Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Redactable Blockchain Technology Based on Distributed Key Management and Trusted Execution Environment

    Proponents view the blockchain technology as transformative because its emergence has solved many security problems in the open environment. However, it is necessary to study redactable blockchain in specific ...

    Lisha Liu, Lin Tan, Jun Liu, **g **ao, Haibo Yin in Blockchain and Trustworthy Systems (2021)

  2. No Access

    Chapter and Conference Paper

    A Data Integrity Verification Scheme Based on Blockchain and Blind Homomorphic Tags

    With the advent of big data, users’ data is usually outsourced to the cloud. However, users will lose the absolute control over the data and its integrity is hard to be guaranteed. Currently, the most effectiv...

    Shuai Huang, **g **ao, Hong-liang Mao, Mu-ran Su in Blockchain and Trustworthy Systems (2020)

  3. No Access

    Article

    NaEPASC: a novel and efficient public auditing scheme for cloud data

    Cloud computing is deemed the next-generation information technology (IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applica...

    Shuang Tan, Yan Jia in Journal of Zhejiang University SCIENCE C (2014)

  4. No Access

    Article

    Topology awareness algorithm for virtual network map**

    Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network map** problem (VNMP) is a critical challenge, focusing on how to map the vi...

    **ao-ling Li, Huai-min Wang, Chang-guo Guo in Journal of Zhejiang University SCIENCE C (2012)