Jinhua Ma

According to our database1, Jinhua Ma authored at least 11 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Authenticated Data Redaction with Fine-Grained Control.
IEEE Trans. Emerg. Top. Comput., 2020

A universal designated multi verifiers content extraction signature scheme.
Int. J. Comput. Sci. Eng., 2020

A Blockchain-Based Application System for Product Anti-Counterfeiting.
IEEE Access, 2020

An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Data Authentication with Privacy Protection.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018

2017
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017

An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2015
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies.
Inf., 2015

Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network.
Inf., 2015


  Loading...