The following pages link to Jian-Feng Ma (Q975157):
Displayed 50 items.
- (Q335716) (redirect page) (← links)
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy (Q335718) (← links)
- Efficient algorithms for secure outsourcing of bilinear pairings (Q476851) (← links)
- A rational framework for secure communication (Q497644) (← links)
- Robust quantum private queries (Q518040) (← links)
- Laminar developing flow in the entrance region of rotating curved pipes (Q620176) (← links)
- Numerical analysis of the fluid flow in a rotating curved elliptical pipe (Q628421) (← links)
- A study on the flow in helical elliptical pipes with Galerkin method (Q633436) (← links)
- Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms (Q645866) (← links)
- Security extension for the Canetti-Krawczyk model in identity-based systems (Q866148) (← links)
- Image analysis by Bessel-Fourier moments (Q975158) (← links)
- Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms (Q996434) (← links)
- Key hierarchies for hierarchical access control in secure group communications (Q1004586) (← links)
- Using transforming matrices to generate DNA clone grids (Q1406037) (← links)
- Theoretical and numerical analysis of convective heat transfer in the rotating helical pipes. (Q1430753) (← links)
- Automated enforcement for relaxed information release with reference points (Q1616187) (← links)
- On the control of opinion dynamics in social networks (Q1782950) (← links)
- Spectrum privacy preserving for social networks: a personalized differential privacy approach (Q2057149) (← links)
- Adversarial link deception against the link prediction in complex networks (Q2069226) (← links)
- A rumor spreading model based on two propagation channels in social networks (Q2159104) (← links)
- Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification (Q2215138) (← links)
- A reusable and single-interactive model for secure approximate \(k\)-nearest neighbor query in cloud (Q2293034) (← links)
- A meshless integral method based on regularized boundary integral equation (Q2382820) (← links)
- Universally composable anonymous hash certification model (Q2385415) (← links)
- The postprocessing of quantum digital signatures (Q2411562) (← links)
- Theoretical analysis of convective heat transfer of Oldroyd-B fluids in a curved pipe (Q2476057) (← links)
- Stability analysis of an \textit{e-SEIAR} model with point-to-group worm propagation (Q2513877) (← links)
- A new approach for UC security concurrent deniable authentication (Q2519285) (← links)
- Elastoplastic meshless integral method (Q2638095) (← links)
- Galerkin method study on flow of Oldroyd-B fluids in curved circular cross-section pipes (Q2644455) (← links)
- Privacy-preserving Krawtchouk moment feature extraction over encrypted image data (Q2666794) (← links)
- Towards Efficient Fully Randomized Message-Locked Encryption (Q2817475) (← links)
- New Algorithms for Secure Outsourcing of Modular Exponentiations (Q2856093) (← links)
- One-time rational secret sharing scheme based on bayesian game (Q2887507) (← links)
- (Q2951210) (← links)
- (Q2984848) (← links)
- A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains (Q2985147) (← links)
- Verifiable Computation over Large Database with Incremental Updates (Q2985269) (← links)
- Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation (Q2985329) (← links)
- (Q3054724) (← links)
- (Q3169520) (← links)
- FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure (Q3297474) (← links)
- Local Poincaré Symmetry in Gauge Theory of Gravity (Q3393718) (← links)
- (Q3422582) (← links)
- (Q3573853) (← links)
- Secure Error-Correction Network Coding in a Randomized Setting (Q3634339) (← links)
- Operating efficiency assessment of commercial banks with Cooperative-Stackelberg hybrid two-stage DEA (Q5034733) (← links)
- (Q5035536) (← links)
- Universally composable secure TNC model and EAP-TNC protocol in IF-T (Q5046377) (← links)
- Bayesian mechanism for rational secret sharing scheme (Q5046467) (← links)