马建峰
个人信息:Personal Information
教授
主要任职:网络空间安全学部主任、综合业务网理论与关键技术国家重点实验室首席科学家(安全领域)
其他任职:网络与系统安全陕西省重点实验室主任
性别:男
毕业院校:西安电子科技大学
学历:博士研究生毕业
学位:工学博士学位
在职信息:在岗
所在单位:网络与信息安全学院
入职时间:1995-03-01
学科:计算机系统结构 网络空间安全
办公地点:西安电子科技大学北校区新科技楼1003
联系方式:02988204750 jfma@mail.xidian.edu.cn
电子邮箱:
扫描关注
- [1]VCSE.Peer-to-Peer Networking and Applications.2017,10 (4):995-1007
- [2]Research on time petri net oriented UML statechart and its application.ICIC Express Letters.2015,9 (3):929-935
- [3]LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment.KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS.2016,10 (2):914-934
- [4]Stability analysis of an e-SEIAR model with point-to-group worm propagation.COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION.2015,20 (3):897-904
- [5]Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.COMPUTERS & ELECTRICAL ENGINEERING.2016,56 :871-883
- [6]Fingerprint optimization method for the indoor localization system.Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University.2015,42 (6):81-87
- [7]MCTE: a trust evaluation model for multiple context in social networks.Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University.2015,49 (4):73-77 and 10
- [8]A new proxy re-encryption scheme for protecting critical information systems.JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING.2015,6 (6):699-711
- [9]Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification.IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS.2016,20 (2):655-668
- [10]Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.INFORMATION TECHNOLOGY AND CONTROL.2016,45 (1):62-70
- [11]Measuring the risk value of sensitive dataflow path in Android applications.SECURITY AND COMMUNICATION NETWORKS.2016,9 (18):5918-5933
- [12]Trust recommendation algorithm for the virtual community based Internet of Things(IoT).Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University.2015,42 (2):52-57 and 17
- [13]A security quantitative analysis method for access control based on security entropy.International Journal of Network Security.2015,17 (5):517-521
- [14]Game theory based trust management method for mobile ad hoc networks.Tongxin Xuebao/Journal on Communications.2014,35 (11):50-58
- [15]Large universe decentralized key-policy attribute-based encryption.SECURITY AND COMMUNICATION NETWORKS.2015,8 (3):501-509
- [16]Publicly verifiable databases with efficient insertion/deletion operations.Journal of Computer and System Sciences.2017,86 :49-58
- [17]Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.SECURITY AND COMMUNICATION NETWORKS.2015,8 (18):4098-4109
- [18]Attack on an ID-based authenticated group key exchange protocol with identifying malicious participants.International Journal of Network Security.2016,18 (2):393-396
- [19]Towards secure P2P network: Degenerated node identification and evaluation.Open Cybernetics and Systemics Journal.2014,8 (1):371-377
- [20]Towards secure P2P network.Open Cybernetics and Systemics Journal.2014,8 (1):371-377