Остановите войну!
for scientists:
default search action
Wenhai Sun
- > Home > Persons > Wenhai Sun
Publications
- 2019
- [j4]Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT. IEEE Trans. Inf. Forensics Secur. 14(7): 1830-1842 (2019) - [i1]Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data. CoRR abs/1912.08454 (2019) - 2018
- [c11]Ning Zhang, Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Wade Trappe:
ROSTER: Radio Context Attestation in Cognitive Radio Network. CNS 2018: 1-9 - [c10]Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup. CNS 2018: 1-9 - [c7]Wenhai Sun, Ruide Zhang, Wenjing Lou, Y. Thomas Hou:
REARGUARD: Secure Keyword Search Using Trusted Hardware. INFOCOM 2018: 801-809 - [c6]Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT. SecureComm (1) 2018: 3-21 - 2017
- [c4]Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. INFOCOM 2017: 1-9 - 2016
- [j2]Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud. IEEE Trans. Parallel Distributed Syst. 27(4): 1187-1198 (2016) - 2015
- [c3]Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. INFOCOM 2015: 2110-2118 - 2014
- [j1]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking. IEEE Trans. Parallel Distributed Syst. 25(11): 3025-3035 (2014) - [c2]Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. INFOCOM 2014: 226-234 - [p1]Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing. Secure Cloud Computing 2014: 189-212 - 2013
- [c1]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. AsiaCCS 2013: 71-82
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-18 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint