Browsing by Author Ma, Maode

Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 76 to 95 of 105 < previous   next >
Issue DateTitleAuthor(s)
 2012QoS guaranteed resource block allocation algorithm in LTE downlinkZhao, Liqun; Qin, Yang; Ma, Maode; Zhong, Xiaoxiong; Li, Li
 2012A QoS oriented vertical handoff scheme for WiMAX/WLAN overlay networksMa, Dong; Ma, Maode
 2015QoS provisioning by power control for video communication via satellite linksMa, Ting; Lee, Yee Hui; Winkler, Stefan; Ma, Maode
2019Research on detection and defense mechanisms of DoS attacks based on BP neural network and game theoryGao, Lijun; Li, Yanting; Zhang, Lu; Lin, Feng; Ma, Maode
 2012Scalable and efficient key management for mobile WiMAX networksSadeghi, Mohammad Mehdi Gilanian; Ali, Borhanuddin Mohd; Ma, Maode; Manan, Jamalul-lail Ab
2018A secure and efficient message authentication scheme for vehicular networks based on LTE-VXu, Cheng; Huang, Xiaohong; Ma, Maode; Bao, Hong
 2013A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networksHe, Daojing; Chen, Chun; Ma, Maode; Chan, Sammy; Bu, Jiajun
 2018Secure group mobility support for 6LoWPAN networksQiu, Yue; Ma, Maode
2019Secure RFID authentication schemes based on security analysis and improvements of the USI protocolGao, Lijun; Zhang, Lu; Lin, Feng; Ma, Maode
 2012Securing wireless mesh networks in a unified security framework with corruption-resilienceWang, Ze; Ma, Maode; Wu, Jigang
 2011A security enhanced authentication and key distribution protocol for wireless networksLv, Chao; Ma, Maode; Li, Hui; Ma, Jianfeng; Niu, Ben
 2011Security enhancement of the communication-efficient AUTHMAC_DH protocolsLv, Chao; Ma, Maode; Li, Hui; Ma, Jianfeng; Niu, Ben
 2012A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systemsShu, Yantai; Gao, Lijun; Ma, Maode; Wei, Yuhua
2016Semantic Searchable Encryption Scheme based on Lattice in Quantum-eraYang, Yang; Ma, Maode
 2012A server independent authentication scheme for RFID systemsWang, Bin; Ma, Maode
 2012A simple and robust handover authentication between HeNB and eNB in LTE networksCao, Jin; Li, Hui; Ma, Maode; Zhang, Yueyu; Lai, Chengzhe
2003Simulation study on the performance of MAC protocols on wireless networksGoh, Roney Boon Hui.
2003Simulation study on the performance of MAC protocols on wireless networksTan, Siok Ching.
 2012A smart card based efficient and secured multi-server authentication schemeWang, Bin; Ma, Maode
 2020Storage and access optimization scheme based on correlation probabilities in the internet of vehiclesBin, Zhou; Yao, Yuhao; Liu, Xiao; Zhu, Rongbo; Sangaiah, Arun Kumar; Ma, Maode