Maode Ma
Maode Ma
Nanyang Technologial Unniversity
Verified email at
Cited by
Cited by
A survey on security aspects for LTE and LTE-A networks
J Cao, M Ma, H Li, Y Zhang, Z Luo
IEEE communications surveys & tutorials 16 (1), 283-302, 2013
A bandwidth guaranteed polling MAC protocol for Ethernet passive optical networks
M Ma, Y Zhu, TH Cheng
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
A strong user authentication scheme with smart cards for wireless communications
D He, M Ma, Y Zhang, C Chen, J Bu
Computer Communications 34 (3), 367-374, 2011
A survey on MAC protocols for underwater wireless sensor networks
K Chen, M Ma, E Cheng, F Yuan, W Su
IEEE Communications Surveys & Tutorials 16 (3), 1433-1447, 2014
Network lifetime optimization in wireless sensor networks
H Wang, N Agoulmine, M Ma, Y Jin
IEEE Journal on Selected Areas in Communications 28 (7), 1127-1137, 2010
Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds
Y Yang, M Ma
IEEE Transactions on Information Forensics and Security 11 (4), 746-759, 2015
A hybrid load balancing strategy of sequential tasks for grid computing environments
Y Li, Y Yang, M Ma, L Zhou
Future Generation Computer Systems 25 (8), 819-828, 2009
AOA cooperative position localization
J Xu, M Ma, CL Law
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008
A simple and robust handover authentication between HeNB and eNB in LTE networks
J Cao, H Li, M Ma, Y Zhang, C Lai
Computer Networks 56 (8), 2119-2131, 2012
IPACT with grant estimation (IPACT-GE) scheme for Ethernet passive optical networks
Y Zhu, M Ma
Journal of Lightwave Technology 26 (14), 2055-2063, 2008
A smart card based efficient and secured multi-server authentication scheme
B Wang, M Ma
Wireless Personal Communications 68 (2), 361-378, 2013
A QoS oriented vertical handoff scheme for WiMAX/WLAN overlay networks
D Ma, M Ma
IEEE Transactions on Parallel and Distributed Systems 23 (4), 598-606, 2011
UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications
H Guo, Y Wu, F Bao, H Chen, M Ma
IEEE Transactions on Smart Grid 2 (4), 707-714, 2011
Network lifetime maximization with cross-layer design in wireless sensor networks
H Wang, Y Yang, M Ma, J He, X Wang
IEEE Transactions on Wireless Communications 7 (10), 3759-3768, 2008
Position estimation using UWB TDOA measurements
J Xu, M Ma, CL Law
2006 IEEE International Conference on Ultra-Wideband, 605-610, 2006
A group-based authentication and key agreement for MTC in LTE networks
J Cao, M Ma, H Li
2012 IEEE Global Communications Conference (GLOBECOM), 1017-1022, 2012
Design and verification of enhanced secure localization scheme in wireless sensor networks
D He, L Cui, H Huang, M Ma
IEEE transactions on Parallel and Distributed Systems 20 (7), 1050-1058, 2008
Routing and QoS provisioning in cognitive radio networks
KC How, M Ma, Y Qin
Computer Networks 55 (1), 330-342, 2011
An novel three-party authenticated key exchange protocol using one-time key
C Lv, M Ma, H Li, J Ma, Y Zhang
Journal of Network and Computer Applications 36 (1), 498-503, 2013
A survey and projection on medium access control protocols for wireless sensor networks
YZ Zhao, C Miao, M Ma, JB Zhang, C Leung
ACM Computing Surveys (csuR) 45 (1), 1-37, 2012
The system can't perform the operation now. Try again later.
Articles 1–20