scispace - formally typeset
K

Kan Yang

Researcher at University of Memphis

Publications -  70
Citations -  6326

Kan Yang is an academic researcher from University of Memphis. The author has contributed to research in topics: Cloud computing & Encryption. The author has an hindex of 33, co-authored 70 publications receiving 4684 citations. Previous affiliations of Kan Yang include University of Waterloo & City University of Hong Kong.

Papers
More filters
Journal ArticleDOI

Blockchain-Based Decentralized Trust Management in Vehicular Networks

TL;DR: Simulation results reveal that the proposed system is effective and feasible in collecting, calculating, and storing trust values in vehicular networks.
Journal ArticleDOI

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

TL;DR: This paper designs an auditing framework for cloud storage systems and proposes an efficient and privacy-preserving auditing protocol, which is efficient and provably secure in the random oracle model and extends the protocol to support the data dynamic operations.
Journal ArticleDOI

Security and Privacy in Smart City Applications: Challenges and Solutions

TL;DR: This article first introduces promising smart city applications and architecture, then discusses several security and privacy challenges in these applications, and introduces some open issues for future research.
Journal ArticleDOI

VerifyNet: Secure and Verifiable Federated Learning

TL;DR: VerifyNet is proposed, the first privacy-preserving and verifiable federated learning framework that claims that it is impossible that an adversary can deceive users by forging Proof, unless it can solve the NP-hard problem adopted in the model.
Proceedings ArticleDOI

DAC-MACS: Effective data access control for multi-authority cloud storage systems

TL;DR: This paper constructs a new multiauthority CP-ABE scheme with efficient decryption, and design an efficient attribute revocation method that can achieve both forward security and backward security, and proposes an extensive data access control scheme (EDAC-MACS), which is secure under weaker security assumptions.