学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 马华的留言板
学术论文

发表的部分论文

  1. Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, and Xiaofeng Chen, Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing, Computer Sciences and Information Systems, Vol. 10, No. 2, 667-684, 2013.(SCI)
  2. Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen, An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing, Journal of Universal Computer Science, 19(16): 2349-2367, 2013.(SCI)
  3. Yansheng Feng, Hua Ma, and Xiaofeng Chen, Efficient and Verifiable Outsourcing scheme of Sequence Comparisons, Intelligent Automation and Soft Computing, Vol. 21, No. 1, 51-63, 2015. (SCI).
  4. Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, and Xiaofeng Chen, A New Efficient Verifiable Fuzzy Keyword Search Scheme, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4(3), 61-71, 2012.
  5. Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu, Secure and Verifiable Outsourcing of Sequence Comparisons, Asian Conference on Availability, Reliability and Security, LNCS 7804, Springer, 243–252, 2013.
  6. Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen, New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation, Asian Conference on Availability, Reliability and Security, LNCS 7804, Springer, 373–382, 2013.
  7. Keying Li and Hua Ma, Outsourcing Decryption of Multi-Authority ABE Ciphertexts, International Journal of Network Security, Vol. 16, No. 4, 286-294, 2014.
  8. Haixin Nie, Hua Ma, Jianfeng Wang, and Xiaofeng Chen,Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution, The 9th International Conference onBroadband and Wireless Computing, Communication and Applications (BWCCA), IEEE, 572-577, 2014.
  9. Linchao Zhang, Hua Ma, Zhenhua Liu, et al. Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme[J].  2016.
  10. Hua Ma, Ting Peng, Zhenhua Liu. Directly revocable and verifiable key-policy attribute-based encryption for large universe[J]. International Journal of Network Security, 2017, 19(2):272-284.
  11. Hua Ma, Dong E, Zhenhua Liu, et al. Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation[C]// International Conference on Broadband and Wireless Computing, Communication and Applications. 2018:811-820.