Sciences 50(3): 440-455 (2007)
2006
19EEXinghua Li, Sang-Jae Moon, Jianfeng Ma: On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. ACNS 2006: 340-348
18EEWei Wang, Jianfeng Ma, Sang-Jae Moon: Ternary Tree Based Group Key Management in Dynamic Peer Networks. CIS 2006: 513-522
17EEQingqi Pei, Kefeng Fan, Jinxiu Dai, Jianfeng Ma: An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices. CIS 2006: 750-757
16EELiang-min Wang, Jianfeng Ma, Chao Wang, A. C. Kot: Fault and intrusion tolerance of wireless sensor networks. IPDPS 2006
15EEJoongHyo Oh, Sang-Jae Moon, Jianfeng Ma: An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment. IEICE Transactions 89-A(3): 826-829 (2006)
2005
14 Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I Springer 2005
13 Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II Springer 2005
12EEYong Zeng, Jianfeng Ma: Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. CIS (2) 2005: 228-235
11EEXinghua Li, Jianfeng Ma, Sang-Jae Moon: On the Security of the Canetti-Krawczyk Model. CIS (2) 2005: 356-363
10EEYunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma: Worm Propagation Modeling and Analysis on Network. CIS (2) 2005: 476-481
9EEFan Zhang, Jianfeng Ma, Sang-Jae Moon: The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. CIS (2) 2005: 488-493
8EEYuanbo Guo, Jianfeng Ma: A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. HICSS 2005
7EEChao Wang, Jianfeng Ma, Jianming Zhu: Design and Implementation of Survivable Network Systems. ICIC (2) 2005: 376-385
6EEFan Zhang, Jianfeng Ma: Security Analysis on Chinese Wireless LAN Standard and Its Solution. ICPP Workshops 2005: 436-443
5EEYuanbo Guo, Jianfeng Ma, Yadi Wang: An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. International Conference on Computational Science (3) 2005: 229-236
4EEWei Wang, Jianfeng Ma, Sang-Jae Moon: Efficient Group Key Management for Dynamic Peer Networks. MSN 2005: 753-762
2004
3EEChao Wang, Jianfeng Ma: Availability Analysis and Comparison of Different Intrusion-Tolerant Systems. AWCC 2004: 161-166
2EEYuanbo Guo, Jianfeng Ma: Practical Secret Sharing Scheme Realizing Generalized Adversary Structure. J. Comput. Sci. Technol. 19(4): 564-569 (2004)
1EEYuanbo Guo, Jianfeng Ma: An intrusion-tolerant authorization and authentication scheme in distributed environments. Operating Systems Review 38(4): 45-51 (2004)

Coauthor Index

1Xu Bai [31]
2Yiu-ming Cheung [13] [14]
3Jinxiu Dai [17]
4Zhenguo Ding [27]
5Kefeng Fan [17]
6Tao Feng [23]
7Shuai Fu [31]
8Yuanbo Guo [1] [2] [5] [8]
9Yue Hao [13] [14]
10Qiping Huang [25] [26] [29]
11Licheng Jiao [13] [14]
12Yong-Chang Jiao [13] [14]
13A. C. Kot [16]
14Prakash Krishnaswami [21]
15FengHua Li [23] [27]
16Hui Li [24]
17Xinghua Li [11] [19] [22]
18Hongyue Liu [33]
19Jiming Liu [13] [14]
20Zhihong Liu [25] [26] [29]
21Sang-Jae Moon [4] [9] [11] [15] [18] [19] [20] [22] [23] [25] [26] [28] [29]
22JoongHyo Oh [15]
23Qingqi Pei [17]
24Changguang Wang [10] [31]
25Chao Wang [3] [7] [16]
26Fangwei Wang [10] [32]
27Liang-min Wang [16]
28Wei Wang [4] [18] [27] [28]
29Yadi Wang [5]
30Yuping Wang [13] [14]
31Yiling Wen [30]
32X. J. Xin [21]
33Junzhi Yan [33]
34Hujun Yin [13] [14]
35Yong Zeng [12]
36Fan Zhang [6] [9] [20]
37Yunkai Zhang [10] [32]
38Yejun Zhou [24]
39Jianming Zhu [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)