Showing 1 - 20 results of 89 for search 'Jian-feng Ma', query time: 0.03s
Refine Results
-
1
Silicon transport and its “homeostasis” in rice by Sheng Huang, Jian Feng Ma
Published 2024-01-01
Article -
2
Secure and transparent data aggregation for wireless sensor networks by Jiang-hong GUO, Jian-feng MA
Published 2012-10-01
Article -
3
Secure and transparent data aggregation for wireless sensor networks by Jiang-hong GUO, Jian-feng MA
Published 2012-10-01
Article -
4
Breeding for an elite malting barley cultivar with acid soil tolerance by Sheng Huang, Kazuhiro Sato, Jian Feng Ma
Published 2024-09-01
Article -
5
Provably secure private key protection scheme for smart mobile terminal by Jun MA, Jian-feng MA, Yuan-bo GUO
Published 2012-12-01
Article -
6
Provably secure private key protection scheme for smart mobile terminal by Jun MA, Jian-feng MA, Yuan-bo GUO
Published 2012-12-01
Article -
7
Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA
Published 2012-04-01
Article -
8
Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA
Published 2012-04-01
Article -
9
Improvement and formal proof on protocol Otway-Rees by Lai-feng LU, Xin-dong DUAN, Jian-feng MA
Published 2012-09-01
Article -
10
Partially policy hidden CP-ABE supporting dynamic policy updating by Zuo-bin YING, Jian-feng MA, Jiang-tao CUI
Published 2015-12-01
Article -
11
Improvement and formal proof on protocol Otway-Rees by Lai-feng LU, Xin-dong DUAN, Jian-feng MA
Published 2012-09-01
Article -
12
Protocol to enhance the security of Early data in TLS 1.3 by Xing-long ZHANG, Qing-feng CHENG, Jian-feng MA
Published 2017-12-01
Article -
13
Partially policy hidden CP-ABE supporting dynamic policy updating by Zuo-bin YING, Jian-feng MA, Jiang-tao CUI
Published 2015-12-01
Article -
14
Approach on runtime monitoring based on the embedded trusted platforms by Zhao-chang SUN, Jian-feng MA, Cong SUN, Di LU
Published 2017-10-01
Article -
15
Multi-authority ABS supporting dendritic access structure by Ruo MO, Jian-feng MA, Xi-meng LIU, Qi LI
Published 2017-07-01
Article -
16
Towards cooperation location privacy-preserving group nearest neighbor queries in LBS by Sheng GAO, Jian-feng MA, Qing-song YAO, Cong SUN
Published 2015-03-01
Article -
17
Anonymous aggregator election protocol for wireless sensor networks by Shuai FU, Jian-feng MA, Hong-tao LI, GQi JIAN
Published 2015-02-01
Article -
18
Multi-authority ABS supporting dendritic access structure by Ruo MO, Jian-feng MA, Xi-meng LIU, Qi LI
Published 2017-07-01
Article -
19
Research on security of mobile payment for commercial bank by Xi CHEN, You-liang TIAN, Zhuo MA, Jian-feng MA
Published 2014-11-01
Article -
20
Research on security of mobile payment for commercial bank by Xi CHEN, You-liang TIAN, Zhuo MA, Jian-feng MA
Published 2014-11-01
Article