【计算机论文全套栏目提醒】:网学会员为广大网友收集整理了,发表的主要论文一览表 - 培训资料,希望对大家有所帮助!
发表的主要论文一览表序号 论文名称 作者 刊物名称 年卷期页 SCIEI收录号 1. A new group signature scheme and its performance Ma JF Yang B Chye CT Alex KC Chinese Journal Of Electronics 2001103 406-410 SCI 2. High order differential attack and trace attack to block ciphers Hu Yupu Chen Kefei Xiao Guozhen Chinese Journal Of Electronics 2001113:382-384 SCI EI:01426690633 3. An efficient and secure fault-tolerant conference-key distribution scheme Guo Yuanbo Ma Jianfeng IEEE Transactions On Consumer Electronics 2004:502: 571-575 SCI 4. A New Authentication Scheme with Anonymity for Wireless Environments Zhu Jianming Ma Jianfeng IEEE Transactions On Consumer Electronics 2004501: 231-235 SCI EI:04188142132 5. Practical secret sharing scheme realizing generalized adversary structure Guo Yuanbo Ma Jianfeng Journal Of Computer Science And Technology 2004:194:564-569 SCI:000222789900015 6. Availability analysis and comparison of different intrusion-tolerant systems Wang Chao Ma Jianfeng Content Computing Proceedings 2004:161-166 SCI:000225784300020 7. A micro-payment scheme for multiple-vendor in m-commerce ZHU Jianming Wang Ninghong MA Jianfeng IEEE International Conference On Ecommerce Technology For Dynamic E-Business 2004 EI:05108872534 8. Shared-key signature and its application to anonymous authentication in ad hoc group Wu Qianhong Chen Xiaofeng Wang Changjie Wang Yumin Information Security Proceedings LNCS 3225. 2004:330-341 SCI:000224324000028 9. A Fault-Tolerant and Secure Multi-Conference-Key Agreement Protocol Shi Tingjun Ma Jianfeng International Conference On Communications Circuits And Systems 2004 EI:05038789964 10. Enhancing the content of the intrusion alerts using logic correlation WANG LM MA Jianfeng ZHAN YZ Advanced Workshop On Content Computing 2004 SCI:000225784300017 11. Proactive secret sharing in asynchronous networks with unreliable links Guo Yuanbo Ma Jianfeng Chinese Journal of Electronics 2004323:399-403 EI: 04288261745 12. Public key cryptosystem based on two cryptographic assumptions Wang Bocang Hu Yupu IEE Proceedings-Communications 2005:1526:861-865 SCI:000234318600015 13. An ID-based broadcast encryption scheme for key distribution” Du Xinjun Wang Ying Ge Jianhua Wang Yumin IEEE Trans. On Broadcasting 2005512:264-266 SCI:000229254500013 14. Security Extension for the Canetti-Krawczyk Model in Identity-based Systems LI Xinghua Jianfeng MA Sangjae MOON Science In China Series F 2005481: 117-124 SCI:000228223600009 15. Intrusion-Tolerant Based Survivable Model of Database System Zhu Jianming Wang Chao Ma Jianfeng Chinese Journal Of Electronics 200514 3: 481-484 SCI:000230509500024 16. A New and Efficient Secret Sharing in Graph-Based Prohibited Structures. Guo Yuanbo Ma Jianfeng. Chinese Journal Of Electronics 2005143: 393-395 SCI:000230509500005 17. Stability of the linear complexity of the generalized self-shrinking sequences Dong Lihua Zeng Yong Hu Yupu Computational Intelligence And Security Pt 2 Proceedings LNAI 3082 2005:68-73E105 SCI:000234874900010 18. Security Analysis on Chinese Wireless LAN Standard and Its Solution Fan Zhang Jianfeng Ma Sangjae Moon Computational Intelligence And S