Search Results - "Lou, WenJing"

Refine Results
  1. 1

    Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data by Cao, Ning, Wang, Cong, Li, Ming, Ren, Kui, Lou, Wenjing

    “…With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public…”
    Get full text
    Journal Article
  2. 2

    Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Wang, Cong, Cao, Ning, Ren, Kui, Lou, Wenjing

    “…Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted…”
    Get full text
    Journal Article
  3. 3

    Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption by Li, Ming, Yu, Shucheng, Zheng, Yao, Ren, Kui, Lou, Wenjing

    “…Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such…”
    Get full text
    Journal Article
  4. 4

    Verifiable Computation over Large Database with Incremental Updates by Chen, Xiaofeng, Li, Jin, Weng, Jian, Ma, Jianfeng, Lou, Wenjing

    Published in IEEE transactions on computers (01-10-2016)
    “…The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it…”
    Get full text
    Journal Article
  5. 5

    Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing by Wang, Qian, Wang, Cong, Ren, Kui, Lou, Wenjing, Li, Jin

    “…Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized…”
    Get full text
    Journal Article
  6. 6

    New Algorithms for Secure Outsourcing of Modular Exponentiations by Chen, Xiaofeng, Li, Jin, Ma, Jianfeng, Tang, Qiang, Lou, Wenjing

    “…With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting…”
    Get full text
    Journal Article
  7. 7

    Data security and privacy in wireless body area networks by Li, Ming, Lou, Wenjing, Ren, Kui

    Published in IEEE wireless communications (01-02-2010)
    “…The wireless body area network has emerged as a new technology for e-healthcare that allows the data of a patient's vital body parameters and movements to be…”
    Get full text
    Journal Article
  8. 8

    DDoS attack protection in the era of cloud computing and Software-Defined Networking by Wang, Bing, Zheng, Yao, Lou, Wenjing, Hou, Y. Thomas

    “…Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined…”
    Get full text
    Journal Article
  9. 9

    Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud by Wenhai Sun, Shucheng Yu, Wenjing Lou, Hou, Y. Thomas, Hui Li

    “…Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before-outsourcing is a fundamental solution to…”
    Get full text
    Journal Article
  10. 10

    Wireless power transfer and applications to sensor networks by Liguang Xie, Yi Shi, Hou, Y. T., Lou, Andwenjing

    Published in IEEE wireless communications (01-08-2013)
    “…Energy constraints are widely regarded as a fundamental limitation of wireless and mobile devices. For sensor networks, a limited lifetime due to battery…”
    Get full text
    Journal Article
  11. 11

    Privacy-Preserving Public Auditing for Secure Cloud Storage by Cong Wang, Chow, S. S. M., Qian Wang, Kui Ren, Wenjing Lou

    Published in IEEE transactions on computers (01-02-2013)
    “…Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable…”
    Get full text
    Journal Article
  12. 12

    On Broadcast Authentication in Wireless Sensor Networks by Kui Ren, Wenjing Lou, Kai Zeng, Moran, P.J.

    “…Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated…”
    Get full text
    Journal Article
  13. 13

    Toward publicly auditable secure cloud data storage services by Wang, Cong, Ren, Kui, Lou, Wenjing, Li, Jin

    Published in IEEE network (01-07-2010)
    “…Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand…”
    Get full text
    Journal Article
  14. 14

    Secure Deduplication with Efficient and Reliable Convergent Key Management by Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Lee, Patrick P. C., Wenjing Lou

    “…Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload…”
    Get full text
    Journal Article
  15. 15

    Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud by Bing Wang, Shucheng Yu, Wenjing Lou, Hou, Y. Thomas

    “…Enabling keyword search directly over encrypted data is a desirable technique for effective utilization of encrypted data outsourced to the cloud. Existing…”
    Get full text
    Conference Proceeding
  16. 16

    CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding by Li, Ming, Yang, Zhenyu, Lou, Wenjing

    “…Driven by both safety concerns and commercial interests, one of the key services offered by vehicular networks is popular content distribution (PCD). The…”
    Get full text
    Journal Article
  17. 17

    Location-based compromise-tolerant security mechanisms for wireless sensor networks by Yanchao Zhang, Wei Liu, Wenjing Lou, Fang, Yuguang

    “…Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes,…”
    Get full text
    Journal Article
  18. 18

    Toward Secure and Dependable Storage Services in Cloud Computing by Wang, Cong, Wang, Qian, Ren, Kui, Cao, Ning, Lou, Wenjing

    Published in IEEE transactions on services computing (01-04-2012)
    “…Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and…”
    Get full text
    Journal Article
  19. 19

    New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations by Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Wong, Duncan S.

    “…With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted…”
    Get full text
    Journal Article
  20. 20

    New Publicly Verifiable Databases with Efficient Updates by Chen, Xiaofeng, Li, Jin, Huang, Xinyi, Ma, Jianfeng, Lou, Wenjing

    “…The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it…”
    Get full text
    Journal Article