Search Results - "Kaiping Xue"
-
1
Virtual Network Function Placement Considering Resource Optimization and SFC Requests in Cloud Datacenter
Published in IEEE transactions on parallel and distributed systems (01-07-2018)“…Network function virtualization (NFV) brings great conveniences and benefits for the enterprises to outsource their network functions to the cloud datacenter…”
Get full text
Journal Article -
2
Virtual network function placement and resource optimization in NFV and edge computing enabled networks
Published in Computer networks (Amsterdam, Netherlands : 1999) (07-04-2019)“…Network function virtualization (NFV) and edge computing (EC) are two promising and innovative technologies to accelerate 5G networks. However, placing the…”
Get full text
Journal Article -
3
Resource Allocation for Energy Harvesting-Powered D2D Communication Underlaying Cellular Networks
Published in IEEE transactions on vehicular technology (01-11-2017)“…Energy harvesting (EH)-powered wireless communications have attracted great attention from both industry and academia. However, the available energy, which…”
Get full text
Journal Article -
4
Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data
Published in IEEE internet of things journal (01-10-2019)“…With the dramatically increasing deployment of the Internet of Things (IoT), remote monitoring of health data to achieve intelligent healthcare has received…”
Get full text
Journal Article -
5
Resource Aware Routing for Service Function Chains in SDN and NFV-Enabled Network
Published in IEEE transactions on services computing (01-07-2021)“…Owing to the Network Function Virtualization (NFV) and Software-Defined Networks (SDN), Service Function Chain (SFC) has become a popular service in SDN and…”
Get full text
Journal Article -
6
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
Published in Journal of computer and system sciences (01-02-2014)“…Traditional password based authentication schemes are mostly considered in single-server environments. They are unfit for the multi-server environments from…”
Get full text
Journal Article -
7
An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks
Published in IEEE transactions on vehicular technology (01-06-2020)“…More and more users are eager to obtain more comprehensive network services without revealing their private information. Traditionally, in order to access a…”
Get full text
Journal Article -
8
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
Published in IEEE transactions on information forensics and security (01-08-2018)“…People endorse the great power of cloud computing, but cannot fully trust the cloud providers to host privacy-sensitive data, due to the absence of…”
Get full text
Journal Article -
9
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
Published in Journal of network and computer applications (01-01-2013)“…Wireless sensor network (WSN) can be deployed in any unattended environment. With the new developed IoT (Internet of Things) technology, remote authorized…”
Get full text
Journal Article -
10
Energy-Aware Cellular Deployment Strategy Under Coverage Performance Constraints
Published in IEEE transactions on wireless communications (01-01-2015)“…The last ten years have witnessed explosive growth in mobile data traffic, which leads to rapid increases in energy consumption of cellular networks. One…”
Get full text
Journal Article -
11
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage
Published in IEEE transactions on information forensics and security (01-11-2019)“…In public cloud storage services, data are outsourced to semi-trusted cloud servers which are outside of data owners' trusted domain. To prevent untrustworthy…”
Get full text
Journal Article -
12
Two-Phase Virtual Network Function Selection and Chaining Algorithm Based on Deep Learning in SDN/NFV-Enabled Networks
Published in IEEE journal on selected areas in communications (01-06-2020)“…With the advances of Software-Defined Networks (SDN) and Network Function Virtualization (NFV), Service Function Chain (SFC) has been becoming a popular…”
Get full text
Journal Article -
13
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage
Published in IEEE transactions on information forensics and security (01-04-2017)“…Data access control is a challenging issue in public cloud storage systems. Ciphertext-policy attribute-based encryption (CP-ABE) has been adopted as a…”
Get full text
Journal Article -
14
A practical quantum designated verifier signature scheme for E-voting applications
Published in Quantum information processing (01-07-2021)“…Although most of the quantum signatures can be verified by a designated receiver, they do not match the classical designated verifier signature since an…”
Get full text
Journal Article -
15
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving
Published in IEEE transactions on information forensics and security (01-07-2017)“…Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for…”
Get full text
Journal Article -
16
PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications
Published in IEEE transactions on consumer electronics (01-02-2018)“…Nowadays, near field communication (NFC) has been widely used in electronic payment, ticketing, and many other areas. NFC security standard requires the use of…”
Get full text
Journal Article -
17
Stochastic Analysis of Optimal Base Station Energy Saving in Cellular Networks with Sleep Mode
Published in IEEE communications letters (01-04-2014)“…In this letter, we study the energy saving problem by switching off some macro Base Stations (BSs) under downlink coverage and uplink power constraints…”
Get full text
Journal Article -
18
BBR-Based Congestion Control and Packet Scheduling for Bottleneck Fairness Considered Multipath TCP in Heterogeneous Wireless Networks
Published in IEEE transactions on vehicular technology (01-01-2021)“…Aiming at improving the performance of Multipath TCP (MPTCP) in heterogeneous wireless network environments, in this paper, by taking the advantages Bottleneck…”
Get full text
Journal Article -
19
Migrating Unfairness Among Subflows in MPTCP With Network Coding for Wired-Wireless Networks
Published in IEEE transactions on vehicular technology (01-01-2017)“…Recently, two new technologies have been introduced into the transport layer. One is network coding, and the other is multipath transmission control protocol…”
Get full text
Journal Article -
20
A Dynamic Secure Group Sharing Framework in Public Cloud Computing
Published in IEEE transactions on cloud computing (01-10-2014)“…With the popularity of group data sharing in public cloud computing, the privacy and security of group sharing data have become two major issues. The cloud…”
Get full text
Journal Article