![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Redactable Blockchain Technology Based on Distributed Key Management and Trusted Execution Environment
Proponents view the blockchain technology as transformative because its emergence has solved many security problems in the open environment. However, it is necessary to study redactable blockchain in specific ...
-
Chapter and Conference Paper
A Data Integrity Verification Scheme Based on Blockchain and Blind Homomorphic Tags
With the advent of big data, users’ data is usually outsourced to the cloud. However, users will lose the absolute control over the data and its integrity is hard to be guaranteed. Currently, the most effectiv...
-
Article
NaEPASC: a novel and efficient public auditing scheme for cloud data
Cloud computing is deemed the next-generation information technology (IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applica...
-
Article
Topology awareness algorithm for virtual network map**
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network map** problem (VNMP) is a critical challenge, focusing on how to map the vi...