Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges

    Sharding is one of the key technologies of blockchain scalable characteristics widely used in cryptocurrencies, Internet of Things, supply chain management and other fields. It can achieve high performance sca...

    Luyi Zhang, Yujue Wang, Yong Ding, Hai Liang in Blockchain and Trustworthy Systems (2024)

  2. No Access

    Chapter and Conference Paper

    Secure Traffic Data Sharing in UAV-Assisted VANETs

    Aiming at the issues of low comprehensiveness and timeliness of data, difficulty in balancing data anonymity and traceability, and challenges of securely storing massive data in traditional traffic data sharin...

    Yilin Liu, Yujue Wang, Chen Yi, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  3. No Access

    Chapter and Conference Paper

    A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid

    With the development of information and communication technologies, the services provided by smart grid attract more users to join smart grid. However, with the explosive growth of the number of smart meters, ...

    Ya-Nan Cao, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  4. No Access

    Chapter and Conference Paper

    Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain

    The fast expansion of information technology and public concern for personal privacy and security have raised expectations for the authentication process. Although existing anonymous authentication schemes can...

    Weiyou Liang, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  5. No Access

    Chapter and Conference Paper

    Privacy-Preserving Blockchain Supervision with Responsibility Tracking

    Blockchain technology is a strategic technology to support the development of digital economy, which helps to promote data sharing, improve the efficiency of communication and build a trusted system. With the ...

    Baodong Wen, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  6. No Access

    Chapter and Conference Paper

    IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability

    The majority of existing car rental systems rely on a centralized database to manage the data. Although these centralized architectures could make the system design and operation costs are reduced, there are m...

    Lipan Chen, Yujue Wang, Yong Ding, Hai Liang in Database Systems for Advanced Applications (2023)

  7. No Access

    Chapter and Conference Paper

    Study on Path Planning of Multi-storey Parking Lot Based on Combined Loss Function

    Path planning research can effectively solve the problem of finding free parking space in multi-storey parking lots. This paper takes advantage of the decision ability of reinforcement learning and the percept...

    Zhongtian Hu, Jun Yan, Yuli Wang, Changsong Yang in Intelligent Computing Methodologies (2022)

  8. No Access

    Chapter and Conference Paper

    An Illegal Data Supervision Scheme for the Consortium Blockchain

    With the rapid development of blockchain, many enterprise-level applications have used consortium blockchain to ensure the system’s immutability and decentralization. However, due to the immutability of blockc...

    **qin Wang, Kun Zhang, Yong Ding, Fang Yuan in Blockchain Technology and Application (2022)

  9. No Access

    Chapter and Conference Paper

    Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage

    With the rapid development of cloud computing, more and more users are willing to employ cloud storage. As a result, an increasing number of companies invest cloud storage thus provide users with data storage ...

    Changsong Yang, **aoling Tao, Sufang Wang in Wireless Algorithms, Systems, and Applicat… (2020)

  10. No Access

    Chapter and Conference Paper

    New Publicly Verifiable Cloud Data Deletion Scheme with Efficient Tracking

    Cloud storage service, one of the most important services in the cloud computing, can offer high-quality storage service for tenants. By employing the cloud storage service, the resource-constraint data owners...

    Changsong Yang, **aoling Tao in Security with Intelligent Computing and Big-data Services (2020)

  11. No Access

    Chapter and Conference Paper

    A New Outsourced Data Deletion Scheme with Public Verifiability

    In the cloud storage, the data owner will lose the direct control over his outsourced data, and all the operations over the outsourced data may be executed by corresponding remote cloud server, such as cloud d...

    Changsong Yang, **aoling Tao, Feng Zhao in Wireless Algorithms, Systems, and Applicat… (2019)

  12. Chapter and Conference Paper

    Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage

    As one of the most important services in the cloud computing, cloud storage service can provide boundless storage resources for clients. Because of its tremendous advantages, cloud storage service has attracte...

    Changsong Yang, Jianfeng Wang, **aoling Tao in Information and Communications Security (2018)