​
Login / Signup
Kun Huang
ORCID
Publication Activity (10 Years)
Years Active: 2013-2019
Publications (10 Years): 6
Top Topics
Upper Bound
Cooperative
Security Concerns
Cloud Storage
Top Venues
IEEE Trans. Inf. Theory
CoRR
IET Commun.
ICC Workshops
</>
Publications
</>
Kun Huang
,
Udaya Parampalli
,
Ming Xian
Improved Upper Bounds on Systematic-Length for Linear Minimum Storage Regenerating Codes.
IEEE Trans. Inf. Theory
65 (2) (2019)
Kun Huang
,
Udaya Parampalli
,
Ming Xian
On Secrecy Capacity of Minimum Storage Regenerating Codes.
IEEE Trans. Inf. Theory
63 (3) (2017)
Jian Liu
,
Huimei Wang
,
Ming Xian
,
Hong Rong
,
Kun Huang
Reliable and confidential cloud storage with efficient data forwarding functionality.
IET Commun.
10 (6) (2016)
Hong Rong
,
Huimei Wang
,
Kun Huang
,
Jian Liu
,
Ming Xian
Privacy-Preserving Scalar Product Computation in Cloud Environments Under Multiple Keys.
IDEAL
(2016)
Kun Huang
,
Udaya Parampalli
,
Ming Xian
Improved Upper Bounds on Systematic-Length for Linear Minimum Storage Regenerating Codes.
CoRR
(2016)
Kun Huang
,
Udaya Parampalli
,
Ming Xian
Security Concerns in Minimum Storage Cooperative Regenerating Codes.
IEEE Trans. Inf. Theory
62 (11) (2016)
Kun Huang
,
Udaya Parampalli
,
Ming Xian
Characterization of Secrecy Capacity for General MSR Codes under Passive Eavesdropping Model.
CoRR
(2015)
Jian Liu
,
Kun Huang
,
Hong Rong
,
Huimei Wang
,
Ming Xian
Efficient and secure data forwarding for erasure-code-based cloud storage.
ICC Workshops
(2015)
Kun Huang
,
Udaya Parampalli
,
Ming Xian
Security Concerns in Minimum Storage Cooperative Regenerating Codes.
CoRR
(2015)
Kun Huang
,
Ming Xian
,
Shaojing Fu
,
Jian Liu
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor.
IET Commun.
8 (12) (2014)
Kun Huang
,
Jian Liu
,
Ming Xian
,
Huimei Wang
,
Shaojing Fu
Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage.
ICC Workshops
(2014)
Jian Liu
,
Huimei Wang
,
Ming Xian
,
Kun Huang
A Secure and Efficient Scheme for Cloud Storage against Eavesdropper.
ICICS
(2013)