Authenticated Keyword Search on Large-Scale Graphs in Hybrid-Storage Blockchains
The widespread availability of Internet access and online services has led to the generation
of numerous large-scale graphs in various real-world applications, such as online social …
of numerous large-scale graphs in various real-world applications, such as online social …
Private approximate nearest neighbor search for on-chain data based on locality-sensitive hashing
S Shang, X Du, X Wang, A Liu - Future Generation Computer Systems, 2025 - Elsevier
Blockchain manages data with immutability, decentralization and traceability, offering new
solutions for traditional information systems and greatly facilitating data sharing. However …
solutions for traditional information systems and greatly facilitating data sharing. However …
Authenticated Subgraph Matching in Hybrid-Storage Blockchains
Graphs serve as an essential data structure to model complex relationships in a variety of
applications, such as social networks, web graphs, and chemical informatics. Due to the …
applications, such as social networks, web graphs, and chemical informatics. Due to the …
NetChain: Authenticated Blockchain Top-k Graph Data Queries and its Application in Asset Management
As a valuable digital resource, graph data is an important data asset, which has been widely
utilized across various fields to optimize decision-making and enable smarter solutions. To …
utilized across various fields to optimize decision-making and enable smarter solutions. To …
IBSBMPC: Design of an Iterative & highly Secure Bioinspired-based Sharding Blockchain Model for Public Cloud Deployments
In addressing the ever-evolving demands of public cloud security, there arises an imperative
need for innovative and robust blockchain models. Traditional approaches often grapple …
need for innovative and robust blockchain models. Traditional approaches often grapple …
Improved Security of a Data Truthfulness and Privacy Preservation Scheme in Data Markets
M Duan, Z Sui, H Qin - Zhiyuan and Qin, Haimiao, Improved Security of … - papers.ssrn.com
Data Market, which has emerged in recent years, can carry out efficient data trading and
further enhance the utility of data. However, there are many potential security risks in Data …
further enhance the utility of data. However, there are many potential security risks in Data …