K
Kan Yang
Researcher at University of Memphis
Publications - 70
Citations - 6326
Kan Yang is an academic researcher from University of Memphis. The author has contributed to research in topics: Cloud computing & Encryption. The author has an hindex of 33, co-authored 70 publications receiving 4684 citations. Previous affiliations of Kan Yang include University of Waterloo & City University of Hong Kong.
Papers
More filters
Journal ArticleDOI
Blockchain-Based Decentralized Trust Management in Vehicular Networks
TL;DR: Simulation results reveal that the proposed system is effective and feasible in collecting, calculating, and storing trust values in vehicular networks.
Journal ArticleDOI
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
Kan Yang,Xiaohua Jia +1 more
TL;DR: This paper designs an auditing framework for cloud storage systems and proposes an efficient and privacy-preserving auditing protocol, which is efficient and provably secure in the random oracle model and extends the protocol to support the data dynamic operations.
Journal ArticleDOI
Security and Privacy in Smart City Applications: Challenges and Solutions
TL;DR: This article first introduces promising smart city applications and architecture, then discusses several security and privacy challenges in these applications, and introduces some open issues for future research.
Journal ArticleDOI
VerifyNet: Secure and Verifiable Federated Learning
TL;DR: VerifyNet is proposed, the first privacy-preserving and verifiable federated learning framework that claims that it is impossible that an adversary can deceive users by forging Proof, unless it can solve the NP-hard problem adopted in the model.
Proceedings ArticleDOI
DAC-MACS: Effective data access control for multi-authority cloud storage systems
TL;DR: This paper constructs a new multiauthority CP-ABE scheme with efficient decryption, and design an efficient attribute revocation method that can achieve both forward security and backward security, and proposes an extensive data access control scheme (EDAC-MACS), which is secure under weaker security assumptions.