Search Results - "Lou, WenJing"
-
1
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Published in IEEE transactions on parallel and distributed systems (01-01-2014)“…With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public…”
Get full text
Journal Article -
2
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
Published in IEEE transactions on parallel and distributed systems (01-08-2012)“…Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted…”
Get full text
Journal Article -
3
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Published in IEEE transactions on parallel and distributed systems (01-01-2013)“…Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such…”
Get full text
Journal Article -
4
Verifiable Computation over Large Database with Incremental Updates
Published in IEEE transactions on computers (01-10-2016)“…The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it…”
Get full text
Journal Article -
5
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Published in IEEE transactions on parallel and distributed systems (01-05-2011)“…Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized…”
Get full text
Journal Article -
6
New Algorithms for Secure Outsourcing of Modular Exponentiations
Published in IEEE transactions on parallel and distributed systems (01-09-2014)“…With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting…”
Get full text
Journal Article -
7
Data security and privacy in wireless body area networks
Published in IEEE wireless communications (01-02-2010)“…The wireless body area network has emerged as a new technology for e-healthcare that allows the data of a patient's vital body parameters and movements to be…”
Get full text
Journal Article -
8
DDoS attack protection in the era of cloud computing and Software-Defined Networking
Published in Computer networks (Amsterdam, Netherlands : 1999) (22-04-2015)“…Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined…”
Get full text
Journal Article -
9
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
Published in IEEE transactions on parallel and distributed systems (01-04-2016)“…Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before-outsourcing is a fundamental solution to…”
Get full text
Journal Article -
10
Wireless power transfer and applications to sensor networks
Published in IEEE wireless communications (01-08-2013)“…Energy constraints are widely regarded as a fundamental limitation of wireless and mobile devices. For sensor networks, a limited lifetime due to battery…”
Get full text
Journal Article -
11
Privacy-Preserving Public Auditing for Secure Cloud Storage
Published in IEEE transactions on computers (01-02-2013)“…Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable…”
Get full text
Journal Article -
12
On Broadcast Authentication in Wireless Sensor Networks
Published in IEEE transactions on wireless communications (01-11-2007)“…Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated…”
Get full text
Journal Article -
13
Toward publicly auditable secure cloud data storage services
Published in IEEE network (01-07-2010)“…Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand…”
Get full text
Journal Article -
14
Secure Deduplication with Efficient and Reliable Convergent Key Management
Published in IEEE transactions on parallel and distributed systems (01-06-2014)“…Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload…”
Get full text
Journal Article -
15
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
Published in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (01-04-2014)“…Enabling keyword search directly over encrypted data is a desirable technique for effective utilization of encrypted data outsourced to the cloud. Existing…”
Get full text
Conference Proceeding -
16
CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding
Published in IEEE journal on selected areas in communications (01-01-2011)“…Driven by both safety concerns and commercial interests, one of the key services offered by vehicular networks is popular content distribution (PCD). The…”
Get full text
Journal Article -
17
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Published in IEEE journal on selected areas in communications (01-02-2006)“…Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes,…”
Get full text
Journal Article -
18
Toward Secure and Dependable Storage Services in Cloud Computing
Published in IEEE transactions on services computing (01-04-2012)“…Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and…”
Get full text
Journal Article -
19
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
Published in IEEE transactions on information forensics and security (01-01-2015)“…With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted…”
Get full text
Journal Article -
20
New Publicly Verifiable Databases with Efficient Updates
Published in IEEE transactions on dependable and secure computing (01-09-2015)“…The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it…”
Get full text
Journal Article