The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jianfeng Ma: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xinghua Li, Sang-Jae Moon, Jianfeng Ma
    On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:340-348 [Conf]
  2. Chao Wang, Jianfeng Ma
    Availability Analysis and Comparison of Different Intrusion-Tolerant Systems. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:161-166 [Conf]
  3. Xinghua Li, Jianfeng Ma, Sang-Jae Moon
    On the Security of the Canetti-Krawczyk Model. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:356-363 [Conf]
  4. Yong Zeng, Jianfeng Ma
    Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:228-235 [Conf]
  5. Fan Zhang, Jianfeng Ma, Sang-Jae Moon
    The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:488-493 [Conf]
  6. Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma
    Worm Propagation Modeling and Analysis on Network. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:476-481 [Conf]
  7. Yuanbo Guo, Jianfeng Ma
    A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  8. Yuanbo Guo, Jianfeng Ma, Yadi Wang
    An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2005, pp:229-236 [Conf]
  9. Chao Wang, Jianfeng Ma, Jianming Zhu
    Design and Implementation of Survivable Network Systems. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:376-385 [Conf]
  10. Fan Zhang, Jianfeng Ma
    Security Analysis on Chinese Wireless LAN Standard and Its Solution. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2005, pp:436-443 [Conf]
  11. Liang-Min Wang, Jianfeng Ma, Chao Wang, A. C. Kot
    Fault and intrusion tolerance of wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  12. Wei Wang, Jianfeng Ma, Sang-Jae Moon
    Efficient Group Key Management for Dynamic Peer Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:753-762 [Conf]
  13. Yuanbo Guo, Jianfeng Ma
    Practical Secret Sharing Scheme Realizing Generalized Adversary Structure. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2004, v:19, n:4, pp:564-569 [Journal]
  14. Yuanbo Guo, Jianfeng Ma
    An intrusion-tolerant authorization and authentication scheme in distributed environments. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:45-51 [Journal]
  15. Qingqi Pei, Kefeng Fan, Jinxiu Dai, Jianfeng Ma
    An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:750-757 [Conf]
  16. Wei Wang, Jianfeng Ma, Sang-Jae Moon
    Ternary Tree Based Group Key Management in Dynamic Peer Networks. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:513-522 [Conf]
  17. Xinghua Li, Jianfeng Ma, Sang-Jae Moon
    Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. [Citation Graph (0, 0)][DBLP]
    NPC, 2007, pp:306-314 [Conf]

  18. Research on the Resilience of Key Management in Sensor Networks. [Citation Graph (, )][DBLP]


  19. Towards Provably Secure On-Demand Distance Vector Routing in MANET. [Citation Graph (, )][DBLP]


  20. A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement. [Citation Graph (, )][DBLP]


  21. ECC-Based Threshold Digital Signature Scheme without a Trusted Party. [Citation Graph (, )][DBLP]


  22. Predators Combat Good Point Set Scanning-Based Self-Learning Worms. [Citation Graph (, )][DBLP]


  23. A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP]


  24. A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management. [Citation Graph (, )][DBLP]


  25. A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  26. Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  27. Provably Secure Trusted Access Protocol for WLAN Mesh Networks. [Citation Graph (, )][DBLP]


  28. CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks. [Citation Graph (, )][DBLP]


  29. The Development Mode of Trust E-commerce Services. [Citation Graph (, )][DBLP]


  30. Keying material based key pre-distribution scheme. [Citation Graph (, )][DBLP]


  31. Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation. [Citation Graph (, )][DBLP]


  32. A pairwise key establishment scheme for heterogeneous sensor networks. [Citation Graph (, )][DBLP]


  33. A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  34. Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  35. Cell Biocompatibility of Porous Nano-Hydroxyapatite/Polyamide66 Composite Scaffolds for Bone Tissue Engineering. [Citation Graph (, )][DBLP]


  36. A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP]


  37. Action-Based Access Control for Web Services. [Citation Graph (, )][DBLP]


  38. Towards Provably Secure On-demand Source Routing in MANET. [Citation Graph (, )][DBLP]


  39. An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  40. An Active Defense Model and Framework of Insider Threats Detection and Sense. [Citation Graph (, )][DBLP]


  41. An Aggregate Signature Scheme with Constant Pairing Operations. [Citation Graph (, )][DBLP]


  42. Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents. [Citation Graph (, )][DBLP]


  43. Enhanced Architecture of TPM. [Citation Graph (, )][DBLP]


  44. Secure Error-Correction Network Coding in a Randomized Setting. [Citation Graph (, )][DBLP]


  45. A Secure and Efficient Group Key Agreement for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  46. A novel data communication approach in wireless sensor networks. [Citation Graph (, )][DBLP]


  47. A Digital Rights Management scheme based on rational share content. [Citation Graph (, )][DBLP]


  48. Key hierarchies for hierarchical access control in secure group communications. [Citation Graph (, )][DBLP]


  49. Defending passive worms in unstructured P2P networks based on healthy file dissemination. [Citation Graph (, )][DBLP]


  50. Stability analysis of a SEIQV epidemic model for rapid spreading worms. [Citation Graph (, )][DBLP]


  51. Secure Network Coding Against the Contamination and Eavesdropping Adversaries [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002