2009 |
33 | EE | Junzhi Yan,
Jianfeng Ma,
Hongyue Liu:
Key hierarchies for hierarchical access control in secure group communications.
Computer Networks 53(3): 353-364 (2009) |
32 | EE | Fangwei Wang,
Yunkai Zhang,
Jianfeng Ma:
Modeling and analysis of a self-learning worm based on good point set scanning.
Wireless Communications and Mobile Computing 9(4): 573-586 (2009) |
2008 |
31 | EE | Changguang Wang,
Xu Bai,
Shuai Fu,
Jianfeng Ma:
Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents.
CSSE (3) 2008: 546-549 |
30 | EE | Yiling Wen,
Jianfeng Ma:
An Aggregate Signature Scheme with Constant Pairing Operations.
CSSE (3) 2008: 830-833 |
29 | EE | Zhihong Liu,
Jianfeng Ma,
Qiping Huang,
Sang-Jae Moon:
A pairwise key establishment scheme for heterogeneous sensor networks.
HeterSanet 2008: 53-60 |
28 | EE | Wei Wang,
Jianfeng Ma,
Sang-Jae Moon:
CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks.
ICC 2008: 1551-1555 |
27 | EE | FengHua Li,
Wei Wang,
Jianfeng Ma,
Zhenguo Ding:
Enhanced Architecture of TPM.
ICYCS 2008: 1532-1537 |
26 | EE | Zhihong Liu,
Jianfeng Ma,
Qiping Huang,
Sang-Jae Moon:
Keying material based key pre-distribution scheme.
ISI 2008: 218-221 |
25 | | Zhihong Liu,
Jianfeng Ma,
Qiping Huang,
Sang-Jae Moon:
Keying Material Based Key Pre-distribution Scheme for Sensor Networks.
Ad Hoc & Sensor Wireless Networks 6(1-2): 67-89 (2008) |
24 | EE | Yejun Zhou,
Hui Li,
Jianfeng Ma:
Secure Network Coding Against the Contamination and Eavesdropping Adversaries
CoRR abs/0805.2286: (2008) |
23 | EE | Tao Feng,
FengHua Li,
Jianfeng Ma,
Sang-Jae Moon:
A new approach for UC security concurrent deniable authentication.
Science in China Series F: Information Sciences 51(4): 352-367 (2008) |
2007 |
22 | EE | Xinghua Li,
Jianfeng Ma,
Sang-Jae Moon:
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
NPC 2007: 306-314 |
21 | EE | Jianfeng Ma,
Prakash Krishnaswami,
X. J. Xin:
A truly meshless pre- and post-processor for meshless analysis methods.
Advances in Engineering Software 38(1): 9-30 (2007) |
20 | EE | Fan Zhang,
Jianfeng Ma,
Sang-Jae Moon:
Universally composable anonymous Hash certification model.
Science in China Series F: Information Sciences 50(3): 440-455 (2007) |
2006 |
19 | EE | Xinghua Li,
Sang-Jae Moon,
Jianfeng Ma:
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
ACNS 2006: 340-348 |
18 | EE | Wei Wang,
Jianfeng Ma,
Sang-Jae Moon:
Ternary Tree Based Group Key Management in Dynamic Peer Networks.
CIS 2006: 513-522 |
17 | EE | Qingqi Pei,
Kefeng Fan,
Jinxiu Dai,
Jianfeng Ma:
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
CIS 2006: 750-757 |
16 | EE | Liang-min Wang,
Jianfeng Ma,
Chao Wang,
A. C. Kot:
Fault and intrusion tolerance of wireless sensor networks.
IPDPS 2006 |
15 | EE | JoongHyo Oh,
Sang-Jae Moon,
Jianfeng Ma:
An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment.
IEICE Transactions 89-A(3): 826-829 (2006) |
2005 |
14 | | Yue Hao,
Jiming Liu,
Yuping Wang,
Yiu-ming Cheung,
Hujun Yin,
Licheng Jiao,
Jianfeng Ma,
Yong-Chang Jiao:
Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I
Springer 2005 |
13 | | Yue Hao,
Jiming Liu,
Yuping Wang,
Yiu-ming Cheung,
Hujun Yin,
Licheng Jiao,
Jianfeng Ma,
Yong-Chang Jiao:
Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II
Springer 2005 |
12 | EE | Yong Zeng,
Jianfeng Ma:
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.
CIS (2) 2005: 228-235 |
11 | EE | Xinghua Li,
Jianfeng Ma,
Sang-Jae Moon:
On the Security of the Canetti-Krawczyk Model.
CIS (2) 2005: 356-363 |
10 | EE | Yunkai Zhang,
Fangwei Wang,
Changguang Wang,
Jianfeng Ma:
Worm Propagation Modeling and Analysis on Network.
CIS (2) 2005: 476-481 |
9 | EE | Fan Zhang,
Jianfeng Ma,
Sang-Jae Moon:
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.
CIS (2) 2005: 488-493 |
8 | EE | Yuanbo Guo,
Jianfeng Ma:
A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
HICSS 2005 |
7 | EE | Chao Wang,
Jianfeng Ma,
Jianming Zhu:
Design and Implementation of Survivable Network Systems.
ICIC (2) 2005: 376-385 |
6 | EE | Fan Zhang,
Jianfeng Ma:
Security Analysis on Chinese Wireless LAN Standard and Its Solution.
ICPP Workshops 2005: 436-443 |
5 | EE | Yuanbo Guo,
Jianfeng Ma,
Yadi Wang:
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
International Conference on Computational Science (3) 2005: 229-236 |
4 | EE | Wei Wang,
Jianfeng Ma,
Sang-Jae Moon:
Efficient Group Key Management for Dynamic Peer Networks.
MSN 2005: 753-762 |
2004 |
3 | EE | Chao Wang,
Jianfeng Ma:
Availability Analysis and Comparison of Different Intrusion-Tolerant Systems.
AWCC 2004: 161-166 |
2 | EE | Yuanbo Guo,
Jianfeng Ma:
Practical Secret Sharing Scheme Realizing Generalized Adversary Structure.
J. Comput. Sci. Technol. 19(4): 564-569 (2004) |
1 | EE | Yuanbo Guo,
Jianfeng Ma:
An intrusion-tolerant authorization and authentication scheme in distributed environments.
Operating Systems Review 38(4): 45-51 (2004) |