-
Chapter and Conference Paper
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer
With the popularity of mobile computing, WiFi has become one of the essential technologies for people to access the Internet, and WiFi security has also become a major threat for mobile computing. The Evil-Twi...
-
Chapter and Conference Paper
Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique
Searchable Symmetric Encryption (SSE) has been widely applied in the encrypted database for exact queries or even range queries in practice. In spite of it has excellent efficiency and complete functionality, ...
-
Chapter and Conference Paper
A Mutation Approach of Detecting SQL Injection Vulnerabilities
As Internet is increasingly prosperous, Web services become more common in our social life. As users can access pages on the Web directly, Web application plays a vital role in various domains such as e-financ...
-
Chapter and Conference Paper
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage
In a secure data sharing system, the keyword search over encrypted files is a basic need of a user with appropriate privileges. Although the traditional searchable encryption technique can provide the privacy ...