Jian-Feng Ma

From MaRDI portal
Person:975157

Available identifiers

zbMath Open ma.jianfengMaRDI QIDQ975157

List of research outcomes





PublicationDate of PublicationType
Beyond volume pattern: storage-efficient Boolean searchable symmetric encryption with suppressed leakage2024-06-05Paper
Additive centralized and Stackelberg DEA models for two‐stage system with shared resources2023-11-17Paper
Towards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme2023-11-09Paper
Human-exoskeleton oscillation model and qualitative analysis of interaction and functional practicality of exoskeletons2023-10-13Paper
Bayesian mechanism for rational secret sharing scheme2022-10-28Paper
Universally composable secure TNC model and EAP-TNC protocol in IF-T2022-10-28Paper
Universally composable secure positioning in the bounded retrieval model2022-10-28Paper
A rumor spreading model based on two propagation channels in social networks2022-07-26Paper
https://portal.mardi4nfdi.de/entity/Q50355362022-02-22Paper
Operating efficiency assessment of commercial banks with Cooperative-Stackelberg hybrid two-stage DEA2022-02-21Paper
Adversarial link deception against the link prediction in complex networks2022-01-20Paper
Spectrum privacy preserving for social networks: a personalized differential privacy approach2021-12-08Paper
Privacy-preserving Krawtchouk moment feature extraction over encrypted image data2021-11-23Paper
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification2020-12-10Paper
https://portal.mardi4nfdi.de/entity/Q51280702020-10-27Paper
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure2020-07-20Paper
A reusable and single-interactive model for secure approximate \(k\)-nearest neighbor query in cloud2020-02-06Paper
https://portal.mardi4nfdi.de/entity/Q51969812019-09-20Paper
Automated enforcement for relaxed information release with reference points2018-11-01Paper
On the control of opinion dynamics in social networks2018-09-20Paper
The postprocessing of quantum digital signatures2017-10-24Paper
https://portal.mardi4nfdi.de/entity/Q29848482017-05-17Paper
Verifiable Computation over Large Database with Incremental Updates2017-05-16Paper
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation2017-05-16Paper
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains2017-05-16Paper
Robust quantum private queries2017-03-28Paper
https://portal.mardi4nfdi.de/entity/Q29512102017-01-06Paper
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy2016-11-02Paper
Towards Efficient Fully Randomized Message-Locked Encryption2016-08-31Paper
A rational framework for secure communication2015-09-24Paper
https://portal.mardi4nfdi.de/entity/Q55009202015-08-10Paper
Verifiable Computation over Large Database with Incremental Updates2015-07-24Paper
Stability analysis of an \textit{e-SEIAR} model with point-to-group worm propagation2015-01-29Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
https://portal.mardi4nfdi.de/entity/Q54002412014-02-28Paper
New Algorithms for Secure Outsourcing of Modular Exponentiations2013-10-23Paper
A one-time rational secret sharing scheme based on Bayesian game2012-06-01Paper
Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms2011-11-10Paper
Constructing polynomials for generating pairing-friendly elliptic curves2011-09-29Paper
A study on the flow in helical elliptical pipes with Galerkin method2011-03-31Paper
Numerical analysis of the fluid flow in a rotating curved elliptical pipe2011-03-10Paper
Laminar developing flow in the entrance region of rotating curved pipes2011-01-19Paper
https://portal.mardi4nfdi.de/entity/Q30547242010-11-05Paper
Elastoplastic meshless integral method2010-09-14Paper
An efficient signcryption scheme with forward secrecy2010-07-08Paper
Image analysis by Bessel-Fourier moments2010-06-08Paper
Local Poincaré Symmetry in Gauge Theory of Gravity2009-08-27Paper
Secure Error-Correction Network Coding in a Randomized Setting2009-06-25Paper
Key hierarchies for hierarchical access control in secure group communications2009-03-11Paper
A new approach for UC security concurrent deniable authentication2009-01-26Paper
https://portal.mardi4nfdi.de/entity/Q54531672008-04-04Paper
Theoretical analysis of convective heat transfer of Oldroyd-B fluids in a curved pipe2008-03-11Paper
Universally composable anonymous hash certification model2007-10-12Paper
A meshless integral method based on regularized boundary integral equation2007-10-04Paper
Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms2007-09-14Paper
Galerkin method study on flow of Oldroyd-B fluids in curved circular cross-section pipes2007-09-03Paper
Applied Cryptography and Network Security2007-05-02Paper
Security extension for the Canetti-Krawczyk model in identity-based systems2007-02-20Paper
https://portal.mardi4nfdi.de/entity/Q34225822007-02-13Paper
Research and implementation of total-ordered multicast protocol considering overlapped groups2006-10-04Paper
Computational Science – ICCS 20052005-11-30Paper
Theoretical and numerical analysis of convective heat transfer in the rotating helical pipes.2004-05-27Paper
Using transforming matrices to generate DNA clone grids2003-09-09Paper

Research outcomes over time

This page was built for person: Jian-Feng Ma