Jian-Feng Ma

From MaRDI portal
(Redirected from Person:975157)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Beyond volume pattern: storage-efficient Boolean searchable symmetric encryption with suppressed leakage2024-06-05Paper
Additive centralized and Stackelberg DEA models for two‐stage system with shared resources
International Transactions in Operational Research
2023-11-17Paper
Towards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme
Information Sciences
2023-11-09Paper
Human-exoskeleton oscillation model and qualitative analysis of interaction and functional practicality of exoskeletons
Applied Mathematical Modelling
2023-10-13Paper
Bayesian mechanism for rational secret sharing scheme
Science China Information Sciences
2022-10-28Paper
Universally composable secure TNC model and EAP-TNC protocol in IF-T
Science China Information Sciences
2022-10-28Paper
Universally composable secure positioning in the bounded retrieval model
Science China Information Sciences
2022-10-28Paper
A rumor spreading model based on two propagation channels in social networks
Physica A
2022-07-26Paper
scientific article; zbMATH DE number 7478039 (Why is no real title available?)2022-02-22Paper
Operating efficiency assessment of commercial banks with Cooperative-Stackelberg hybrid two-stage DEA
RAIRO - Operations Research
2022-02-21Paper
Adversarial link deception against the link prediction in complex networks
Physica A
2022-01-20Paper
Spectrum privacy preserving for social networks: a personalized differential privacy approach2021-12-08Paper
Privacy-preserving Krawtchouk moment feature extraction over encrypted image data
Information Sciences
2021-11-23Paper
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
Information Sciences
2020-12-10Paper
scientific article; zbMATH DE number 7267169 (Why is no real title available?)2020-10-27Paper
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure
Information and Communications Security
2020-07-20Paper
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud
Information Sciences
2020-02-06Paper
Advance in TLS 1.3 protocol studies2019-09-20Paper
Automated enforcement for relaxed information release with reference points
Science China Information Sciences
2018-11-01Paper
On the control of opinion dynamics in social networks
Physica A
2018-09-20Paper
The postprocessing of quantum digital signatures
Quantum Information Processing
2017-10-24Paper
scientific article; zbMATH DE number 6719494 (Why is no real title available?)2017-05-17Paper
Verifiable Computation over Large Database with Incremental Updates
IEEE Transactions on Computers
2017-05-16Paper
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
IEEE Transactions on Computers
2017-05-16Paper
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains
IEEE Transactions on Computers
2017-05-16Paper
Robust quantum private queries
International Journal of Theoretical Physics
2017-03-28Paper
Privacy-preserving multi-factor key exchange protocol in the standard model2017-01-06Paper
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Nonlinear Dynamics
2016-11-02Paper
Towards efficient fully randomized message-locked encryption
Information Security and Privacy
2016-08-31Paper
A rational framework for secure communication
Information Sciences
2015-09-24Paper
scientific article; zbMATH DE number 6471959 (Why is no real title available?)2015-08-10Paper
Verifiable computation over large database with incremental updates
Computer Security - ESORICS 2014
2015-07-24Paper
Stability analysis of an \textit{e-SEIAR} model with point-to-group worm propagation
Communications in Nonlinear Science and Numerical Simulation
2015-01-29Paper
Efficient algorithms for secure outsourcing of bilinear pairings
Theoretical Computer Science
2014-12-02Paper
A ciphertext-policy weighted attribute based encryption scheme2014-02-28Paper
New algorithms for secure outsourcing of modular exponentiations
Computer Security – ESORICS 2012
2013-10-23Paper
A one-time rational secret sharing scheme based on Bayesian game
Wuhan University Journal of Natural Sciences (WUJNS)
2012-06-01Paper
Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms
Pattern Recognition
2011-11-10Paper
Constructing polynomials for generating pairing-friendly elliptic curves2011-09-29Paper
A study on the flow in helical elliptical pipes with Galerkin method
Journal of Hydrodynamics. Ser. B
2011-03-31Paper
Numerical analysis of the fluid flow in a rotating curved elliptical pipe
Journal of Hydrodynamics. Ser. B
2011-03-10Paper
Laminar developing flow in the entrance region of rotating curved pipes
Journal of Hydrodynamics. Ser. B
2011-01-19Paper
scientific article; zbMATH DE number 5812648 (Why is no real title available?)2010-11-05Paper
Elastoplastic meshless integral method
Computer Methods in Applied Mechanics and Engineering
2010-09-14Paper
An efficient signcryption scheme with forward secrecy2010-07-08Paper
Image analysis by Bessel-Fourier moments
Pattern Recognition
2010-06-08Paper
Local Poincaré Symmetry in Gauge Theory of Gravity
Communications in Theoretical Physics
2009-08-27Paper
Secure Error-Correction Network Coding in a Randomized Setting
Advances in Information Security and Assurance
2009-06-25Paper
Key hierarchies for hierarchical access control in secure group communications
Computer Networks
2009-03-11Paper
A new approach for UC security concurrent deniable authentication
Science in China. Series F
2009-01-26Paper
scientific article; zbMATH DE number 5259998 (Why is no real title available?)2008-04-04Paper
Theoretical analysis of convective heat transfer of Oldroyd-B fluids in a curved pipe
International Journal of Heat and Mass Transfer
2008-03-11Paper
Universally composable anonymous hash certification model
Science in China. Series F
2007-10-12Paper
A meshless integral method based on regularized boundary integral equation
Computer Methods in Applied Mechanics and Engineering
2007-10-04Paper
Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms
Pattern Recognition
2007-09-14Paper
Galerkin method study on flow of Oldroyd-B fluids in curved circular cross-section pipes
Journal of Zhejiang University. Science A
2007-09-03Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Security extension for the Canetti-Krawczyk model in identity-based systems
Science in China. Series F
2007-02-20Paper
scientific article; zbMATH DE number 5125797 (Why is no real title available?)2007-02-13Paper
Research and implementation of total-ordered multicast protocol considering overlapped groups2006-10-04Paper
Computational Science – ICCS 2005
Lecture Notes in Computer Science
2005-11-30Paper
Theoretical and numerical analysis of convective heat transfer in the rotating helical pipes.
International Journal of Heat and Mass Transfer
2004-05-27Paper
Using transforming matrices to generate DNA clone grids
Discrete Applied Mathematics
2003-09-09Paper


Research outcomes over time


This page was built for person: Jian-Feng Ma