gy Proceedings LNCS 3822 2005:242-253 SCI:000234882000021 33. Efficient Group Key Management for Dynamic Peer Networks Wei Wang Jianfeng Ma Sangjae Moon International Conference On Mobile Ad-Hoc And Sensor Networks Wuhan China LNCS 3794 2005:753-762 SCI:000234715200073 34. Formal Specification of the Intrusion-Tolerant System by Using Object-Z GUO Yuanbo MA Jianfeng Zhang Huanguo Journal of Internet Technology 2006 71: 69-75 35. An Attack on the Identity-based Key Agreement Protocols in Multiple PKG Environment JoongHyo OH SangJae MOON Jianfeng MA IEICE Trans. Fundamentals 2006 E893: 826-829 36. Intrusion Model for Intrusion Tolerance System by Using Capabilities of Attackers Liang-min Wang Jian-feng Ma Chinese Journal of Electronics No.4 2006 37. A bi-encryption-based session key distribution protocol for mobile applications Fan Zhang Jianfeng Ma Sangjae Moon GESTS International Transactions on Communication and Signal Processing Vol.7 No.12006 38. Security Extension for Bresson-Chevassut-Pointchevals Model Chunije Cao Jianfeng Ma SangJae MOON International Journal of Computer Science and Network Security Vol.6 No.1 2006 39. Internet End-to-End Delay Dynamics Zhu Changhua Pei Changxing Li Jiandong Chen Nan Yi Yunhui Journal of Systems Engineering and Electronics Vol.17No.3September 2006pp.685-691 40. A New Method for Resynchronization Attack Chen Jie Wang Baocang Hu Yupu Journal of ElectronicsChina 2006 233 pp.423-427 41. Anonymity Revocable Proxy Signature Scheme Xiaotong Fu and Guozhen Xiao Chinese Journal of Electronics Vol.15 4 2006: 718-720 42. Selection of the linear combing vector G of the generalized self-shrinking generators Dong Lihua Hu Yupu Zeng Yong Journal of Electronics China 2006 Vol.23 No.4 pp. 506-509 43. Traitor Tracing Using Identity Based Public-key Cryptography Lv XixiangYangbo Chinese Journal of Electronics Vol.15 No.4 2006年10月 SCIEi收录 44. Universally composable anonymous Hash certification model Fan Zhang JianFeng Ma SangJae Moon Science in China Series F: Information Sciences 2007 503: 440-455 45. Modeling Intrusion for Intrusion Tolerance System by Correlating Alerts from IDS Sensor Liang-min Wang Jian-feng Ma International Journal of Automation and Control IJAAC No.1 2007 46. Efficient and Secure Group Key Management for High Delay Networks WANG Wei LI Fenghua MA Jianfeng Chinese Journal of Electronics No.4 2007 47. A risk assessment method of the wireless network security Zhao Dongmei Wang Changguang and Ma Jianfeng Chinese Journal of Electronics Vol.24 No.3 2007 48. Digital Rights Management for Home Networks Using ID-based Public Key System and Group Signature Pei Qingqi Ma Jianfeng Dai Jinxiu Chinese Journal of Electronics Vol.16 No.4 2007 49. Perfect Forward Secrecy of Authentication and Key Exchange Protocols in Three Versions of WAPI Chunjie Cao Jianfeng Ma Information Technology Journal 2007 67 50. Distributed sampling measurement method of network traffic in high-speed IPv6 networks Qiao Pan Changxing Pei Journal of Systems Engineering and Electronics v 18 n 4 December 2007 p 835-840 51. Impossible differential cryptanalysis of advanced encryption standard CHEN Jie HU YuPu ZHANG YueYu Science in China Series F 2007 503 pp.342-350 52. On the joint nonlinear span of multiple binary sequence DONG Lihua HU Yupu Chinese Journal of Electronics Apr.2007Vol.16No.2pp.321-325 53. Digital rights management for home networks using ID-based public key system and group signature Pei QingqiMa jianfengDai jinxiuFan kefeng Chinese Journal of Electronics 16 n 4 October 2007 p 653-659 EI:074410894089. ISI:000250398100018 SCI期刊 54. Broadcast Encryption Using Identity-based Cryptosystem Lv XixiangYangbo Chinese Journal of Electronics Vol.16 No.4 2007年10月 SCIEi收录 55. A New Approach for UC Security Concurrent Deniable Authentication FENG Tao Li Feng-hua MA Jian-Feng SangJae MOON Science in China Series F: Information Sciences Vol.51No.42008 56. Lazy Group Key Updating Scheme Based on Dynamic Tree WANG Wei LI Fenghua MA Jianfeng. Chinese Journal of Electronics No.2 2008 57. Action-Based Access Control Model LI Fenghua WANG Wei MA Jianfeng and SangJae Moon. Chinese Journal of Electronics No.3 2008 58. 基于身份密码系统下Canetti-Krawczyk模型的安全扩展 李兴华 中国科学E辑 200410 59. 通用可组合的匿名HASH认证模型 张帆马建峰文相在 中国科学E辑:信息科学 2007年02期 60. 不可能差分分析高级加密标准 陈杰胡予濮张跃宇 中国科学E辑 2007372pp.191-198 61. UC安全的并行可否认认证新方法 冯涛 李凤华 马建峰 文相在 中国科学E辑信息科学 Vol.38 No.62008 62. 一种多分辨率高维图像特征匹配算法 崔江涛刘卫光周利华 光子学报 2005341138141 EI05108876186 63. 一种新的RBAC角色协同关系及其Petri网模型 王小明 电子学报 20032 64. 异步及不可靠链路环境下的先应式秘密共享 郭渊博马建峰 电子学报 2004 323: 399-403 EI:04288261745 65. 门限多重秘密共享方案 许春香 肖国镇 电子学报 2004:32101688-16891687 EI: 05038797284 66. 一种针对H.264的快速编码模式选择算法 吴菊英 电子学报 20053 67. 矢量空间秘密共享-多重签名方案 许春香 电子学报 20056 68. 无线传感器网络拓扑的容错度和容侵度 王良民 马建峰 王 超 电子学报 348 2006 69. 自相关性和线性复杂度的关系 高军涛胡予濮李雪莲 电子学报 20063481401-1404 70. 确定GFqm上周期为2n的二元序列的2-adic复杂度的快速算法 董丽华 胡予濮 电子学报 2007 Vol.12A No.2 71. UC安全的高效不经意传输协议 冯涛 马建峰 李凤华 电子学报 No.1 2008 72. 门限Byzantine quorum系统及其在分布式存储中的应用 张 薇马建峰王良民郭渊博 电子学报 No.2 2008 73. 基于二次噪声检测和细节保护规则函数的图像滤波算法 王晅 毕秀丽马建峰 电子学报 No.2 2008 74. 有限负载下802.11DCF性能分析及优化 杨卫东马建峰裴庆祺 电子学报 No.8 2008 75. 基于数字滤波的计算机视频信息防泄漏研究 邱扬魏丽丽田锦陈光达 电子学报 Vol. 36 No.62008 76. 基于抖动及图像融合的计算机视频信息防泄漏研究 邱扬闫美云经纬田锦 电子学报 Vol.36 No.122008 77. “Turbo的矩阵描述及其对交织器设计的影响” 王莹李晖 王育民 计算机学报 20032610:1400-1403 78. 可证明安全的基于802111i 的漫游认
上一篇:
毕业设计论文
下一篇:
ASP小区停车管理系统的设计与实现(Access)(含录像)