Items where Author is "Ma, X"

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 45.

Journal article

SALIH, A., MA, X. and PEYTCHEV, E., 2015. New intelligent heuristic algorithm to mitigate security vulnerabilities in IPv6. IJIS International Journal of Information Security, 4. ISSN 2382-2619

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2015. Analysis of security protocols using finite-state machines. International Journal of Advanced Research in Artificial Intelligence (IJARAI), 4 (4), pp. 46-53. ISSN 2165-4069

JIANG, H., ZHAO, D., ZHENG, R. and MA, X., 2015. Construction of pancreatic cancer classifier based on SVM optimized by improved FOA. BioMed Research International, 2015, p. 781023. ISSN 2314-6133

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2014. Modelling and simulation of a biometric identity-based cryptography. International Journal of Advanced Research in Artificial Intelligence (IJARAI), pp. 35-44.

ALABDULATIF, A. and MA, X., 2013. Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard. International Journal for Information Security Research (IJISR), 3 (34), pp. 439-448. ISSN 2042-4639

MA, X., 2013. A framework for proving the correctness of cryptographic protocol properties by linear temporal logic. International Journal of Digital Society (IJDS), 41 (12), pp. 749-757. ISSN 2040-2570

WANG, X., HE, F., MA, X., MAO, C., HODGMAN, C., LU, C. and WU, P., 2011. OsCAND1 is required for crown root emergence in rice. Molecular Plant, 4 (2), pp. 289-299. ISSN 1674-2052

MA, X., 2011. Database deductive access control. Journal of Computers, 6 (5), pp. 1024-1031. ISSN 1796-203X

MA, X., 2010. Resisting tracker attacks by query terms analysis. Key Engineering Materials, 450 (1), pp. 385-388. ISSN 1013-9826

XIA, S., MA, X., YU, L. and PAN, G., 2008. DFT study on chemical adsorption of Zn(II) on γ-MnOOH surfaces. Chemical Journal of Chinese Universities, 29 (9), pp. 1804-1809. ISSN 1005-9040

MA, X. and CHENG, X., 2008. Verifying security protocols by knowledge analysis. International Journal of Security and Networks, 3 (3), pp. 183-192.

SIMPSON, A., POWER, D., RUSSELL, D., SLAYMAKER, M., MOSTEFAOUI, G., MA, X. and WILSON, G., 2008. A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries. Studies in Health Technology and Informatics, 138, pp. 3-12. ISSN 0926-9630

MA, X. and CHENG, X., 2005. Formal verification of merchant registration phase of SETProtocol. International Journal of Automation and Computing, 2005 (2), pp. 155-162.

MA, X. and CHENG, X., 2005. Verifying cryptographic protocols. IEEE Journal of Intelligent Cybernetic Systems, 2005 (1).

CHENG, X., HE, X., MA, X., ZHOU, D., DUAN, P. and ZHONG, S., 2005. An agent based education resource purvey system. Lecture Notes in Computer Science, 3801, pp. 381-386. ISSN 0302-9743

CHENG, X., MA, X., WANG, L. and ZHONG, S., 2005. A mobile agent based spam filter system. Lecture Notes in Computer Science, 3801, pp. 422-427. ISSN 0302-9743

MA, X., YE, Y. and SUN, Y., 2004. An implementation of resource reservation schemein real-time operating system. Journal of the Graduate School of the Chinese Academy of Sciences, 21 (1), pp. 113-118.

Authored book

MA, X., 2004. Free software and open source movement. Kunming: Yunnan University Press.

Chapter in book

SALIH, A., MA, X. and PEYTCHEV, E., 2017. Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6. In: R. BENLAMRI and M. SPARER, eds., Leadership, innovation and entrepreneurship as driving forces of the global economy: proceedings of the 2016 International Conference on Leadership, Innovation and Entrepreneurship (ICLIE). Springer proceedings in business and economics . Cham: Springer, pp. 173-190. ISBN 9783319434339

ALABDULATIF, A., MA, X. and NOLLE, L., 2013. Analysing and attacking the 4-way handshake of IEEE 802.11i standard. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST), London, 9 December 2013. IEEE, pp. 382-387. ISBN 9781908320209

MA, X., 2010. Database deductive access control. In: R. QUI and H. ZHAO, eds., Proceedings of 2010 WASE International Conference on Information Engineering. IEEE, pp. 121-124. ISBN 9780769540801

MA, X., CHENG, X., HUANG, S. and CHENG, M., 2008. Mechanical verification of cryptographic protocols. In: S. HUANG, D. MACCALLUM and D.Z. DU, eds., Network security. Springer.

SIMPSON, A., POWER, D., RUSSELL, D., MOSTEFAOUI, G.K., SLAYMAKER, M., MA, X. and WILSON, G., 2008. The development, testing, and deployment of a web services infrastructure for distributed healthcare delivery and research. In: K.M.D. KHAN and K. KHAN, eds., Managing web services quality: measuring outcomes and effectiveness. Idea Group.

Conference contribution

SALIH, A., MA, X. and PEYTCHEV, E., 2015. Detection and classification of covert channels in IPv6 using enhanced machine learning. In: 2015 International Conference on Computer Technology and Information Systems (ICCTIS’ 2015), Dubai, United Arab Emirates, 13-15 August 2015.

MA, X., 2015. Managing identities in cloud computing environments. In: The Second International Conference on Information Science and Control Engineering, Shanghai, China, April 2015, Shanghai, China.

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2015. A New Biometric ID-Based Cryptography Protocol and Security Analysis Using Petri Nets. In: 6th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016), Singapore, 27-28 July 2015.

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2014. Biometric identity-based cryptography for e-Government environment. In: 2014 Science and Information Conference (SAI), London, 27-29 August 2014, London.

MA, X., 2012. Security concerns in cloud computing. In: The Fourth International Conference on Computational and Information Sciences, Chongqing, China, August 2012, Chongqing, China.

ALABDULATIF, A., MA, X. and NOLLE, L., 2012. A framework for cryptographic protocol analysis using linear temporal logic. In: International Conference on Information Society (i-Society 2012), London, June 2012, London.

RUSSELL, D., POWER, D., SLAYMAKER, M., MOSTEFAOUI, G.K., MA, X. and SIMPSON, A., 2009. On the secure sharing of legacy data. In: 6th International Conference onInformation Technology: New Generations (ITNG 2009), Las Vegas, Nevada, 27-29 April 2009, Las Vegas.

SIMPSON, A., POWER, D., RUSSELL, D., SLAYMAKER, M., MOSTEFAOUI, G.K., MA, X. and WILSON, G., 2008. A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries. In: Proceedings of HealthGrid 2008, Chicago.

MA, X. and CHENG, X., 2006. Syntax, semantics and type theory of a security protocol verification framework. In: IEEE SMC UK-RI Conference on Advances in Cybernetic Systems 2006, Sheffield, September 2006, Sheffield.

MA, X., MCCRINDLE, R. and CHENG, X., 2006. Verifying and fixing password authenticationprotocol. In: Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Network, and Parallel/Distributed Computing (SNPD 2006) and the 2nd ACIS International Workshop on Self-Assembling Wireless Networks (SAWN 2006), Las Vegas.

MA, X. and CHENG, X., 2005. Formal verification of merchant registration phase of SET protocol. In: Proceedings of the 11th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2005), Sheffield.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Knowledge based approach for mechanical lyverifying security protocols. In: The Nineteenth International Joint Conference on Artificial Intelligence (IJCAI 2005), Edinburgh, Scotland, 30 July - 5 August 2005, Edinburgh.

CHENG, X., MA, X., CHENG, M. and HUANG, S.C.H., 2005. Proving secure properties of cryptographic protocols. In: 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), Phoenix, Arizona, 7-9 April 2005, Phoenix, Arizona.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Secrecy proofs of SET purchase request phase. In: Proceedings of the 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Verifying cardholder registration phase in SET protocol. In: Proceedings of the 2005 IEEE SMC UK-RI Conference on Applied Cybernetics (AC2005), London.

CHENG, X., HE, X., MA, X., ZHOU, D., DUAN, P. and ZHONG, S., 2005. An agent based education resource purvey system. In: The 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, 15-19 December 2005, Xi'an, China.

CHENG, X., MA, X., WANG, L. and ZHONG, S., 2005. A mobile agent based spam filter system. In: The 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, 15-19 December 2005, Xi'an, China.

HE, R., ZHONG, S., CHENG, X. and MA, X., 2005. A personalised search engine for Chinese educational resources. In: Proceedings of the 2005 IEEE SMC UK-RI Conference on Applied Cybernetics (AC2005), London.

SUN, P., MA, X., CHENG, X., YU, X. and ZHONG, S., 2004. Knowledge management for e-learning system. In: Proceedings of the 10th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2004), Liverpool.

MA, X. and CHENG, X., 2004. Verifying cryptographic protocols. In: Proceedings of the IEEESMC UK-RI 3rd Conference on Intelligent Cybernetic Systems (ICS'04), Londonderry.

HE, X., MA, X., CHENG, X., YU, X. and ZHONG, S., 2004. A mobile agent based intrusion detection system. In: Proceedings of the 10th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2004), Liverpool.

MA, X. and SUN, Y., 2002. Two effective real-time synchronization protocols in reservation-based real-time systems. In: Proceedings of the 8th Joint International Computer Conference, Ningbo, China.

This list was generated on Sat Nov 18 14:13:33 2017 UTC.