The SCEAS System
Navigation Menu

Search the dblp DataBase


Di Ma: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang
    Experience with Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:308-316 [Conf]
  2. Jens Palsberg, Di Ma
    A Typed Interrupt Calculus. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 2002, pp:291-310 [Conf]
  3. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:79-91 [Conf]
  4. Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou
    Authenticating Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:376-388 [Conf]
  5. Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
    Dynamic Access Control for Multi-privileged Group Communications. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:508-519 [Conf]
  6. Yongdong Wu, Di Ma, Robert H. Deng
    Progressive protection of jpeg2000 codestreams. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:3447-3450 [Conf]
  7. Yongdong Wu, Di Ma, Changsheng Xu
    Efficient Object-Based Stream Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:354-367 [Conf]
  8. Di Ma
    Secure Feedback Service in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:116-128 [Conf]
  9. Di Ma
    Successful IP Business Models. [Citation Graph (0, 0)][DBLP]
    ISQED, 2006, pp:15-18 [Conf]
  10. Krishnendu Chatterjee, Di Ma, Rupak Majumdar, Tian Zhao, Thomas A. Henzinger, Jens Palsberg
    Stack Size Analysis for Interrupt-Driven Programs. [Citation Graph (0, 0)][DBLP]
    SAS, 2003, pp:109-126 [Conf]
  11. Di Ma, Gene Tsudik
    Extended Abstract: Forward-Secure Sequential Aggregate Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:86-91 [Conf]
  12. Krishnendu Chatterjee, Di Ma, Rupak Majumdar, Tian Zhao, Thomas A. Henzinger, Jens Palsberg
    Stack size analysis for interrupt-driven programs. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2004, v:194, n:2, pp:144-174 [Journal]
  13. Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu
    Scalable trusted online dissemination of JPEG2000 images. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:1, pp:60-67 [Journal]
  14. Di Ma
    A Physical and SPICE-Compatible Model for the MOS Depletion Device. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1985, v:4, n:3, pp:349-356 [Journal]

  15. Practical forward secure sequential aggregate signatures. [Citation Graph (, )][DBLP]

  16. A New Approach to Secure Logging. [Citation Graph (, )][DBLP]

  17. A Middleware Services Simulation Platform for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  18. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  19. DISH: Distributed Self-Healing. [Citation Graph (, )][DBLP]

  20. An application of host identity tags to DKIM for identifying signers. [Citation Graph (, )][DBLP]

  21. A survey of movement strategies for improving network coverage in wireless sensor networks. [Citation Graph (, )][DBLP]

Search in 0.066secs, Finished in 0.067secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002