Search Results - "Xu, Wanshan"
-
1
Identity-based public data integrity verification scheme in cloud storage system via blockchain
Published in The Journal of supercomputing (01-04-2022)“…Almost all existing data integrity verification schemes upload outsourced files and tags set to the CSP simultaneously. Thus, in this paper, we provide a novel…”
Get full text
Journal Article -
2
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients
Published in Journal of King Saud University. Computer and information sciences (01-07-2024)“…Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but…”
Get full text
Journal Article -
3
DESSE: A dynamic efficient forward searchable encryption scheme
Published in IEEE access (01-01-2020)“…Under the cloud computing environment, Searchable Symmetric Encryption (SSE) is an effective method to solve the problem of encrypted data retrieval, and helps…”
Get full text
Journal Article -
4
Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System
Published in IEEE access (2020)“…In cloud storage scenarios, data security has received considerably more attention than before. To ensure the reliability and availability of outsourced data…”
Get full text
Journal Article -
5
Towards efficient verifiable multi-keyword search over encrypted data based on blockchain
Published in PeerJ. Computer science (21-03-2022)“…Searchable symmetric encryption (SSE) provides an effective way to search encrypted data stored on untrusted servers. When the server is not trusted, it is…”
Get full text
Journal Article -
6
Symmetric searchable encryption with supporting search pattern and access pattern protection in multi‐cloud
Published in Concurrency and computation (25-04-2023)“…Summary Symmetric searchable encryption (SSE) enables users to search the ciphertext stored on the untrusted cloud without revealing the search keywords,…”
Get full text
Journal Article -
7
Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system
Published in Concurrency and computation (01-05-2022)“…With the popularity of cloud computing, cloud storage technology has also been widely used. Among them, data integrity verification is a hot research topic. At…”
Get full text
Journal Article -
8
Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake
Published in 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01-11-2023)“…With the increasing development of deepfake in facial editing and the easy accessibility of image and video content on the internet, the security risks of…”
Get full text
Conference Proceeding -
9
Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system
Published in 2021 2nd International Conference on Computer Communication and Network Security (CCNS) (01-07-2021)“…With the popularity of cloud computing, cloud storage technology has also been widely used. Among them, data integrity verification is a hot research topic. At…”
Get full text
Conference Proceeding -
10
Privacy-preserving Multi-cloud based Dynamic Symmetric Searchable Encryption
Published in 2021 2nd International Conference on Computer Communication and Network Security (CCNS) (01-07-2021)“…Symmetric searchable encryption (SSE) provides a secure and efficient way for users to search on the encrypted data stored on the cloud. Most of the existing…”
Get full text
Conference Proceeding