Zhaofeng Ma
Orcid: 0000-0001-7875-4169
According to our database1,
Zhaofeng Ma
authored at least 30 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
1
2
3
4
5
1
2
3
2
4
2
4
2
1
1
3
4
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2025
2024
IEEE Trans. Inf. Forensics Secur., 2024
Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0.
Comput. Networks, 2024
2023
Cybersecur., December, 2023
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network.
J. Syst. Archit., 2023
DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection.
Concurr. Comput. Pract. Exp., 2023
2022
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022
2021
BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control.
Wirel. Commun. Mob. Comput., 2021
Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment.
IEEE Internet Things J., 2021
2020
IEEE Trans. Ind. Informatics, 2020
Neural Comput. Appl., 2020
Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data.
IEEE Internet Things J., 2020
Comput. Networks, 2020
2019
IEEE Access, 2019
Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography.
IEEE Access, 2019
2018
EURASIP J. Image Video Process., 2018
EURASIP J. Image Video Process., 2018
Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems.
IEEE Access, 2018
2013
Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management.
J. Softw., 2013
J. Comput., 2013
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2005
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
2004
Adaptive Load Balancing and Fault Tolerance in Push-Based Information Delivery Middleware Service.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004
Fail-Stop Authentication Protocol for Digital Rights Management in Adaptive Information Retrieval System.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004
Kernel-Based Semantic Text Categorization for Large Scale Web Information Organization.
Proceedings of the Grid and Cooperative Computing, 2004
Support Vector Machines Learning for Web-Based Adaptive and Active Information Retrieval.
Proceedings of the Advanced Web Technologies and Applications, 2004
2003
Secure Super-distribution Protocol for Digital Rights Management in Unauthentic Network Environment.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003