Search Results - "Kaiping Xue"

Refine Results
  1. 1

    Virtual Network Function Placement Considering Resource Optimization and SFC Requests in Cloud Datacenter by Li, Defang, Hong, Peilin, Xue, Kaiping, Pei, Jianing

    “…Network function virtualization (NFV) brings great conveniences and benefits for the enterprises to outsource their network functions to the cloud datacenter…”
    Get full text
    Journal Article
  2. 2

    Virtual network function placement and resource optimization in NFV and edge computing enabled networks by Li, Defang, Hong, Peilin, Xue, Kaiping, Pei, Jianing

    “…Network function virtualization (NFV) and edge computing (EC) are two promising and innovative technologies to accelerate 5G networks. However, placing the…”
    Get full text
    Journal Article
  3. 3

    Resource Allocation for Energy Harvesting-Powered D2D Communication Underlaying Cellular Networks by Luo, Ying, Hong, Peilin, Su, Ruolin, Xue, Kaiping

    Published in IEEE transactions on vehicular technology (01-11-2017)
    “…Energy harvesting (EH)-powered wireless communications have attracted great attention from both industry and academia. However, the available energy, which…”
    Get full text
    Journal Article
  4. 4

    Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data by Xu, Jie, Xue, Kaiping, Li, Shaohua, Tian, Hangyu, Hong, Jianan, Hong, Peilin, Yu, Nenghai

    Published in IEEE internet of things journal (01-10-2019)
    “…With the dramatically increasing deployment of the Internet of Things (IoT), remote monitoring of health data to achieve intelligent healthcare has received…”
    Get full text
    Journal Article
  5. 5

    Resource Aware Routing for Service Function Chains in SDN and NFV-Enabled Network by Pei, Jianing, Hong, Peilin, Xue, Kaiping, Li, Defang

    Published in IEEE transactions on services computing (01-07-2021)
    “…Owing to the Network Function Virtualization (NFV) and Software-Defined Networks (SDN), Service Function Chain (SFC) has become a popular service in SDN and…”
    Get full text
    Journal Article
  6. 6

    A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture by Xue, Kaiping, Hong, Peilin, Ma, Changsha

    Published in Journal of computer and system sciences (01-02-2014)
    “…Traditional password based authentication schemes are mostly considered in single-server environments. They are unfit for the multi-server environments from…”
    Get full text
    Journal Article
  7. 7

    An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks by Xu, Jie, Xue, Kaiping, Tian, Hangyu, Hong, Jianan, Wei, David S. L., Hong, Peilin

    Published in IEEE transactions on vehicular technology (01-06-2020)
    “…More and more users are eager to obtain more comprehensive network services without revealing their private information. Traditionally, in order to access a…”
    Get full text
    Journal Article
  8. 8

    Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage by Xue, Kaiping, Chen, Weikeng, Li, Wei, Hong, Jianan, Hong, Peilin

    “…People endorse the great power of cloud computing, but cannot fully trust the cloud providers to host privacy-sensitive data, due to the absence of…”
    Get full text
    Journal Article
  9. 9

    A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks by Xue, Kaiping, Ma, Changsha, Hong, Peilin, Ding, Rong

    “…Wireless sensor network (WSN) can be deployed in any unattended environment. With the new developed IoT (Internet of Things) technology, remote authorized…”
    Get full text
    Journal Article
  10. 10

    Energy-Aware Cellular Deployment Strategy Under Coverage Performance Constraints by Peng, Jinlin, Hong, Peilin, Xue, Kaiping

    “…The last ten years have witnessed explosive growth in mobile data traffic, which leads to rapid increases in energy consumption of cellular networks. One…”
    Get full text
    Journal Article
  11. 11

    An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage by Yingjie Xue, Kaiping Xue, Na Gai, Jianan Hong, Wei, David S. L., Peilin Hong

    “…In public cloud storage services, data are outsourced to semi-trusted cloud servers which are outside of data owners' trusted domain. To prevent untrustworthy…”
    Get full text
    Journal Article
  12. 12

    Two-Phase Virtual Network Function Selection and Chaining Algorithm Based on Deep Learning in SDN/NFV-Enabled Networks by Pei, Jianing, Hong, Peilin, Xue, Kaiping, Li, Defang, Wei, David S. L., Wu, Feng

    “…With the advances of Software-Defined Networks (SDN) and Network Function Virtualization (NFV), Service Function Chain (SFC) has been becoming a popular…”
    Get full text
    Journal Article
  13. 13

    RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage by Kaiping Xue, Yingjie Xue, Jianan Hong, Wei Li, Hao Yue, Wei, David S. L., Peilin Hong

    “…Data access control is a challenging issue in public cloud storage systems. Ciphertext-policy attribute-based encryption (CP-ABE) has been adopted as a…”
    Get full text
    Journal Article
  14. 14

    A practical quantum designated verifier signature scheme for E-voting applications by Zheng, Mengce, Xue, Kaiping, Li, Shangbin, Yu, Nenghai

    Published in Quantum information processing (01-07-2021)
    “…Although most of the quantum signatures can be verified by a designated receiver, they do not match the classical designated verifier signature since an…”
    Get full text
    Journal Article
  15. 15

    Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving by Xue, Kaiping, Li, Shaohua, Hong, Jianan, Xue, Yingjie, Yu, Nenghai, Hong, Peilin

    “…Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for…”
    Get full text
    Journal Article
  16. 16

    PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications by Xu, Jie, Xue, Kaiping, Yang, Qingyou, Hong, Peilin

    Published in IEEE transactions on consumer electronics (01-02-2018)
    “…Nowadays, near field communication (NFC) has been widely used in electronic payment, ticketing, and many other areas. NFC security standard requires the use of…”
    Get full text
    Journal Article
  17. 17

    Stochastic Analysis of Optimal Base Station Energy Saving in Cellular Networks with Sleep Mode by Peng, Jinlin, Hong, Peilin, Xue, Kaiping

    Published in IEEE communications letters (01-04-2014)
    “…In this letter, we study the energy saving problem by switching off some macro Base Stations (BSs) under downlink coverage and uplink power constraints…”
    Get full text
    Journal Article
  18. 18

    BBR-Based Congestion Control and Packet Scheduling for Bottleneck Fairness Considered Multipath TCP in Heterogeneous Wireless Networks by Wei, Wenjia, Xue, Kaiping, Han, Jiangping, Xing, Yitao, Wei, David S. L., Hong, Peilin

    Published in IEEE transactions on vehicular technology (01-01-2021)
    “…Aiming at improving the performance of Multipath TCP (MPTCP) in heterogeneous wireless network environments, in this paper, by taking the advantages Bottleneck…”
    Get full text
    Journal Article
  19. 19

    Migrating Unfairness Among Subflows in MPTCP With Network Coding for Wired-Wireless Networks by Xue, Kaiping, Han, Jiangping, Zhang, Hong, Chen, Ke, Hong, Peilin

    Published in IEEE transactions on vehicular technology (01-01-2017)
    “…Recently, two new technologies have been introduced into the transport layer. One is network coding, and the other is multipath transmission control protocol…”
    Get full text
    Journal Article
  20. 20

    A Dynamic Secure Group Sharing Framework in Public Cloud Computing by Xue, Kaiping, Hong, Peilin

    Published in IEEE transactions on cloud computing (01-10-2014)
    “…With the popularity of group data sharing in public cloud computing, the privacy and security of group sharing data have become two major issues. The cloud…”
    Get full text
    Journal Article