登录
Xidian University
中文
zdM
LnZ
0lH
4hm
QJB
gGt
wux
a4V
LMT
NJ5
TiX
G7l
gsD
mtU
X7f
Jpe
6Fd
UZe
8H7
NT3
Home
Scientific Research
Research Field
Paper Publications
Patents
Published Books
Research Projects
Research Team
Teaching Research
Teaching Resources
Teaching Information
Teaching Achievement
Awards and Honours
Enrollment Information
Student Information
My Album
Blog
Current position:
Home
>>
Scientific Research
>>
Paper Publications
Ma Jianfeng
Personal Information
Professor
Academic Titles:
计算智能与信息安全学部执行主任、空天地一体化综合业务网全国重点实验室首席科学家
Other Post:
网络与系统安全陕西省重点实验室主任
Paper Publications
VCSE:Peer-to-Peer Networking and Applications,2017,10(4):995-1007
Ma, Weigang ; Zhao, Kai ; Hei, Xinhong ; Xie, Guo ; Ma, Jianfeng ,Research on time petri net oriented UML statechart and its application:ICIC Express Letters,2015,9(3):929-935
Liu, Zhiquan^Ma, Jianfeng^Jiang, Zhongyuan^Miao, Yinbin,LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment:KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,2016,10(2):914-934
Wang, Fangwei; Zhang, Yunkai; Wang, Changguang; Ma, Jianfeng,Stability analysis of an e-SEIAR model with point-to-group worm propagation:COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION,2015,20(3):897-904
Wang, Xu An^Xhafa, Fatos^Cai, Weiyi^Ma, Jianfeng^Wei, Fushan,Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage:COMPUTERS & ELECTRICAL ENGINEERING,2016,56:871-883
Ma, Xindi ; Ma, Jianfeng ; Gao, Sheng ,Fingerprint optimization method for the indoor localization system:Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University,2015,42(6):81-87
Meng, Xianjia ; Ma, Jianfeng ; Wang, Yichuan ; Lu, Di ,MCTE: a trust evaluation model for multiple context in social networks:Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University,2015,49(4):73-77 and 10
Wang, Xu An; Ma, Jianfeng; Yang, Xiaoyuan,A new proxy re-encryption scheme for protecting critical information systems:JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING,2015,6(6):699-711
Liu, Ximeng^Lu, Rongxing^Ma, Jianfeng^Chen, Le^Qin, Baodong,Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification:IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS,2016,20(2):655-668
Wei, Fushan^Ma, Jianfeng^Jiang, Qi^Shen, Jian^Ma, Chuangui,Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks:INFORMATION TECHNOLOGY AND CONTROL,2016,45(1):62-70
Feng, Pengbin^Sun, Cong^Ma, Jianfeng,Measuring the risk value of sensitive dataflow path in Android applications:SECURITY AND COMMUNICATION NETWORKS,2016,9(18):5918-5933
Guo, Jingjing ; Ma, Jianfeng ,Trust recommendation algorithm for the virtual community based Internet of Things(IoT):Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University,2015,42(2):52-57 and 17
Che, Tian-Wei ; Ma, Jian-Feng ; Li, Na ; Wang, Chao ,A security quantitative analysis method for access control based on security entropy:International Journal of Network Security,2015,17(5):517-521
Guo, Jing-Jing ; Ma, Jian-Feng ; Li, Qi ; Wan, Tao ; Gao, Cong ; Zhang, Liang ,Game theory based trust management method for mobile ad hoc networks:Tongxin Xuebao/Journal on Communications,2014,35(11):50-58
Li, Qi; Ma, Jianfeng; Li, Rui; Xiong, Jinbo; Liu, Ximeng,Large universe decentralized key-policy attribute-based encryption:SECURITY AND COMMUNICATION NETWORKS,2015,8(3):501-509
Publicly verifiable databases with efficient insertion/deletion operations:Journal of Computer and System Sciences,2017,86:49-58
Li, Qi; Ma, Jianfeng; Li, Rui; Xiong, Jinbo; Liu, Ximeng,Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption:SECURITY AND COMMUNICATION NETWORKS,2015,8(18):4098-4109
Wei, Fushan ; Wei, Yun ; Ma, Chuangui ,Attack on an ID-based authenticated group key exchange protocol with identifying malicious participants:International Journal of Network Security,2016,18(2):393-396
Zhang, Liumei ; Ma, Jianfeng ; Wang, Yichuan ; Lu, Di ,Towards secure P2P network: Degenerated node identification and evaluation:Open Cybernetics and Systemics Journal,2014,8(1):371-377
Zhang, Liumei ; Ma, Jianfeng ; Wang, Yichuan ; Lu, Di ,Towards secure P2P network:Open Cybernetics and Systemics Journal,2014,8(1):371-377
Wang, Tian-Yin^Wang, Shu-Yu^Ma, Jian-Feng,Robust Quantum Private Queries:INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS,2016,55(7):3309-3317
Fu, Shuai^Ma, Jianfeng^Li, Hongtao^Jiang, Qi,A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities:SECURITY AND COMMUNICATION NETWORKS,2016,9(15):2779-2788
Li, Qi ; Ma, Jian-Feng ; Xiong, Jin-Bo ; Liu, Xi-Meng ,Adaptively secure key-policy ABE scheme with fast decryption:Tongxin Xuebao/Journal on Communications,2014,35:26-32
Cost-effective secure E-health cloud system using identity based cryptographic techniques:Future Generation Computer Systems,2017,67:242-254
Efficient three-party password-based authenticated key exchange protocol in the standard model:Ruan Jian Xue Bao/Journal of Software,2016,27(9):2389-2399
Che, Tianwei ; Ma, Jianfeng ; Li, Na ; Wang, Chao ,Security analysis of access control model in hybrid cloud based on security entropy:High Technology Letters,2015,21(2):200-204
Ma, Xindi^Ma, Jianfeng^Li, Hui^Jiang, Qi^Gao, Sheng,RTRC: A Reputation-Based Incentive Game Model for Trustworthy Crowdsourcing Service:CHINA COMMUNICATIONS,2016,13(12):199-215
Wei, Fushan; Ma, Jianfeng; Ge, Aijun; Li, Guangsong; Ma, Chuangui,A Provably Secure Three-Party Password Authenicated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems:INFORMATION TECHNOLOGY AND CONTROL,2015,44(2):195-205
Ma, Yong ; Ma, Jianfeng ; Sun, Cong ; Zhang, Shuang ; Cui, Xining ; Li, Yahui ,Component-based failure mode and effect analysis for flight control systems:Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University,2016,43(2):174-179
Cryptanalysis of a biometric-based multi-server authentication scheme:International Journal of Security and its Applications,2016,10(2):163-170
TOTAL 53 PIECE 1/2
FIRST
PREVIOUS
NEXT
LAST
PAGE