学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 马建峰的留言板
学术论文

发表学术论文400多篇,参见dblp: Jianfeng Ma http://dblp.uni-trier.de/pers/m/Ma:Jianfeng List of computer science publications by Jianfeng Ma。出版著作出版著作6部;获技术发明专利70件,其中美国技术发明专利1件、国际PCT专利6件;制定国际ITU标准4项、中国电子行业标准2项。以第一完成人获国家技术发明二等奖1项、省部级科技成果一等奖5项。

 

一、主要科研获奖

1、异构多域无线网络协同安全关键技术及应用,国家技术发明奖二等奖,排名第一,2013

提出了异构多域无线网络协同安全体系架构,发明了自适应安全接入方法、基于多方安全计算的协同安全管理方法、跨域端到端安全关联建立方法,实现了跨域信息的安全共享,解决了异构无线网络互联的安全管理与控制问题。

 

2、秦盾云加密数据库系统,全国科技工作者创新创业大赛金奖、最佳商业投资价值奖,中国科学技术协会,排名第一,2016年

面向云数据的安全保护,利用结构化密码技术研制了一款加密数据库系统,可实现数据的密文查询、更新与完整性保护等功能,对于云数据的安全存储具有重要意义。

 

3、基于可信计算的无线局域网安全管理技术及方法,教育部高等学校科学研究优秀成果奖一等奖,排名第一,2013

提出了用户可控的可信平台模块体系结构,设计了支持多算法并行、随机交叉加解密方法,解决了多密码算法/多密钥/多数据流随机交叉加解密问题,可高效支持多用户海量数据细粒度加密、多级安全保护和高并发数据处理。

 

4、异构无线网络安全技术及应用,陕西省科学技术奖一等奖,排名一,2009

建立了可扩展的无线网络集成安全接入体系结构,设计了跨网络域的安全关联建立方法;基于先验知识,简化了认证过程,实现了实体高效的身份认证与安全漫游切换,解决了无线网络融合环境下用户跨域资源访问的安全问题。

 

5、泛在网信息汇聚及安全保护关键技术,中国电子学会科学技术成果奖一等奖,排名第一,2014

提出了泛在网络数据汇聚框架及可信服务提供参考模型,发明了泛在网络信息流安全监控方法和可信服务提供方法,研发了兼容多种安全技术体制的多模安全交换机系统,解决了分布式数据汇聚及服务提供面临的信息安全问题。

 

6、新一代宽带无线通信网络安全接入技术,中国电子学会科学技术成果奖一等奖,排名第一,2008

提出了可形式化验证的无线网络接入认证协议和移动终端快速安全切换方法,设计了终端和接入点间的密钥协商和双向身份认证方法,提出了保证前向/后向保密性的群组密钥管理方法,解决了多模安全接入以及伪基站等问题。

 

7、数字家庭无线网络安全技术,教育部高等学校科学研究优秀成果奖二等奖,排名第一,2008

针对无线数字家庭网络的安全需求,提出了基于生物特征的接口内容保护框架和多域安全管理模型,实现了数字内容的安全分发、访问与共享。提出了数字内容服务提供模型,确保无线网络环境中数字内容服务的安全高效提供。

 

二、2011年以来的部分文章

1.         熊金波 姚志强 马建峰 李凤华 刘西蒙 李琦 .基于属性加密的组合文档安全自毁方案. 电子学报,2014,  (02) :366-377

2.         姚志强 熊金波 马建峰 李琦 刘西蒙 .云计算中一种安全的电子文档自毁方案. 计算机研究与发展,2014, (07) :1417-1424

3.         马卓 张俊伟 马建峰 姬文江 .可证明安全的无双线性对无证书可信接入认证协议. 计算机研究与发展,2014, (02) :325-334

4.         赵婧 张渊 李兴华 马建峰 .基于轨迹频率抑制的轨迹隐私保护方法. 计算机学报,2014,(10) 

5.         熊金波 姚志强 马建峰 李凤华 刘西蒙 .面向网络内容隐私的基于身份加密的安全自毁方案. 计算机学报,2014, (01) :139-151

6.         马骏 郭渊博 马建峰 刘西蒙 李琦 .物联网感知层基于资源分层的多用户访问控制方案. 电子学报,2014,  (01) :28-36

7.         张俊伟 马卓 马建峰 姬文江 .基于位置密钥交换的UC安全模型. 计算机研究与发展,2014,(02) :353-360

8.         李琦 马建峰 熊金波 刘西蒙 马骏 .一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案. 电子学报,2014,(04)

9.         林晖 马建峰 许力 .MWNs中基于跨层动态信誉机制的安全路由协议. 计算机研究与发展,2014, (07) :1486-1497

10.     Yinbin Miao, Jianfeng Ma, Zhiquan Liu: Revocable and anonymous searchable encryption in multi-user setting. Concurrency and Computation: Practice and Experience 28(4): 1204-1218 (2016)

11.     Xinghua Li, Ermeng Wang, Weidong Yang, Jianfeng Ma: DALP: A demand-aware location privacy protection scheme in continuous location-based services. Concurrency and Computation: Practice and Experience 28(4): 1219-1236 (2016)

12.     Yichuan Wang, Jianfeng Ma, Xiang Lu, Di Lu, Liumei Zhang: Efficiency optimisation signature scheme for time-critical multicast data origin authentication. IJGUC 7(1): 1-11 (2016)

13.     Zhiquan Liu, Jianfeng Ma, Zhongyuan Jiang, Yinbin Miao: LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment. TIIS 10(2): 914-934 (2016)

14.     Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, Baodong Qin: Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification. IEEE J. Biomedical and Health Informatics 20(2): 655-668 (2016) 2015

15.     Chao Yang, Jianfeng Ma, Jian Ren: Provable Ownership of Encrypted Files in De-duplication Cloud Storage. Ad Hoc & Sensor Wireless Networks 26(1-4): 43-72 (2015)

16.     Hongtao Li, Jianfeng Ma, Shuai Fu: A privacy-preserving data collection model for digital community. SCIENCE CHINA Information Sciences 58(3): 1-16 (2015)

17.     Youliang Tian, Changgen Peng, Dongdai Lin, Jianfeng Ma, Qi Jiang, Wenjiang Ji: Bayesian mechanism for rational secret sharing scheme. SCIENCE CHINA Information Sciences 58(5): 1-13 (2015)

18.     Huanguo Zhang, Wenbao Han, Xuejia Lai, Dongdai Lin, Jianfeng Ma, Jianhua Li: Survey on cyberspace security. SCIENCE CHINA Information Sciences 58(11): 1-43 (2015) j111       Junwei Zhang, Jianfeng Ma, Chao Yang, Li Yang: Universally composable secure positioning in the bounded retrieval model. SCIENCE CHINA Information Sciences 58(11): 1-15 (2015)

19.     Cong Gao, Jianfeng Ma, Zhiquan Liu, XinDi Ma: An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information. SCIENCE CHINA Information Sciences 58(12): 1-14 (2015)

20.     Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang: CRM: A New Dynamic Cross-la[ant]yer Reputation Computation Model in Wireless Networks. Comput. J. 58(4): 656-667 (2015)

21.     Li Yang, Jianfeng Ma, Wenjing Lou, Qi Jiang: A delegation based cross trusted domain direct anonymous attestation scheme. Computer Networks 81: 245-257 (2015)

22.     Jiajia Liu, Nei Kato, Jianfeng Ma, Naoto Kadowaki: Device-to-Device Communication in LTE-Advanced Networks: A Survey. IEEE Communications Surveys and Tutorials 17(4): 1923-1940 (2015)

23.     Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen: Secure service composition with information flow control in service clouds. Future Generation Comp. Syst. 49: 142-148 (2015)

24.     Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu: Towards secure and reliable cloud storage against data re-outsourcing. Future Generation Comp. Syst. 52: 86-94 (2015)

25.     Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li: Improvement of robust smart-card-based password authentication scheme. Int. J. Communication Systems 28(2): 383-393 (2015)

26.     Qi Jiang, Jianfeng Ma, Youliang Tian: Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int. J. Communication Systems 28(7): 1340-1351 (2015)

27.     Fushan Wei, Jianfeng Ma, Chuangui Ma, Xinghua Li: A two-factor authenticated key exchange protocol based on RSA with dynamic passwords. IJES 7(3/4): 257-265 (2015)

28.     Jianfeng Ma, Xianchen Ge, Nick H. Duong, Shuting Lei: Numerical investigation of restricted contact cutting tool in machining of AISI 1045 steel. IJMR 10(2): 147-161 (2015)

29.     Tianwei Che, Jianfeng Ma, Na Li, Chao Wang: A Security Quantitative Analysis Method For Access Control Based on Security Entropy. I. J. Network Security 17(5): 517-521 (2015)

30.     Fushan Wei, Jianfeng Ma, Aijun Ge, Guangsong Li, Chuangui Ma: A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems. ITC 44(2): 195-206 (2015)

31.     Xu An Wang, Jianfeng Ma, Xiaoyuan Yang: A new proxy re-encryption scheme for protecting critical information systems. J. Ambient Intelligence and Humanized Computing 6(6): 699-711 (2015)

32.     Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou: New access control systems based on outsourced attribute-based encryption1. Journal of Computer Security 23(6): 659-683 (2015)

33.     Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen: A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Networking and Applications 8(6): 1025-1037 (2015)

34.     Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 8(6): 1070-1081 (2015)

35.     Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu: Large universe decentralized key-policy attribute-based encryption. Security and Communication Networks 8(3): 501-509 (2015)

36.     Chao Yang, Jian Ren, Jianfeng Ma: Provable ownership of files in deduplication cloud storage. Security and Communication Networks 8(14): 2457-2468 (2015)

37.     Junwei Zhang, Jianfeng Ma, Chao Yang: Protocol Derivation System for the Needham-Schroeder family. Security and Communication Networks 8(16): 2687-2703 (2015)

38.     Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu: Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Security and Communication Networks 8(18): 4098-4109 (2015)

39.     Xu An Wang, Jianfeng Ma, Xiaoyuan Yang, Yuechuan Wei: Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks. Trans. Computational Collective Intelligence 19: 69-88 (2015)

40.     Xu An Wang, Jianfeng Ma, Yinbin Miao, Kai Zhang: Eroca: A fr[ant]amework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles. Trans. Computational Collective Intelligence 19: 126-139 (2015)

41.     Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang: Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015)

42.     Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou: New Publicly Verifiable Databases with Efficient Updates. IEEE Trans. Dependable Sec. Comput. 12(5): 546-556 (2015)

43.     Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong: New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Information Forensics and Security 10(1): 69-78 (2015)

44.     Jiajia Liu, Nei Kato, Jianfeng Ma, Toshikazu Sakano: Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility. IEEE Trans. Wireless Communications 14(3): 1266-1279 (2015)

45.     Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan: LTPPM: a location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications and Mobile Computing 15(1): 155-169 (2015)

46.     Xu An Wang, Jianfeng Ma, Fatos Xhafa: Another Look at Ciphertext Updating Algorithms for Cloud Storage. 3PGCIC 2015: 424-429

47.     Xu An Wang, Jianfeng Ma, Fatos Xhafa: Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency. 3PGCIC 2015: 444-448

48.     Jun Ye, Xiaofeng Chen, Jianfeng Ma: An Improved Algorithm for Secure Outsourcing of Modular Exponentiations. AINA Workshops 2015: 73-76

49.     Xinghua Li, Hai Liu, Fushan Wei, Jianfeng Ma, Weidong Yang: A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks. GLOBECOM 2015: 1-6

50.     Teng Li, Jianfeng Ma, Cong Sun: CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. ICA3PP (3) 2015: 449-462

51.     Jingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma: Continuous Context-Aware Device Comfort Evaluation Method. IFIPTM 2015: 203-211

52.     Jindan Zhang, Xu An Wang, Jianfeng Ma: Data Owner Based Attribute Based Encryption. INCoS 2015: 144-148

53.     Xu An Wang, Jianfeng Ma, Xiaoyuan Yang: New Compact CCA Secure Elgamal Scheme in the Random Oracle Model. INCoS 2015: 379-383

54.     Meixia Miao, Jianfeng Wang, Jianfeng Ma: New Publicly Verifiable Databases Supporting Insertion Operation. NBiS 2015: 640-642

55.     Hui Li, Sourav S. Bhowmick, Jiangtao Cui, Yunjun Gao, Jianfeng Ma: GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks. SIGMOD Conference 2015: 1525-1537

56.     Yinbin Miao, Jiajia Liu, Jianfeng Ma: Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds. WASA 2015: 407-416 2014

57.     Tao Zhang, Jianfeng Ma, Qi Li, Ning Xi, Cong Sun: Trust-based service composition in multi-domain environments under time constraint. SCIENCE CHINA Information Sciences 57(9): 1-16 (2014)

58.     Cong Sun, Ning Xi, Sheng Gao, Zhong Chen, Jianfeng Ma: Automated enforcement for relaxed information release with reference points. SCIENCE CHINA Information Sciences 57(11): 1-19 (2014)

59.     Yichuan Wang, Jianfeng Ma, Di Lu, Xiang Lu, Liumei Zhang: From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing. Cluster Computing 17(4): 1369-1381 (2014)

60.     Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong: New and efficient conditional e-payment systems with transferability. Future Generation Comp. Syst. 37: 252-258 (2014)

61.     Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Hui Zhu: Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model. IET Information Security 8(4): 217-223 (2014)

62.     Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu: Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data. I. J. Network Security 16(6): 437-443 (2014)

63.     Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong: Efficient attribute based sequential aggregate signature for wireless sensor networks. IJSNet 16(3): 172-184 (2014)

64.     Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Jun Ma: PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud. TIIS 8(1): 282-304 (2014)

65.     Fangwei Wang, Fang Yang, Yunkai Zhang, Jianfeng Ma: Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms. JCP 9(10): 2420-2427 (2014)

66.     Tianwei Che, Jianfeng Ma, Na Li, Chao Wang: Access Control Capability Assessment Method Based on Security Entropy. JCP 9(12): 2804-2808 (2014)

67.     Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma: The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks. J. Inf. Sci. Eng. 30(3): 875-893 (2014) j71       Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian: Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Medical Systems 38(2): 12 (2014)

68.     Sheng Gao, Jianfeng Ma, Cong Sun, Xinghua Li: Balancing trajectory privacy and data utility using a personalized anonymization model. J. Network and Computer Applications 38: 125-134 (2014)

69.     Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong: Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs. JSW 9(1): 190-194 (2014)

70.     Jinbo Xiong, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, Patrick S. Chen: A Secure Data Self-Destructing Scheme in Cloud Computing. IEEE Trans. Cloud Computing 2(4): 448-458 (2014)

71.     Xinghua Li, Fenye Bao, Shuxin Li, Jianfeng Ma: FLAP: An Efficient WLAN Initial Access Authentication Protocol. IEEE Trans. Parallel Distrib. Syst. 25(2): 488-497 (2014)

72.     Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou: New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9): 2386-2396 (2014)

73.     Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Atulya Nagar: A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks. Wireless Personal Communications 75(3): 1611-1633 (2014)

74.     Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang: An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks. Wireless Personal Communications 77(2): 1489-1506 (2014)

75.     Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma: Verifying Secure Interface Composition for Component-Based System Designs. APSEC (1) 2014: 359-366

76.     Yahui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma, Yulong Shen: Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms. CIS 2014: 603-607

77.     Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou: Verifiable Computation over Large Database with Incremental Updates. ESORICS (1) 2014: 148-162

78.     Ximeng Liu, Hui Zhu, Jianfeng Ma, Jun Ma, Siqi Ma: Key-Policy Weighted Attribute based Encryption for fine-grained access control. ICC Workshops 2014: 694-699

79.     Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma: M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet. ICT-EurAsia 2014: 612-621

80.     Tao Zhang, Jianfeng Ma, Ning Xi, Ximeng Liu, Zhiquan Liu, Jinbo Xiong: Trustworthy Service Composition in Service-Oriented Mobile Social Networks. ICWS 2014: 684-687

81.     Jiajia Liu, Hiroki Nishiyama, Nei Kato, Jianfeng Ma, Xiaohong Jiang: Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility. INFOCOM 2014: 2768-2776

82.     Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu: TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358

83.     Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao: Multi-domain Direct Anonymous Attestation Scheme from Pairings. NSS 2014: 566-573

84.     Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang: Fair (t, n) threshold secret sharing scheme. IET Information Security 7(2) (2013)

85.     Shuai Fu, Jianfeng Ma, Hongtao Li, Changguang Wang: Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks. IJDSN 2013 (2013)

86.     Yuanbo Guo, Jianfeng Ma, Wang Chao, Kuiwu Yang: Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes. IJDSN 2013 (2013)

87.     Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang: Distributed Information Flow Verification fr[ant]amework for the Composition of Service Chain in Wireless Sensor Network. IJDSN 2013 (2013)

88.     Qingsong Yao, Jinsong Han, Saiyu Qi, Zhuo Liu, Shan Chang, Jianfeng Ma: MAP: Towards Authentication for Multiple Tags. IJDSN 2013 (2013)

89.     Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu: Access control requirements for structured document in cloud computing. IJGUC 4(2/3): 95-102 (2013)

90.     Youliang Tian, Jianfeng Ma, Changgen Peng, Yichuan Wang, Liumei Zhang: A rational fr[ant]amework for secure communication. Inf. Sci. 250: 215-226 (2013)

91.     Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma: An Improved Password-Based Remote User Authentication Protocol without Smart Cards. ITC 42(2): 113-123 (2013)

92.     Qi Jiang, Jianfeng Ma, Zhuo Ma, Guangsong Li: A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. J. Medical Systems 37(1): 9897 (2013)

93.     Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Yaoyu Zhang: An novel three-party authenticated key exchange protocol using one-time key. J. Network and Computer Applications 36(1): 498-503 (2013)

94.     Cong Gao, Jianfeng Ma: A Collaborative QoS-Aware Service Evaluation Method for Service Selection. JNW 8(6): 1370-1379 (2013)

95.     Xinghua Li, Xiang Lu, Jianfeng Ma: An Engine for Automatic Code Generation of Security Protocols in Multiple Languages. Smart CR 3(3): 174-189 (2013)

96.     Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan, Cong Sun: TrPF: A Trajectory Privacy-Preserving fr[ant]amework for Participatory Sensing. IEEE Trans. Information Forensics and Security 8(6): 874-887 (2013)

97.     Xiang Lu, Wenye Wang, Jianfeng Ma: An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation. IEEE Trans. Smart Grid 4(1): 170-183 (2013)

98.     Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang: An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks. Wireless Personal Communications 68(4): 1477-1491 (2013)

99.     Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Tao Zhang: PRAM: privacy preserving access management scheme in cloud services. SCC@ASIACCS 2013: 41-46

100.  Ximeng Liu, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang: Attribute Based Multi-signature Scheme in the Standard Model. CIS 2013: 738-742 c86

101.  Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou: Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. ESORICS 2013: 592-609

102.  Chao Yang, Jian Ren, Jianfeng Ma: Provable ownership of file in de-duplication cloud storage. GLOBECOM 2013: 695-700

103.  Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li: A Secure Document Self-Destruction Scheme: An ABE Approach. HPCC/EUC 2013: 59-64

104.  Tao Zhang, Jianfeng Ma, Cong Sun, Qi Li, Ning Xi: Service Composition in Multi-domain Environment under Time Constraint. ICWS 2013: 227-234

105.  Ning Xi, Jianfeng Ma, Cong Sun, Tao Zhang: Decentralized Information Flow Verification fr[ant]amework for the Service Chain Composition in Mobile Computing Environments. ICWS 2013: 563-570

106.  Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Qi Li: Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing. IDCS 2013: 238-251

107.  Di Lu, Jianfeng Ma, Yichuan Wang, Ning Xi: Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing. INCoS 2013: 1-8

108.  Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma: Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control. INCoS 2013: 51-57

109.  Liumei Zhang, Jianfeng Ma, Yichuan Wang: Content Based Spam Text Classification: An Empirical Comparison between English and Chinese. INCoS 2013: 69-76

110.  Yichuan Wang, Jianfeng Ma, Di Lu, Liumei Zhang, Xiang Lu: Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency. INCoS 2013: 85-92

111.  Ximeng Liu, Tao Zhang, Jianfeng Ma, Hui Zhu, Feng Cai: Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network. INCoS 2013: 173-180

112.  Qi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu: Fully Secure Decentralized Key-Policy Attribute-Based Encryption. INCoS 2013: 220-225

113.  Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li: A Secure Document Self-Destruction Scheme with Identity Based Encryption. INCoS 2013: 239-243

114.  Yuehua Zhou, Yong Zeng, Zhihong Liu, Nan Li, Jianfeng Ma, Lihua Dong: Fault and Intrusion Tolerance of Complex Networks: A Controllability View. INCoS 2013: 516-520

115.  Xiang Lu, Wenye Wang, Jianfeng Ma, Limin Sun: Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture. SmartGridComm 2013: 612-617

116.  Yulong Shen, Xiaohong Jiang, Jianfeng Ma: Flexible relay selection for secure communication in two-hop wireless networks. WiOpt 2013: 648-651

117.  Yulong Shen, Xiaohong Jiang, Jianfeng Ma: Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks .CoRR abs/1301.1746 (2013)

118.  Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong: Improving security and efficiency for multi-authority access control system in cloud storage. IACR Cryptology ePrint Archive 2013: 755 (2013) 2012

119.  Hui Lin, Jianfeng Ma, Jia Hu, Kai Yang: PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP J. Wireless Comm. and Networking 2012: 69 (2012)

120.  Chao Lv, Hui Li, Jianfeng Ma, Yaoyu Zhang: Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. Trans. Emerging Telecommunications Technologies 23(7): 618-624 (2012)

121.  Zhihong Liu, Jianfeng Ma, Yong Zeng, Yang Li, YoungHo Park: Secrecy Transfer. IJDSN 2012 (2012)

122.  Xiang Lu, Wenye Wang, Jianfeng Ma: Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems. IJDSN 2012 (2012)

123.  Yulong Shen, Xiaowei Dang, Min Shu, Ning Xi, Jianfeng Ma: Two-la[ant]yer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks. IJDSN 2012 (2012)

124.  Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma: A method for efficient parallel computation of Tate pairing. IJGUC 3(1): 43-52 (2012)

125.  Youliang Tian, Changgen Peng, Jianfeng Ma: Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings. I. J. Network Security 14(3): 142-148 (2012)

126.  Chao Lv, Hui Li, Jianfeng Ma, Ben Niu: Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems. IJRFITA 4(1): 3-12 (2012)

127.  Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu: A security enhanced authentication and key distribution protocol for wireless networks. Security and Communication Networks 5(4): 343-352 (2012)

128.  Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu: Security enhancement of the communication-efficient AUTHMAC_DH protocols. Security and Communication Networks 5(6): 674-680 (2012)

129.  Zhihong Liu, Jianfeng Ma, YoungHo Park, Shangrong Xiang: Data security in unattended wireless sensor networks with mobile sinks. Wireless Communications and Mobile Computing 12(13): 1131-1146 (2012)

130.  Cong Sun, Sheng Gao, Jianfeng Ma: Verifying Location-Based Services with Declassification Enforcement. APWeb 2012: 695-702

131.  Yong Zeng, Xin Wang, Lihua Dong, Jianfeng Ma, Zhihong Liu: Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks. CIS 2012: 683-686

132.  Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou: New Algorithms for Secure Outsourcing of Modular Exponentiations. ESORICS 2012: 541-556

133.  Shichao Wang, Ruonan Zhang, Jianfeng Ma, Lin Cai: A simple energy-efficient routing algorithm for Wireless Sensor Networks based on Artificial Potential Field. GLOBECOM 2012: 225-231

134.  Xinghua Li, Jianfeng Ma, Yulong Shen: An efficient WLAN initial access authentication protocol. GLOBECOM 2012: 1035-1040

135.  Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Yudi Niu: The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction. INCoS 2012: 185-192

136.  Li Yang, Jianfeng Ma, Zhihong Liu, Ruofan Zheng: A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation. INCoS 2012: 279-285

137.  Yuanbo Guo, Jianfeng Ma, Chao Wang, Liang-min Wang: Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs. TrustCom 2012: 303-309

138.  Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Weisong Shi: Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks .CoRR abs/1212.0287 (2012)

139.  Yulong Shen, Xiaohong Jiang, Jianfeng Ma: Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System .CoRR abs/1212.6627 (2012)

140.  Xinghua Li, Jianfeng Ma, YoungHo Park, Li Xu: A USIM-Based Uniform Access Authentication fr[ant]amework in Mobile Communication. EURASIP J. Wireless Comm. and Networking 2011 (2011)

141.  Haizheng Yu, Jianfeng Ma, Hong Bian: Reasonable routing in delay/disruption tolerant networks. Frontiers of Computer Science in China 5(3): 327-334 (2011)

142.  Chao Lv, Hui Li, Jianfeng Ma, Meng Zhao: Security analysis of two recently proposed RFID authentication protocols. Frontiers of Computer Science in China 5(3): 335-340 (2011)

143.  Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang: Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario. Intelligent Automation & Soft Computing 17(2): 191-203 (2011)

144.  Chao Yang, Jianfeng Ma, Xuewen Dong: A New Evaluation Model for Security Protocols. JCM 6(6): 485-494 (2011)

145.  Guangsong Li, Jianfeng Ma, Qi Jiang, Xi Chen: A novel re-authentication scheme based on tickets in wireless local area networks. J. Parallel Distrib. Comput. 71(7): 906-914 (2011)

146.  Xinghua Li, Xiang Lu, Jianfeng Ma, Zhenfang Zhu, Li Xu, YoungHo Park: Authentications and Key Management in 3G-WLAN Interworking. MONET 16(3): 394-407 (2011)

147.  Liumei Zhang, Jianfeng Ma, Yichuan Wang, Shaowei Pan: PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction. CIS 2011: 123-126

148.  Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu: Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks. CIS 2011: 545-549

149.  Yameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, Yahui Li: AHP-GRAP Based Security Evaluation Method for MILS System within CC fr[ant]amework. CIS 2011: 635-639

150.  Yahui Li, Wen Sheng Niu, Yadi Zhang, Jianfeng Ma, Yulong Shen: Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks. CIS 2011: 731-735

151.  Xinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma: Analysis of the Authentication Protocols Based on Game Theory. CIS 2011: 788-792

152.  Xiang Lu, Zhuo Lu, Wenye Wang, Jianfeng Ma: On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP. GLOBECOM 2011: 1-6

153.  Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma: A Multi-compositional Enforcement on Information Flow Security. ICICS 2011: 345-359

154.  Zhitu Su, Chunhui Sun, Hui Li, Jianfeng Ma, Kai Fan: Fast Parallel Computation of Tate Pairing. INCoS 2011: 178-183

155.  Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, Hao Yin: MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks. INCoS 2011: 251-257

156.  Yulong Shen, Qingqi Pei, Ning Xi, Jianfeng Ma, Qijian Xu, Hao Yin: HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks. INCoS 2011: 320-327

157.  Sheng Gao, Jianfeng Ma, Weisong Shi, Guoxing Zhan: Towards Location and Trajectory Privacy Protection in Participatory Sensing. MobiCASE 2011: 381-386

158.  Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu: Secret Sharing Scheme with Fairness. TrustCom 2011: 494-500

159.  Qi Jiang, Jianfeng Ma, Guangsong Li, Xiang Lu: Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid. IACR Cryptology ePrint Archive 2011: 491 (2011)

版权声明:未经西安电子科技大学以及个人主页教师本人许可不得复制,转载传播本主页内容或用于任何商业用途,如需转载请征得主页所有者同意,并附上主页链接.
西安电子科技大学个人主页 站点地图 | | 马建峰的留言板 | 更新日期 :2016-12-24 | |
Copyright © 2011-2016 西安电子科技大学 版权所有 陕ICP备021284(05016169) Powered by 信息化建设处 & 电院网络中心