Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ma Zhuo is active.

Publication


Featured researches published by Ma Zhuo.


China Communications | 2015

A trust management scheme based on behavior feedback for opportunistic networks

Chen Xi; Sun Liang; Ma Jianfeng; Ma Zhuo

In the harsh environment where node density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering most of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of “Identity Trust” relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the “Behavior Trust” relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the delivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.


Archive | 2013

Cloud storage access control system based on attribute

Li Chennan; Ma Jianfeng; Wang Lei; Ma Zhuo; Niu Dehua


Archive | 2013

Extensible access control markup language (XACML) strategy assessment engine system based on various optimization mechanisms

Niu Dehua; Ma Jianfeng; Ma Zhuo; Wang Lei; Li Chennan


Archive | 2014

Automatic secure protocol code implementation system based on extensive markup language (XML) description

Li Xinghua; Li Shuaituan; Li Deng; Ma Jianfeng; Li Guangsong; Ma Zhuo; Jiang Qi; Zhang Junwei; Shang Zhaohui


Archive | 2017

Method of router-level network topology inference

Li Bingyan; Jiang Qi; Lian Xinxin; Ma Zhuo; Yang Li; Zhang Junwei; Li Xinghua; Ma Jianfeng


Archive | 2017

Ciphertext data sharing system in cloud computing environment

Ma Zhuo; Ren Hengjian; Ma Jianfeng; Zhang Meng; Wang Yanan


Archive | 2016

Cloud platform based virtual machine resource security monitoring and risk preprocessing system

Ma Zhuo; Zheng Tianxiang; Jiang Qi; Tong Yue; Zhang Junwei; Ma Jianfeng; Wang Kui; Zhang Meng


Archive | 2016

Space-information-network cross-domain end-to-end secret key exchange method

Zhang Junwei; Long Ben; Ma Jianfeng; Li Xinghua; Ma Zhuo; Jiang Qi; Li Chen


Archive | 2016

Node certificate issuing method based on satellite network security domains

Ma Zhuo; Che Zhuowen; Jiang Qi; Ma Jianfeng; Zhang Junwei; Wang Yanan; Ren Hengjian; Zhang Meng


Archive | 2015

System and method for recording and recovering checking point in distributed environment

Ma Jianfeng; Meng Yuan; Li Jinku; Yao Qingsong; Ma Zhuo

Collaboration


Dive into the Ma Zhuo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yang Li

Civil Aviation University of China

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge