default search action
Zhaofeng Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Pengfei Duan, Hongmin Gao, Yushi Shen, Zhetao Guo, Zhaofeng Ma, Tian Tian, Yuqing Zhang:
Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0. Comput. Networks 255: 110851 (2024) - [j18]Yuqing Zhang, Zhaofeng Ma, Shoushan Luo, Pengfei Duan:
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability. IEEE Trans. Inf. Forensics Secur. 19: 821-834 (2024) - 2023
- [j17]Yuqing Zhang, Zhaofeng Ma, Shoushan Luo, Shushuang Wang, Pengfei Duan, Xiao Liu:
DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection. Concurr. Comput. Pract. Exp. 35(21) (2023) - [j16]Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma:
An efficient confidentiality protection solution for pub/sub system. Cybersecur. 6(1): 34 (2023) - [j15]Zhaofeng Ma, Jingyu Wang, Keke Gai, Pengfei Duan, Yuqing Zhang, Shoushan Luo:
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network. J. Syst. Archit. 134: 102782 (2023) - 2022
- [c10]Guoda Wang, Miao Zhang, Yaozong Hu, Zhaofeng Ma:
Keyless Entry Security System based on Gait Context. DSA 2022: 865-869 - 2021
- [j14]Zhaofeng Ma, Jialin Meng, Jihui Wang, Zhiguang Shan:
Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment. IEEE Internet Things J. 8(4): 2116-2123 (2021) - [j13]Hongmin Gao, Zhaofeng Ma, Shoushan Luo, Yanping Xu, Zheng Wu:
BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control. Wirel. Commun. Mob. Comput. 2021: 6658920:1-6658920:20 (2021) - 2020
- [j12]Zhaofeng Ma, Weizhe Zhao, Shoushan Luo, Lingyun Wang:
TrustedBaaS: Blockchain-Enabled Distributed and Higher-Level Trusted Platform. Comput. Networks 183: 107600 (2020) - [j11]Zhaofeng Ma, Lingyun Wang, Wang Xiaochang, Zhen Wang, Weizhe Zhao:
Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data. IEEE Internet Things J. 7(5): 4000-4015 (2020) - [j10]Zhaofeng Ma, Ming Jiang, Weihua Huang:
Trusted forensics scheme based on digital watermark algorithm in intelligent VANET. Neural Comput. Appl. 32(6): 1665-1678 (2020) - [j9]Zhaofeng Ma, Wang Xiaochang, Deepak Kumar Jain, Haneef Khan, Hongmin Gao, Zhen Wang:
A Blockchain-Based Trusted Data Management Scheme in Edge Computing. IEEE Trans. Ind. Informatics 16(3): 2013-2021 (2020)
2010 – 2019
- 2019
- [j8]Hongmin Gao, Zhaofeng Ma, Shoushan Luo, Zhen Wang:
BFR-MPC: A Blockchain-Based Fair and Robust Multi-Party Computation Scheme. IEEE Access 7: 110439-110450 (2019) - [j7]Zhen Wang, Zhaofeng Ma, Shoushan Luo, Hongmin Gao:
Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography. IEEE Access 7: 149080-149096 (2019) - 2018
- [j6]Zhen Wang, Zhaofeng Ma, Shoushan Luo, Hongmin Gao:
Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems. IEEE Access 6: 13706-13715 (2018) - [j5]Zhaofeng Ma, Ming Jiang:
Secure and efficient DRM watermark algorithm of forensics in mobile internet. EURASIP J. Image Video Process. 2018: 69 (2018) - [j4]Zhaofeng Ma, Weihua Huang, Hongmin Gao:
A new blockchain-based trusted DRM scheme for built-in content protection. EURASIP J. Image Video Process. 2018: 91 (2018) - [j3]Zhaofeng Ma, Ming Jiang, Hongmin Gao, Zhen Wang:
Blockchain for digital rights management. Future Gener. Comput. Syst. 89: 746-764 (2018) - 2013
- [j2]Qinlong Huang, Zhaofeng Ma, Jingyi Fu, Xinxin Niu, Yixian Yang:
Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing. J. Comput. 8(11): 2776-2781 (2013) - [j1]Zhaofeng Ma, Jianqing Huang, Yixian Yang, Xinxin Niu:
Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management. J. Softw. 8(6): 1526-1535 (2013)
2000 – 2009
- 2007
- [c9]Zhaofeng Ma, Yixian Yang, Xinxin Niu:
Secure and Flexible Digital Rights Management in a Pervasive Usage Mode. CIS 2007: 863-867 - 2005
- [c8]Peng Fu, Deyun Zhang, Zhaofeng Ma, Hao Dong:
SVM-Based Semantic Text Categorization for Large Scale Web Information Organization. ISNN (1) 2005: 931-936 - [c7]Jizhong Zhao, Yong Qi, Zhaofeng Ma:
Secure Multimedia Streaming with Trusted Digital Rights Management. LCN 2005: 817-821 - [c6]Zhaofeng Ma, Xibin Zhao, Zhi Guo, Ming Gu, Jiaguang Sun:
Secure Anonymous Communication with Conditional Traceability. NPC 2005: 405-408 - 2004
- [c5]Zhaofeng Ma, Boqin Feng:
Support Vector Machines Learning for Web-Based Adaptive and Active Information Retrieval. APWeb 2004: 89-99 - [c4]Xianghua Fu, Zhaofeng Ma, Boqin Feng:
Kernel-Based Semantic Text Categorization for Large Scale Web Information Organization. GCC 2004: 389-396 - [c3]Zhaofeng Ma, Boqin Feng:
Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System. WAIM 2004: 76-86 - [c2]Zhaofeng Ma, Boqin Feng:
Adaptive Load Balancing and Fault Tolerance in Push-Based Information Delivery Middleware Service. WAIM 2004: 733-738 - 2003
- [c1]Zhaofeng Ma, Boqin Feng:
Secure Super-distribution Protocol for Digital Rights Management in Unauthentic Network Environment. GCC (1) 2003: 1039-1042
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint