Wenjing Lou

According to our database1, Wenjing Lou authored at least 225 papers between 2001 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to information and network security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Joint User-AP Association and Resource Allocation in Multi-AP 60-GHz WLAN.
IEEE Trans. Vehicular Technology, 2019

A General Method to Determine Asymptotic Capacity Upper Bounds for Wireless Networks.
IEEE Trans. Network Science and Engineering, 2019

Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
IEEE Trans. Information Forensics and Security, 2019

Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

2018
On the integration of SIC and MIMO DoF for interference cancellation in wireless networks.
Wireless Networks, 2018

On Multicast Throughput in Multihop MIMO Networks With Interference Alignment.
IEEE Trans. Vehicular Technology, 2018

Cost Minimization for Cooperative Traffic Relaying Between Primary and Secondary Networks.
IEEE Trans. Mob. Comput., 2018

Memory Forensic Challenges Under Misused Architectural Features.
IEEE Trans. Information Forensics and Security, 2018

Cooperative Interference Neutralization in Multi-Hop Wireless Networks.
IEEE Trans. Communications, 2018

Recent Advances of LTE/WiFi Coexistence in Unlicensed Spectrum.
IEEE Network, 2018

A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2018

Context-Free Fine-Grained Motion Sensing Using WiFi.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

GPF: A GPU-based Design to Achieve ~100 μs Scheduling for 5G NR.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

REARGUARD: Secure Keyword Search Using Trusted Hardware.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A General Model for DoF-based Interference Cancellation in MIMO Networks With Rank-Deficient Channels.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

TruSense: Information Leakage from TrustZone.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Service Strategy Selection in Collaboration Model for the Business Growth of Content Providers.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Efficient and Secure Outsourcing of Differentially Private Data Publication.
Proceedings of the Computer Security, 2018

CURT: A Real-Time Scheduling Algorithm for Coexistence of LTE and Wi-Fi in Unlicensed Spectrum.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

ROSTER: Radio Context Attestation in Cognitive Radio Network.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Services Computing, 2017

Beyond Overlay: Reaping Mutual Benefits for Primary and Secondary Networks Through Node-Level Cooperation.
IEEE Trans. Mob. Comput., 2017

Impact of Full Duplex Scheduling on End-to-End Throughput in Multi-Hop Wireless Networks.
IEEE Trans. Mob. Comput., 2017

From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality.
ACM TIST, 2017

Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
IEEE Trans. Information Forensics and Security, 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Information Forensics and Security, 2017

Location Based Handshake and Private Proximity Test with Location Tags.
IEEE Trans. Dependable Sec. Comput., 2017

OFDM-Based Interference Alignment in Single-Antenna Cellular Wireless Networks.
IEEE Trans. Communications, 2017

A Distributed Scheduling Algorithm for Underwater Acoustic Networks With Large Propagation Delays.
IEEE Trans. Communications, 2017

Coexistence Between Wi-Fi and LTE on Unlicensed Spectrum: A Human-Centric Approach.
IEEE Journal on Selected Areas in Communications, 2017

A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.
J. Parallel Distrib. Comput., 2017

Tell me the truth: Practically public authentication for outsourced databases with multi-user modification.
Inf. Sci., 2017

On AP Assignment and Transmission Scheduling for Multi-AP 60 GHz WLAN.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Privacy-preserving pattern matching over encrypted genetic data in cloud computing.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

AugAuth: Shoulder-surfing resistant authentication for augmented reality.
Proceedings of the IEEE International Conference on Communications, 2017

Spectrum attacks aimed at minimizing spectrum opportunities.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
A Distributed Algorithm to Achieve Transparent Coexistence for a Secondary Multi-Hop MIMO Network.
IEEE Trans. Wireless Communications, 2016

Joint Flow Routing and DoF Allocation in Multihop MIMO Networks.
IEEE Trans. Wireless Communications, 2016

Cross-Layer Optimization for Multi-Hop Wireless Networks With Successive Interference Cancellation.
IEEE Trans. Wireless Communications, 2016

Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence.
IEEE Trans. Wireless Communications, 2016

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distrib. Syst., 2016

A Scheduling Algorithm for MIMO DoF Allocation in Multi-Hop Networks.
IEEE Trans. Mob. Comput., 2016

An Analytical Model for Interference Alignment in Multi-Hop MIMO Networks.
IEEE Trans. Mob. Comput., 2016

Jamming Resilient Communication Using MIMO Interference Cancellation.
IEEE Trans. Information Forensics and Security, 2016

An Online Admission Control Algorithm for Dynamic Traffic in Underlay Coexistence Paradigm.
IEEE Trans. Cogn. Comm. & Networking, 2016

Cognitive security: securing the burgeoning landscape of mobile networks.
IEEE Network, 2016

Interference alignment for multihop wireless networks: challenges and research directions.
IEEE Network, 2016

On Throughput Region for Primary and Secondary Networks With Node-Level Cooperation.
IEEE Journal on Selected Areas in Communications, 2016

Secure three-party computational protocols for triangle area.
Int. J. Inf. Sec., 2016

TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.
IACR Cryptology ePrint Archive, 2016

Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Nullification in the air: Interference neutralization in multi-hop wireless networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

MobTrack: Locating indoor interfering radios with a single device.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Looks Good To Me: Authentication for Augmented Reality.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security.
IEEE Wireless Commun. Letters, 2015

A Hybrid Cloud Approach for Secure Authorized Deduplication.
IEEE Trans. Parallel Distrib. Syst., 2015

Multi-Node Wireless Energy Charging in Sensor Networks.
IEEE/ACM Trans. Netw., 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Information Forensics and Security, 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Sec. Comput., 2015

Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Recent advances in interference management for wireless networks.
IEEE Network, 2015

Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks.
IEEE Journal on Selected Areas in Communications, 2015

A Mobile Platform for Wireless Charging and Data Collection in Sensor Networks.
IEEE Journal on Selected Areas in Communications, 2015

New access control systems based on outsourced attribute-based encryption.
Journal of Computer Security, 2015

A delegation based cross trusted domain direct anonymous attestation scheme.
Computer Networks, 2015

Harmonizing SIC and MIMO DoF Interference Cancellation for Efficient Network-Wide Resource Allocation.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

On cyclostationary analysis of WiFi signals for direction estimation.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Privacy-Preserving Link Prediction in Decentralized Online Social Networks.
Proceedings of the Computer Security - ESORICS 2015, 2015

Optimal throughput curve for primary and secondary users with node-level cooperation.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015

Modeling the side-channel attacks in data deduplication with game theory.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Now You See Me: Hide and Seek in Physical Address Space.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wireless Communications, 2014

Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Deduplication with Efficient and Reliable Convergent Key Management.
IEEE Trans. Parallel Distrib. Syst., 2014

A novel MIMO DoF model for multi-hop networks.
IEEE Network, 2014

New and efficient conditional e-payment systems with transferability.
Future Generation Comp. Syst., 2014

Shark-IA: An Interference Alignment Algorithm for Multi-hop Underwater Acoustic Networks with Large Propagation Delays.
Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, November 12, 2014

Increasing user throughput in cellular networks with interference alignment.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Achieving transparent coexistence in a multi-hop secondary network through distributed computation.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

MIMO-based jamming resilient communication in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Verifiable Computation over Large Database with Incremental Updates.
Proceedings of the Computer Security - ESORICS 2014, 2014

Enabling Trusted Data-intensive execution in cloud computing.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

A Secure Three-Party Computational Protocol for Triangle Area.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

2013
Wireless power transfer and applications to sensor networks.
IEEE Wireless Commun., 2013

Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks.
IEEE Trans. Wireless Communications, 2013

Throughput Maximization for Multi-Hop Wireless Networks with Network-Wide Energy Constraint.
IEEE Trans. Wireless Communications, 2013

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distrib. Syst., 2013

Secure ad hoc trust initialization and key management in wireless body area networks.
TOSN, 2013

Proximity-Based Security Techniques for Mobile Users in Wireless Networks.
IEEE Trans. Information Forensics and Security, 2013

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

Toward privacy-assured and searchable cloud data storage services.
IEEE Network, 2013

Beyond interference avoidance: On transparent coexistence for multi-hop secondary CR networks.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

On traveling path and related problems for a mobile station in a rechargeable sensor network.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

UPS: A United Cooperative Paradigm for Primary and Secondary Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

On Throughput Maximization for a Multi-hop MIMO Network.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

On interference alignment for multi-hop MIMO networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An efficient DoF scheduling algorithm for multi-hop MIMO networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Non-parametric passive traffic monitoring in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Bundling mobile base station and wireless energy transfer: Modeling and optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

SybilShield: An agent-aided social network-based Sybil defense among multiple communities.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Proximity-based security using ambient radio signals.
Proceedings of IEEE International Conference on Communications, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Welcome message.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
On energy efficiency of geographic opportunistic routing in lossy multihop wireless networks.
Wireless Networks, 2012

On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication.
IEEE Wireless Commun. Letters, 2012

Toward Secure and Dependable Storage Services in Cloud Computing.
IEEE Trans. Services Computing, 2012

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
IEEE Trans. Parallel Distrib. Syst., 2012

Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE Journal on Selected Areas in Communications, 2012

On renewable sensor networks with wireless energy transfer: The multi-node case.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Toward simple criteria to establish capacity scaling laws for wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

LT codes-based secure and reliable cloud storage service.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags.
Proceedings of the Computer Security - ESORICS 2012, 2012

New Algorithms for Secure Outsourcing of Modular Exponentiations.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Privacy-Preserving Authentication in Wireless Access Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Device Pairing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid.
IEEE Trans. Smart Grid, 2011

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.
IEEE Trans. Parallel Distrib. Syst., 2011

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
TOSN, 2011

CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding.
IEEE Journal on Selected Areas in Communications, 2011

Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Computer Networks, 2011

R-Code: Network coding-based reliable broadcast in wireless mesh networks.
Ad Hoc Networks, 2011

FindU: Privacy-preserving personal profile matching in mobile social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy-preserving multi-keyword ranked search over encrypted cloud data.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Authorized Private Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Distributed Data Mining with Differential Privacy.
Proceedings of IEEE International Conference on Communications, 2011

2010
Data security and privacy in wireless body area networks.
IEEE Wireless Commun., 2010

PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
IEEE Trans. Parallel Distrib. Syst., 2010

Toward publicly auditable secure cloud data storage services.
IEEE Network, 2010

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010

Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

CodePlay: Live multimedia streaming in VANETs using symbol-level network coding.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Secure Ranked Keyword Search over Encrypted Cloud Data.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

Attribute based data sharing with attribute revocation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply.
Wireless Networks, 2009

SPREAD: Improving network security by multipath routing in mobile ad hoc networks.
Wireless Networks, 2009

Security, privacy, and accountability in wireless access networks.
IEEE Wireless Commun., 2009

Location-Aided Opportunistic Forwarding in Multirate and Multihop Wireless Networks.
IEEE Trans. Vehicular Technology, 2009

Multi-User Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Vehicular Technology, 2009

Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Vehicular Technology, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security.
IACR Cryptology ePrint Archive, 2009

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IACR Cryptology ePrint Archive, 2009

Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
IACR Cryptology ePrint Archive, 2009

A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, 2009

Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009

OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Ensuring data storage security in Cloud Computing.
Proceedings of the 17th International Workshop on Quality of Service, 2009

FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

FSA: A Fast Coordination Scheme for Opportunistic Routing.
Proceedings of IEEE International Conference on Communications, 2009

R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
Proceedings of the Computer Security, 2009

2008
Capacity of opportunistic routing in multi-rate and multi-hop wireless networks.
IEEE Trans. Wireless Communications, 2008

Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2008

On Relay Node Placement and Assignment for Two-tiered Wireless Networks.
MONET, 2008

Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Attribute-based on-demand multicast group setup with membership anonymity.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Efficient user revocation for privacy-aware PKI.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Optimized User Revocation for Group Signature Based Privacy-Aware PKI.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Towards Secure Link Quality Measurement in Multihop Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A secure incentive protocol for mobile ad hoc networks.
Wireless Networks, 2007

On Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2007

Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability.
MONET, 2007

Multi-user Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

On throughput efficiency of geographic opportunistic routing in multihop wireless networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

2006
A robust and energy-efficient data dissemination framework for wireless sensor networks.
Wireless Networks, 2006

A new approach for random key pre-distribution in large-scale wireless sensor networks.
Wireless Communications and Mobile Computing, 2006

MASK: anonymous on-demand routing in mobile ad hoc networks.
IEEE Trans. Wireless Communications, 2006

A novel privacy preserving authentication and access control scheme for pervasive computing environments.
IEEE Trans. Vehicular Technology, 2006

H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks.
IEEE Trans. Vehicular Technology, 2006

Securing Mobile Ad Hoc Networks with Certificateless Public Keys.
IEEE Trans. Dependable Sec. Comput., 2006

Location-based compromise-tolerant security mechanisms for wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2006

Mobile Ad Hoc and Sensor Systems.
IJWIN, 2006

Routing optimization security in mobile IPv6.
Computer Networks, 2006

On Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
An efficient quality of service routing algorithm for delay-sensitive applications.
Computer Networks, 2005

Securing sensor networks with location-based keys.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

An efficient N-to-1 multipath routing protocol in wireless sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Anonymous communications in mobile ad hoc networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2005

Privacy enhanced access control in pervasive computing environments.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
SIP: a secure incentive protocol against selfishness in mobile ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Managing Wireless Sensor Networks with Supply Chain Strategy.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004

SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Scalable and robust data dissemination in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
DEAR: A Device and Energy Aware Routing protocol for heterogeneous ad hoc networks.
J. Parallel Distrib. Comput., 2003

A selection function based distributed algorithm for delay-constraint least-cost unicast routing.
Proceedings of IEEE International Conference on Communications, 2003

A QoS-enabled MAC architecture for prioritized service in IEEE 802.11 WLANs.
Proceedings of the Global Telecommunications Conference, 2003

2002
Predictive Caching Strategy for On-Demand Routing Protocols in Wireless Ad Hoc Networks.
Wireless Networks, 2002

2001
The transmission of MPEG-2 VBR video under usage parameter control.
Int. J. Communication Systems, 2001


  Loading...