Zhaofeng Ma

Orcid: 0000-0001-7875-4169

According to our database1, Zhaofeng Ma authored at least 28 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability.
IEEE Trans. Inf. Forensics Secur., 2024

2023
An efficient confidentiality protection solution for pub/sub system.
Cybersecur., December, 2023

Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network.
J. Syst. Archit., 2023

DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection.
Concurr. Comput. Pract. Exp., 2023

2022
Keyless Entry Security System based on Gait Context.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

2021
BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control.
Wirel. Commun. Mob. Comput., 2021

Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment.
IEEE Internet Things J., 2021

2020
A Blockchain-Based Trusted Data Management Scheme in Edge Computing.
IEEE Trans. Ind. Informatics, 2020

Trusted forensics scheme based on digital watermark algorithm in intelligent VANET.
Neural Comput. Appl., 2020

Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data.
IEEE Internet Things J., 2020

TrustedBaaS: Blockchain-Enabled Distributed and Higher-Level Trusted Platform.
Comput. Networks, 2020

2019
BFR-MPC: A Blockchain-Based Fair and Robust Multi-Party Computation Scheme.
IEEE Access, 2019

Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography.
IEEE Access, 2019

2018
Blockchain for digital rights management.
Future Gener. Comput. Syst., 2018

Secure and efficient DRM watermark algorithm of forensics in mobile internet.
EURASIP J. Image Video Process., 2018

A new blockchain-based trusted DRM scheme for built-in content protection.
EURASIP J. Image Video Process., 2018

Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems.
IEEE Access, 2018

2013
Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management.
J. Softw., 2013

Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing.
J. Comput., 2013

2007
Secure and Flexible Digital Rights Management in a Pervasive Usage Mode.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2005
Secure Anonymous Communication with Conditional Traceability.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Secure Multimedia Streaming with Trusted Digital Rights Management.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

SVM-Based Semantic Text Categorization for Large Scale Web Information Organization.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

2004
Adaptive Load Balancing and Fault Tolerance in Push-Based Information Delivery Middleware Service.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

Kernel-Based Semantic Text Categorization for Large Scale Web Information Organization.
Proceedings of the Grid and Cooperative Computing, 2004

Support Vector Machines Learning for Web-Based Adaptive and Active Information Retrieval.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Secure Super-distribution Protocol for Digital Rights Management in Unauthentic Network Environment.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...