Zobrazeno 1 - 10
of 158
pro vyhledávání: '"Huaqun Wang"'
Autor:
Zhiwang HE, Huaqun WANG
Publikováno v:
网络与信息安全学报, Vol 9, Pp 127-137 (2023)
Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts
Externí odkaz:
https://doaj.org/article/8f30aa40f3484cac8c15e0abb165b32c
Publikováno v:
Tongxin xuebao, Vol 42, Pp 52-60 (2021)
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of I
Externí odkaz:
https://doaj.org/article/9174dd7a8caa4369a4af31d8a468fb3a
Publikováno v:
IEEE Access, Vol 8, Pp 2258-2271 (2020)
Ensuring the integrity of outsourced data is one of several functional requirements in cloud storage services, although designing an effective and secure public auditing scheme remains an ongoing research challenge. For example, a number of existing
Externí odkaz:
https://doaj.org/article/0f8d84ebc3b14900b9c61c142ae8b2f2
Publikováno v:
IEEE Access, Vol 7, Pp 136704-136719 (2019)
The sharing of electronic health records (EHRs) has great positive significance for research of disease and doctors' diagnosis. In recent years, cloud-based electronic medical record sharing scheme has brought a lot of conveniences, but the centraliz
Externí odkaz:
https://doaj.org/article/56a3bf6b759c46a7a27d65cce2b20e2c
Autor:
Huaqun Wang
Publikováno v:
IEEE Access, Vol 6, Pp 27818-27826 (2018)
In the past few years, cloud computing develops very quickly. A large amount of data are uploaded and stored in remote public cloud servers which cannot fully be trusted by users. Especially, more and more enterprises would like to manage their data
Externí odkaz:
https://doaj.org/article/906b773ab61f45fa9b68900252ea6fd4
Publikováno v:
IEEE Access, Vol 5, Pp 393-405 (2017)
Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users' attributes may be issued by multiple attribute authorities, m
Externí odkaz:
https://doaj.org/article/3d1d2c5d57bf4411b20755a3e17aeb60
Publikováno v:
Symmetry, Vol 9, Iss 11, p 285 (2017)
Due to the rapid development of wireless charging technology, the recharging issue in wireless rechargeable sensor network (WRSN) has been a popular research problem in the past few years. The weakness of previous work is that charging route planning
Externí odkaz:
https://doaj.org/article/696bc456c4e248aa9640946a88a46118
Publikováno v:
IEEE Transactions on Intelligent Vehicles. 8:2998-3011
Publikováno v:
IEEE Transactions on Services Computing. :1-14
Publikováno v:
IEEE Systems Journal. 16:5741-5752