Ma Jian-feng

Learn More
Access control is a critical security service in sensor networks. Sensor networks provide the query service of the environmental monitoring data as the service provider to the users. The current access control scheme based on public key cryptography is high in expenses, and difficult to resist replay and DoS attacks. This paper proposes several effective(More)
The hierarchical threat model is proposed to address the issues that the active-n-m attacker model can’t reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and(More)
An integrated fault tolerant approach for data encryption and digital signature based on elliptic curve cryptography is proposed. This approach allows the receiver to verify the sender's identity and can simultaneously deal with error detection and data correction. Up to three errors in our approach can be detected and corrected. This approach has at least(More)
To solve the problem of the alert flooding and information semantics in the existing Intrusion Detection System(IDS), we present a two-stage algorithm for correlating the alerts. In the first stage, the high-level alerts is integrated by using the Chronicle patterns based on time intervals, which describe and match the alerts with the temporal time(More)
This paper proposes two proactive recovery mechanisms, i.e., periodic grouped proactive recovery and annular proactive recovery. The periodic grouped proactive recovery divides the replicas into groups and each group recover periodically in round. The annular proactive recovery adopts a kind of annular system structure and recovers the replicas dynamically.(More)
A new approach and an idea for exploration are presented to the concurrent deniable authentication based on witness-indistinguishable (WI) within the framework of universally composable (UC) security. A definition of an ideal functionality for deniable authentication is formulated. A new deniable authentication protocol is proposed based on two primitives(More)
Multi-stakeholders' cooperation is crucial to the emergency management for water disaster(WDEM). In order to discuss the cooperation problem, the paper mainly includes following aspects: (1) the network of heterogeneous agents about WDEM was built and game relationships among heterogeneous agents were analyzed; (2) the influence of behavioral strategies -(More)
A secret sharing scheme for generalized adversary structure is a method of sharing a secret among a finite set of participants in such a way that only certain pre-specified subsets of participants cannot recover the secret. This paper proposes an efficient secret sharing scheme realizing the generalized adversary structure, and proves that the scheme(More)
Recently, Hung-Yu Chien has proposed a new approach to authorization and authentication in distributed environments which has some merits, such as one registration for many services, etc. However, this approach requires the registration server to maintain all users' warrants and proxy keys, thus presenting an attractive target to attackers. An(More)
  • 1