×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [3]
Faculty of Educa... [1]
Authors
JIA WEI JIA [1]
FONG SIMON JAMES [1]
PUN CHI MAN [1]
ZHOU JIANTAO [1]
Document Type
Journal article [6]
Conference paper [1]
Date Issued
2024 [1]
2023 [1]
2022 [1]
2020 [1]
2017 [2]
2016 [1]
More...
Language
英語English [7]
Source Publication
ACM Computing Su... [1]
IEEE Communicati... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
More...
Indexed By
SCIE [5]
CPCI-S [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-7 of 7
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture
Journal article
Wu, Haiqin, Düdder, Boris, Wang, Liangmin, Cao, Zhenfu, Zhou, Jun, Feng, Xia. Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture[J]. ACM Computing Surveys, 2024, 56(3), 63.
Authors:
Wu, Haiqin
;
Düdder, Boris
;
Wang, Liangmin
;
Cao, Zhenfu
;
Zhou, Jun
; et al.
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
23.8
/
21.1
|
Submit date:2024/01/10
Outsourced Keyword Search
Searchable Encryption
Cloud Security
Blockchain
Verifiability
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT
Journal article
Rezaeibagha, Fatemeh, Mu, Yi, Huang, Ke, Chen, Lanxiang, Zhang, Leyou. Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT[J]. IEEE Transactions on Services Computing, 2023, 16(3), 1664-1672.
Authors:
Rezaeibagha, Fatemeh
;
Mu, Yi
;
Huang, Ke
;
Chen, Lanxiang
;
Zhang, Leyou
Favorite
|
TC[WOS]:
5
TC[Scopus]:
6
IF:
5.5
/
5.9
|
Submit date:2024/01/10
Cloud Computing
Data Security
Homomorphic Encryption
Internet Of Things
Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud
Journal article
Ullah, Fasee, Pun, Chi Man. Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud[J]. IEEE Transactions on Computational Social Systems, 2022, 11(3), 3090-3107.
Authors:
Ullah, Fasee
;
Pun, Chi Man
Favorite
|
TC[WOS]:
4
TC[Scopus]:
4
IF:
4.5
/
4.6
|
Submit date:2022/08/05
Auditing
Authenticator
Cloud Computing
Costs
Data Privacy
Dynamics
Error Identification
Organizations
Parity Bits
Privacy
Recovery
Security
Servers
Tag
Time Division Multiplexing
User Revocation.
Secure Data Query Framework for Cloud and Fog Computing
Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Query Framework for Cloud and Fog Computing[J]. IEEE Transactions on Network and Service Management, 2020, 17(1), 332-345.
Authors:
Gu, Ke
;
Wu, Na
;
Yin, Bo
;
Jia, Weijia
Favorite
|
TC[WOS]:
69
TC[Scopus]:
68
IF:
4.7
/
4.6
|
Submit date:2021/12/06
Cloud Computing
Data Query
Fog Computing
Security
Fog-based evaluation approach for trustworthy communication in sensor-cloud system
Journal article
Wang T., Li Y., Chen Y., Tian H., Cai Y., Jia W., Wang B.. Fog-based evaluation approach for trustworthy communication in sensor-cloud system[J]. IEEE Communications Letters, 2017, 21(11), 2532-2535.
Authors:
Wang T.
;
Li Y.
;
Chen Y.
;
Tian H.
;
Cai Y.
; et al.
Favorite
|
TC[WOS]:
18
TC[Scopus]:
29
|
Submit date:2019/02/11
Least Squares
Multiple Linear Regression
Security
Sensor-cloud System
Trust
Privacy-Preserving Image Denoising from External Cloud Databases
Journal article
Yifeng Zheng, Helei Cui, Cong Wang, Jiantao Zhou. Privacy-Preserving Image Denoising from External Cloud Databases[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6), 1285-1298.
Authors:
Yifeng Zheng
;
Helei Cui
;
Cong Wang
;
Jiantao Zhou
Adobe PDF
|
Favorite
|
TC[WOS]:
37
TC[Scopus]:
42
IF:
6.3
/
7.3
|
Submit date:2018/12/22
Cloud Computing
External Database
Image Denoising
Privacy
Security
A Critical Review of Security Threats in Cloud Computing
Conference paper
Mahroosh Irfan, Muhammad Usman, Yan Zhuang, Simon Fong. A Critical Review of Security Threats in Cloud Computing[C]:IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2016, 105-111.
Authors:
Mahroosh Irfan
;
Muhammad Usman
;
Yan Zhuang
;
Simon Fong
Favorite
|
TC[WOS]:
4
TC[Scopus]:
13
|
Submit date:2019/02/13
Cloud Computing
Cloud Security
Threats
Service Models
Deployment Models