His main research concerns Computer security, Encryption, Computer network, Cloud computing and Authentication. Challenge–response authentication, Authentication protocol, Mutual authentication, Password and Multi-factor authentication are the core of his Computer security study. His research integrates issues of Security analysis, Cryptographic primitive and Access control in his study of Encryption.
His study in Computer network is interdisciplinary in nature, drawing from both Wireless, Mobile telephony and Internet protocol suite. His work in the fields of Cloud computing, such as Cloud storage, intersects with other areas such as Outsourcing. His Authentication study integrates concerns from other disciplines, such as Smart card and Anonymity.
The scientist’s investigation covers issues in Computer security, Computer network, Encryption, Cloud computing and Distributed computing. His study in Authentication, Security analysis, Access control, Cryptography and Public-key cryptography falls within the category of Computer security. His study in Authentication is interdisciplinary in nature, drawing from both Password and Smart card.
His research in Computer network tackles topics such as Wireless ad hoc network which are related to areas like Mobile ad hoc network. In his research, Verifiable secret sharing is intimately related to Database, which falls under the overarching field of Encryption. His work in the fields of Cloud storage overlaps with other areas such as Outsourcing.
Jianfeng Ma mainly focuses on Computer security, Cloud computing, Encryption, Computer network and Security analysis. In his study, which falls under the umbrella issue of Computer security, Scalability is strongly linked to Social network. The study incorporates disciplines such as Decision tree, Data security, Correctness and Information retrieval in addition to Cloud computing.
His studies in Encryption integrate themes in fields like Information privacy, Overhead, Database and Range query. Jianfeng Ma combines subjects such as Intrusion detection system, Key and Verifiable secret sharing with his study of Computer network. He focuses mostly in the field of Security analysis, narrowing it down to matters related to The Internet and, in some cases, Upload.
Cloud computing, Computer security, Encryption, Security analysis and Computer network are his primary areas of study. The various areas that Jianfeng Ma examines in his Cloud computing study include Data security, Decision tree, Nearest neighbor search, Affinity propagation and Image retrieval. His work on Ciphertext as part of general Computer security study is frequently linked to Incentive, bridging the gap between disciplines.
Jianfeng Ma has included themes like Range query, Information retrieval, Information privacy and Access control in his Encryption study. His Security analysis study combines topics in areas such as Overhead and Blockchain. A large part of his Computer network studies is devoted to Protocol.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Device-to-Device Communication in LTE-Advanced Networks: A Survey
Jiajia Liu;Nei Kato;Jianfeng Ma;Naoto Kadowaki.
IEEE Communications Surveys and Tutorials (2015)
New Algorithms for Secure Outsourcing of Modular Exponentiations
Xiaofeng Chen;Jin Li;Jianfeng Ma;Qiang Tang.
IEEE Transactions on Parallel and Distributed Systems (2014)
Verifiable Computation over Large Database with Incremental Updates
Xiaofeng Chen;Jin Li;Jian Weng;Jianfeng Ma.
IEEE Transactions on Computers (2016)
New Publicly Verifiable Databases with Efficient Updates
Xiaofeng Chen;Jin Li;Xinyi Huang;Jianfeng Ma.
IEEE Transactions on Dependable and Secure Computing (2015)
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
Xiaofeng Chen;Xinyi Huang;Jin Li;Jianfeng Ma.
IEEE Transactions on Information Forensics and Security (2015)
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Qi Jiang;Sherali Zeadally;Jianfeng Ma;Debiao He.
IEEE Access (2017)
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification
Ximeng Liu;Rongxing Lu;Jianfeng Ma;Le Chen.
IEEE Journal of Biomedical and Health Informatics (2016)
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption
Jin Li;Xiaofeng Chen;Jingwei Li;Chunfu Jia.
european symposium on research in computer security (2013)
A privacy preserving three-factor authentication protocol for e-Health clouds
Qi Jiang;Muhammad Khurram Khan;Xiang Lu;Jianfeng Ma.
The Journal of Supercomputing (2016)
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
Sheng Gao;Jianfeng Ma;Weisong Shi;Guoxing Zhan.
IEEE Transactions on Information Forensics and Security (2013)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: