Остановите войну!
for scientists:
default search action
Wenjing Lou
- > Home > Persons > Wenjing Lou
Publications
- 2021
- [j118]Tong Li, Jin Li, Xiaofeng Chen, Zheli Liu, Wenjing Lou, Y. Thomas Hou:
NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning. IEEE Trans. Dependable Secur. Comput. 18(6): 2969-2982 (2021) - 2019
- [j107]Xueqin Liang, Zheng Yan, Xiaofeng Chen, Laurence T. Yang, Wenjing Lou, Y. Thomas Hou:
Game Theoretical Analysis on Encrypted Cloud Data Deduplication. IEEE Trans. Ind. Informatics 15(10): 5778-5789 (2019) - 2017
- [j92]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Secure and Efficient Cloud Data Deduplication With Randomized Tag. IEEE Trans. Inf. Forensics Secur. 12(3): 532-543 (2017) - 2016
- [j86]Liang Liu, Xiaofeng Chen, Wenjing Lou:
Secure three-party computational protocols for triangle area. Int. J. Inf. Sec. 15(1): 1-13 (2016) - [j82]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. IEEE Trans. Computers 65(10): 3184-3195 (2016) - [c100]Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou:
Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375 - 2015
- [j70]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
New access control systems based on outsourced attribute-based encryption. J. Comput. Secur. 23(6): 659-683 (2015) - [j66]Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Wenjing Lou:
Identity-Based Encryption with Outsourced Revocation in Cloud Computing. IEEE Trans. Computers 64(2): 425-437 (2015) - [j65]Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:
New Publicly Verifiable Databases with Efficient Updates. IEEE Trans. Dependable Secur. Comput. 12(5): 546-556 (2015) - [j64]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Inf. Forensics Secur. 10(1): 69-78 (2015) - [j62]Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou:
A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Trans. Parallel Distributed Syst. 26(5): 1206-1216 (2015) - 2014
- [j60]Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37: 252-258 (2014) - [j57]Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, Wenjing Lou:
Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans. Parallel Distributed Syst. 25(6): 1615-1625 (2014) - [j56]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distributed Syst. 25(9): 2386-2396 (2014) - [c84]Liang Liu, Xiaofeng Chen, Wenjing Lou:
A Secure Three-Party Computational Protocol for Triangle Area. ACISP 2014: 82-97 - [c83]Haixin Nie, Xiaofeng Chen, Jin Li, Josolph Liu, Wenjing Lou:
Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming. AINA 2014: 591-596 - [c81]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. ESORICS (1) 2014: 148-162 - 2013
- [c70]Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou:
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. ESORICS 2013: 592-609 - 2012
- [c58]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. ESORICS 2012: 541-556
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint