- Cryptography and Data Security
- Cloud Data Security Solutions
- Advanced Authentication Protocols Security
- Privacy-Preserving Technologies in Data
- User Authentication and Security Systems
- Blockchain Technology Applications and Security
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Wireless Body Area Networks
- Vehicular Ad Hoc Networks (VANETs)
- Cryptographic Implementations and Security
- RFID technology advancements
- Caching and Content Delivery
- Advanced Graph Theory Research
- graph theory and CDMA systems
- Indoor and Outdoor Localization Technologies
- Cloud Computing and Resource Management
- Chaos-based Image/Signal Encryption
- Complexity and Algorithms in Graphs
- Internet Traffic Analysis and Secure E-voting
- Underwater Vehicles and Communication Systems
- Access Control and Trust
Nanjing University of Information Science and Technology
2015-2025
Zhejiang Sci-Tech University
2022-2025
University of Science and Technology of China
2024
NARI Group (China)
2019-2024
University of Shanghai for Science and Technology
2024
University of Nottingham Ningbo China
2024
Kiang Wu Hospital
2024
Changjiang Water Resources Commission
2021-2023
Fujian Normal University
2023
Peng Cheng Laboratory
2019-2022
As the network communications technology developing, a new type of networks has appeared in daily life which is named underwater sensor (UWSNs). UWSNs are class emerging that experience variable and high propagation delays limited available bandwidth. There comprehensive applications this area such as oceanographic data collection, pollution monitoring, offshore exploration, assisted navigation so on. Due to different environment under ocean, routing protocols should be re-designed fit for...
With the rapid development of cloud computing, storage has been accepted by an increasing number organizations and individuals, therein serving as a convenient on-demand outsourcing application. However, upon losing local control data, it becomes urgent need for users to verify whether service providers have stored their data securely. Hence, many researchers devoted themselves design auditing protocols directed at outsourced data. In this paper, we propose efficient public protocol with...
Cloud storage is now a hot research topic in information technology. In cloud storage, date security properties such as data confidentiality, integrity and availability become more important many commercial applications. Recently, provable possession (PDP) schemes are proposed to protect integrity. some cases, it has delegate the remote checking task proxy. However, these PDP not secure since proxy stores state servers. Hence, this paper, we propose an efficient mutual verifiable scheme,...
Data sharing in cloud computing enables multiple participants to freely share the group data, which improves efficiency of work cooperative environments and has widespread potential applications. However, how ensure security data within a efficiently outsourced manner are formidable challenges. Note that key agreement protocols have played very important role secure efficient computing. In this paper, by taking advantage symmetric balanced incomplete block design (SBIBD), we present novel...
Group data sharing in cloud environments has become a hot topic recent decades. With the popularity of computing, how to achieve secure and efficient is an urgent problem be solved. In addition, both anonymity traceability also challenge for sharing. This paper focuses on enabling storage same group with high security efficiency anonymous manner. By leveraging key agreement signature, novel traceable scheme proposed support multiple users public clouds. On one hand, members can communicate...
Wireless sensor networks (WSNs) distribute hundreds to thousands of inexpensive microsensor nodes in their regions, and these are important parts Internet Things (IoT). In WSN-assisted IoT, the resource constrained many ways, such as storage resources, computing energy so on. Robust routing protocols required maintain a long network lifetime achieve higher utilization. this paper, we propose new energy-efficient centroid-based protocol (EECRP) for IoT improve performance network. The...
Abstract A heterogeneous cloud system, for example, a Hadoop 2.6.0 platform, provides distributed but cohesive services with rich features on large‐scale management, reliability, and error tolerance. As big data processing is concerned, newly built clusters meet the challenges of performance optimization focusing faster task execution more efficient usage computing resources. Presently proposed approaches concentrate temporal improvement, that is, shortening MapReduce time, seldom focus...
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, so on. So they simplify key management procedures of certificate-based infrastructures used to realize authentication in blockchain. Linearly homomorphic signature schemes allow perform linear computations on authenticated data. And the correctness computation publicly verified. Although a series have been designed...
Attribute-based encryption (ABE) can guarantee confidentiality and achieve fine-grained data access control in a cloud storage system. Due to the fact that every attribute ABE may be shared by multiple users each user holds attributes, any single-attribute revocation for some affect other with same Therefore, how revoke efficiently is an important challenging problem schemes. In order solve above problems, we first give concrete attack existing scheme revocation. Then, formalize definition...
With the exponential increase of mobile devices and fast development cloud computing, a new computing paradigm called (MCC) is put forward to solve limitation device's storage, communication, computation. Through devices, users can enjoy various services during their mobility. However, it difficult ensure security protect privacy due openness wireless communication in paradigm. Recently, Tsai Lo proposed privacy-aware authentication (PAA) scheme identification problem MCC proved that was...
Efficient power management in smart grids requires obtaining consumption data from each resident. However, concerning user's electricity might reveal sensitive information, such as living habits and lifestyles. In order to solve this problem, paper proposes a privacy-preserving cube-data aggregation scheme for consumption. our scheme, item is described multi-dimensional structure (l-dimensional), users form live multiple residential areas (m areas, at most n area). Based on Horner's Rule,...
The concept of the Social Internet Things (SIoT) can be viewed as integration prevailing social networking and Things, which is making inroads into daily operation many industries. Smart grids, are cost-effective environmentally friendly applications, a promising field SIoT. However, security privacy concerns dark aspects smart grids. goal this paper to address issues in vehicle-togrid (V2G) networks with intention promoting more extensive deployment V2G for Driven by motivation, paper, we...