Showing 1 - 20 results of 20 for search 'MA Jian-feng', query time: 0.03s
Refine Results
-
1
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks by GUO Jiang-hong, MA Jian-feng
Published 2011-01-01Get full text
Article -
2
Provable secure trusted protocol for network storage by DUAN Xin-dong, MA Jian-feng
Published 2011-01-01Get full text
Article -
3
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks by GUO Jiang-hong, MA Jian-feng
Published 2011-01-01Get full text
Article -
4
Location based reliability differentiation service for WSN by ZENG Yong1, MA Jian-feng1
Published 2008-01-01Get full text
Article -
5
New approach against Sybil attack in wireless sensor networks by FENG Tao1, MA Jian-feng2
Published 2008-01-01Get full text
Article -
6
Trusted routing based on D-S evidence theory in wireless mesh network by YANG Kai, MA Jian-feng, YANG Chao
Published 2011-01-01Get full text
Article -
7
UC secure one-time signature based broadcast authentication by ZHANG Jun-wei, MA Jian-feng, YANG Li
Published 2010-01-01Get full text
Article -
8
UC secure one-time signature based broadcast authentication by ZHANG Jun-wei, MA Jian-feng, YANG Li
Published 2010-01-01Get full text
Article -
9
Provably secure partially blind signature without trusted PKG by FENG Tao1, PENG Wei1, MA Jian-feng3
Published 2010-01-01Get full text
Article -
10
Universally composable oblivious transfer protocol based on VSPH by LI Feng-hua1, FENG Tao1, MA Jian-feng1
Published 2007-01-01Get full text
Article -
11
Survey of wireless sensor network security techniques by PEI Qing-qi1, SHEN Yu-long1, MA Jian-feng1
Published 2007-01-01Get full text
Article -
12
Consistency of group key exchange protocols by CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2
Published 2008-01-01Get full text
Article -
13
Consistency of group key exchange protocols by CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2
Published 2008-01-01Get full text
Article -
14
Analysis of provably secure on-demand source routing in MANET by MAO Li-qiang1, MA Jian-feng1, LI Xing-hua1
Published 2009-01-01Get full text
Article -
15
Universally composable secure trusted access protocol for WLAN Mesh networks by MA Zhuo1, MA Jian-feng1, ZENG Yong1, SHEN Yu-long1
Published 2008-01-01Get full text
Article -
16
Identity-based roaming protocol with anonymity for heterogeneous wireless networks by JIANG Qi1, MA Jian-feng1, LI Guang-song1, LIU Hong-yue1
Published 2010-01-01Get full text
Article -
17
Two-hop cover-based access control scheme for wireless sensor networks by DU Zhi-qiang1, SHEN Yu-long1, MA Jian-feng1, ZHOU Li-hua1
Published 2010-01-01Get full text
Article -
18
EBS-based efficient and secure group key management in wireless sensor networks by WANG Wei1, ZHAO Wen-hong2, LI Feng-hua3.4, MA Jian-feng3
Published 2009-01-01Get full text
Article -
19
Key infection and its applications in sensor networks by LIU Zhi-hong1, MA Jian-feng1, PANG Liao-jun1, PEI Qing-qi1
Published 2009-01-01Get full text
Article -
20
Security model for ID-based key exchange by LIU Wen-ju1, ZHANG Jun-wei2, MA Jian-feng2, YANG Chao2, LI Xing-hua2
Published 2010-01-01Get full text
Article