Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A New Outsourced Data Deletion Scheme with Public Verifiability

    In the cloud storage, the data owner will lose the direct control over his outsourced data, and all the operations over the outsourced data may be executed by corresponding remote cloud server, such as cloud d...

    Changsong Yang, **aoling Tao, Feng Zhao in Wireless Algorithms, Systems, and Applicat… (2019)

  2. No Access

    Chapter and Conference Paper

    Secure Traffic Data Sharing in UAV-Assisted VANETs

    Aiming at the issues of low comprehensiveness and timeliness of data, difficulty in balancing data anonymity and traceability, and challenges of securely storing massive data in traditional traffic data sharin...

    Yilin Liu, Yujue Wang, Chen Yi, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  3. No Access

    Chapter and Conference Paper

    A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid

    With the development of information and communication technologies, the services provided by smart grid attract more users to join smart grid. However, with the explosive growth of the number of smart meters, ...

    Ya-Nan Cao, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  4. No Access

    Chapter and Conference Paper

    Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain

    The fast expansion of information technology and public concern for personal privacy and security have raised expectations for the authentication process. Although existing anonymous authentication schemes can...

    Weiyou Liang, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)

  5. No Access

    Chapter and Conference Paper

    Privacy-Preserving Blockchain Supervision with Responsibility Tracking

    Blockchain technology is a strategic technology to support the development of digital economy, which helps to promote data sharing, improve the efficiency of communication and build a trusted system. With the ...

    Baodong Wen, Yujue Wang, Yong Ding in Collaborative Computing: Networking, Appli… (2024)