Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Mutation Approach of Detecting SQL Injection Vulnerabilities

    As Internet is increasingly prosperous, Web services become more common in our social life. As users can access pages on the Web directly, Web application plays a vital role in various domains such as e-financ...

    Yanyu Huang, Chuan Fu, Xuan Chen, Hao Guo, **aoyu He in Cloud Computing and Security (2017)

  2. No Access

    Chapter and Conference Paper

    Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage

    In a secure data sharing system, the keyword search over encrypted files is a basic need of a user with appropriate privileges. Although the traditional searchable encryption technique can provide the privacy ...

    Tong Li, Zheli Liu, ** Li, Chunfu Jia, Zoe L. Jiang in Information Security and Privacy (2016)