Showing 1 - 20 results of 67 for search 'Feng MA', query time: 0.03s
Refine Results
-
1
Numerical Simulation of Nonlinear Oil Film Forces of Tilting-Pad Guide Bearing in Large Hydro-unit by Li-Feng Ma, Xin-Zhi Zhang
Published 2000-01-01
Article -
2
A New Implementable Prediction-Correction Method for Monotone Variational Inequalities with Separable Structure by Feng Ma, Mingfang Ni, Zhanke Yu
Published 2013-01-01
Article -
3
Secure and transparent data aggregation for wireless sensor networks by Jiang-hong GUO, Jian-feng MA
Published 2012-10-01
Article -
4
-
5
Provably secure private key protection scheme for smart mobile terminal by Jun MA, Jian-feng MA, Yuan-bo GUO
Published 2012-12-01
Article -
6
Identity-based efficient authentication and key agreement protocol for mobile Internet by Zhen WANG, Zhao-feng MA, Shou-shan LUO
Published 2017-08-01
Article -
7
Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA
Published 2012-04-01
Article -
8
Improvement and formal proof on protocol Otway-Rees by Lai-feng LU, Xin-dong DUAN, Jian-feng MA
Published 2012-09-01
Article -
9
Protocol to enhance the security of Early data in TLS 1.3 by Xing-long ZHANG, Qing-feng CHENG, Jian-feng MA
Published 2017-12-01
Article -
10
Partially policy hidden CP-ABE supporting dynamic policy updating by Zuo-bin YING, Jian-feng MA, Jiang-tao CUI
Published 2015-12-01
Article -
11
Approach on runtime monitoring based on the embedded trusted platforms by Zhao-chang SUN, Jian-feng MA, Cong SUN, Di LU
Published 2017-10-01
Article -
12
Multi-authority ABS supporting dendritic access structure by Ruo MO, Jian-feng MA, Xi-meng LIU, Qi LI
Published 2017-07-01
Article -
13
Anonymous aggregator election protocol for wireless sensor networks by Shuai FU, Jian-feng MA, Hong-tao LI, GQi JIAN
Published 2015-02-01
Article -
14
Research on security of mobile payment for commercial bank by Xi CHEN, You-liang TIAN, Zhuo MA, Jian-feng MA
Published 2014-11-01
Article -
15
Towards cooperation location privacy-preserving group nearest neighbor queries in LBS by Sheng GAO, Jian-feng MA, Qing-song YAO, Cong SUN
Published 2015-03-01
Article -
16
Composable information flow verification for service chain based on model checking by Ning XI, Jian-feng MA, Cong SUN, Di LU, Tao ZHANG
Published 2014-11-01
Article -
17
New remote authorization protocol for vehicle diagnosis by Zheng-da JIAO, Jian-feng MA, Cong SUN, Qing-song YAO
Published 2014-11-01
Article -
18
Improved direct anonymous attestation scheme for mobile computing platforms by Li YANG, Jun-wei ZHANG, Jian-feng MA, Zhi-hong LIU
Published 2013-06-01
Article -
19
-
20
On-demand key management based on social attribute for opportunistic networks by Xi CHEN, Guang-song LI, You-liang TIAN, Jian-feng MA
Published 2012-12-01
Article