Mimi Ma

Orcid: 0000-0001-5711-1850

According to our database1, Mimi Ma authored at least 14 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
PDCF-DRL: a contention window backoff scheme based on deep reinforcement learning for differentiating access categories.
J. Supercomput., January, 2025

2023
Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023

2021
CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things.
IEEE Internet Things J., 2021

2020
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT.
Wirel. Commun. Mob. Comput., 2020

Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
J. Inf. Secur. Appl., 2020

Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine.
J. Inf. Secur. Appl., 2020

An improved mutual authentication protocol based on perfect forward secrecy for satellite communications.
Int. J. Satell. Commun. Netw., 2020

2019
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019

Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things.
Ann. des Télécommunications, 2019

Attribute-Based Keyword Search from Lattices.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC.
Peer-to-Peer Netw. Appl., 2018

Certificateless searchable public key encryption scheme for mobile healthcare system.
Comput. Electr. Eng., 2018


  Loading...