Yan Zhu
标题引用次数年份
Cooperative provable data possession for integrity verification in multicloud storage
Y Zhu, H Hu, GJ Ahn, M Yu
IEEE transactions on parallel and distributed systems 23 (12), 2231-2244, 2012
4842012
Dynamic audit services for integrity verification of outsourced storages in clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 2011 ACM Symposium on Applied Computing, 1550-1557, 2011
2932011
Dynamic audit services for outsourced storages in clouds
Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu
IEEE Transactions on Services Computing 6 (2), 227-238, 2011
2792011
An efficient authentication and access control scheme for perception layer of internet of things
N Ye, Y Zhu, R Wang, R Malekian, L Qiao-Min
Applied Mathematics & Information Sciences 8 (4), 1617, 2014
1582014
Efficient provable data possession for hybrid clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1572010
Efficient audit service outsourcing for data integrity in clouds
Y Zhu, H Hu, GJ Ahn, SS Yau
Journal of Systems and Software 85 (5), 1083-1095, 2012
1212012
Towards temporal access control in cloud computing
Y Zhu, H Hu, GJ Ahn, D Huang, S Wang
2012 Proceedings IEEE INFOCOM, 2576-2580, 2012
862012
Collaborative integrity verification in hybrid clouds
Y Zhu, H Hu, GJ Ahn, Y Han, S Chen
7th International Conference on Collaborative Computing: Networking …, 2011
722011
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
D Ma, N Saxena, T Xiang, Y Zhu
IEEE transactions on dependable and secure computing 10 (2), 57-69, 2012
692012
Attribute-based access control for ICN naming scheme
B Li, D Huang, Z Wang, Y Zhu
IEEE Transactions on Dependable and Secure Computing 15 (2), 194-206, 2016
462016
Efficient attribute-based comparable data access control
Z Wang, D Huang, Y Zhu, B Li, CJ Chung
IEEE Transactions on computers 64 (12), 3430-3443, 2015
432015
From RBAC to ABAC: constructing flexible data access control for cloud storage services
Y Zhu, D Huang, CJ Hu, X Wang
IEEE Transactions on Services Computing 8 (4), 601-616, 2014
432014
Comparison-based encryption for fine-grained access control in clouds
Y Zhu, H Hu, GJ Ahn, M Yu, H Zhao
Proceedings of the second ACM conference on Data and Application Security …, 2012
412012
Zero-knowledge proofs of retrievability
Y Zhu, HX Wang, ZX Hu, GJ Ahn, HX Hu
Science China Information Sciences 54 (8), 1608, 2011
412011
A collaborative framework for privacy protection in online social networks
Y Zhu, Z Hu, H Wang, H Hu, GJ Ahn
6th International Conference on Collaborative Computing: Networking …, 2010
362010
基于层次结构的信息安全评估模型研究
朱岩, 杨永田, 张玉清, 冯登国
计算机工程与应用 40 (6), 40-43, 2004
352004
Enabling secure location-based services in mobile cloud computing
Y Zhu, D Ma, D Huang, C Hu
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 27-32, 2013
342013
Provably secure role-based encryption with revocation mechanism
Y Zhu, HX Hu, GJ Ahn, HX Wang, SB Wang
Journal of Computer Science and Technology 26 (4), 697-710, 2011
322011
Cooperative provable data possession
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Beijing: Peking University and Arizona University, 2010
302010
How to use attribute-based encryption to implement role-based access control in the cloud
Y Zhu, D Ma, CJ Hu, D Huang
Proceedings of the 2013 international workshop on Security in cloud …, 2013
292013
系统目前无法执行此操作,请稍后再试。
文章 1–20