Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer

    With the popularity of mobile computing, WiFi has become one of the essential technologies for people to access the Internet, and WiFi security has also become a major threat for mobile computing. The Evil-Twi...

    Chundong Wang, Likun Zhu, Liangyi Gong in Algorithms and Architectures for Parallel … (2018)

  2. No Access

    Chapter and Conference Paper

    Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique

    Searchable Symmetric Encryption (SSE) has been widely applied in the encrypted database for exact queries or even range queries in practice. In spite of it has excellent efficiency and complete functionality, ...

    Siyi Lv, Yanyu Huang, Bo Li, Yu Wei in Algorithms and Architectures for Parallel … (2018)

  3. No Access

    Chapter and Conference Paper

    A Mutation Approach of Detecting SQL Injection Vulnerabilities

    As Internet is increasingly prosperous, Web services become more common in our social life. As users can access pages on the Web directly, Web application plays a vital role in various domains such as e-financ...

    Yanyu Huang, Chuan Fu, Xuan Chen, Hao Guo, **aoyu He in Cloud Computing and Security (2017)

  4. No Access

    Chapter and Conference Paper

    Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage

    In a secure data sharing system, the keyword search over encrypted files is a basic need of a user with appropriate privileges. Although the traditional searchable encryption technique can provide the privacy ...

    Tong Li, Zheli Liu, ** Li, Chunfu Jia, Zoe L. Jiang in Information Security and Privacy (2016)