Search Results - "Xu, Wanshan"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Identity-based public data integrity verification scheme in cloud storage system via blockchain by Yuan, Yilin, Zhang, Jianbiao, Xu, Wanshan, Li, Zheng

    Published in The Journal of supercomputing (01-04-2022)
    “…Almost all existing data integrity verification schemes upload outsourced files and tags set to the CSP simultaneously. Thus, in this paper, we provide a novel…”
    Get full text
    Journal Article
  2. 2

    CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients by Zhu, Ze, Xu, Wanshan, Xu, Junfeng

    “…Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but…”
    Get full text
    Journal Article
  3. 3

    DESSE: A dynamic efficient forward searchable encryption scheme by Xu, WanShan, Zhang, JianBiao, Yuan, YiLin

    Published in IEEE access (01-01-2020)
    “…Under the cloud computing environment, Searchable Symmetric Encryption (SSE) is an effective method to solve the problem of encrypted data retrieval, and helps…”
    Get full text
    Journal Article
  4. 4

    Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System by Yuan, Yilin, Zhang, Jianbiao, Xu, Wanshan

    Published in IEEE access (2020)
    “…In cloud storage scenarios, data security has received considerably more attention than before. To ensure the reliability and availability of outsourced data…”
    Get full text
    Journal Article
  5. 5

    Towards efficient verifiable multi-keyword search over encrypted data based on blockchain by Xu, Wanshan, Zhang, Jianbiao, Yuan, Yilin, Wang, Xiao, Liu, Yanhui, Khalid, Muhammad Irfan

    Published in PeerJ. Computer science (21-03-2022)
    “…Searchable symmetric encryption (SSE) provides an effective way to search encrypted data stored on untrusted servers. When the server is not trusted, it is…”
    Get full text
    Journal Article
  6. 6

    Symmetric searchable encryption with supporting search pattern and access pattern protection in multi‐cloud by Xu, Wanshan, Zhang, Jianbiao, Yuan, Yilin, Wang, Xiao

    Published in Concurrency and computation (25-04-2023)
    “…Summary Symmetric searchable encryption (SSE) enables users to search the ciphertext stored on the untrusted cloud without revealing the search keywords,…”
    Get full text
    Journal Article
  7. 7

    Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system by Yuan, Yilin, Zhang, Jianbiao, Xu, Wanshan, Li, Zheng

    Published in Concurrency and computation (01-05-2022)
    “…With the popularity of cloud computing, cloud storage technology has also been widely used. Among them, data integrity verification is a hot research topic. At…”
    Get full text
    Journal Article
  8. 8

    Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake by Lv, Kaiqi, Lin, Weiguo, Xu, Junfeng, Xu, Wanshan, Chen, Shuren, Yi, Shengwei

    “…With the increasing development of deepfake in facial editing and the easy accessibility of image and video content on the internet, the security risks of…”
    Get full text
    Conference Proceeding
  9. 9

    Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system by Yuan, Yilin, Zhang, Jianbiao, Xu, Wanshan, Li, Zheng

    “…With the popularity of cloud computing, cloud storage technology has also been widely used. Among them, data integrity verification is a hot research topic. At…”
    Get full text
    Conference Proceeding
  10. 10

    Privacy-preserving Multi-cloud based Dynamic Symmetric Searchable Encryption by Xu, Wanshan, Zhang, Jianbiao, Yuan, Yilin, Li, Zheng

    “…Symmetric searchable encryption (SSE) provides a secure and efficient way for users to search on the encrypted data stored on the cloud. Most of the existing…”
    Get full text
    Conference Proceeding