Biblio

Export 53 results:
Sort by:
Filters: Author is Kui Ren  [Clear All Filters]
2013
Li, M., J. G. Shucheng Yu, W. Lou, and K. Ren, "Secure ad-hoc trust initialization and key management in wireless body area networks", ACM Transactions on Sensor Networks (ToSN), vol. 9, no. 2, pp. 18:1-18:35, 03/2013. Abstract
2012
Wang, C., N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data", IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467-1479, 8/2012. Abstract
Wang, C., Q. Wang, K. Ren, and W. Lou, "Towards secure and dependable storage services in cloud computing", IEEE Transactions on Service Computing (TSC), vol. 5, no. 2, pp. 220-232, 2012. Abstract
2011
Wang, Q., K. Ren, S. Yu, and W. Lou, "Dependable and secure sensor data storage with dynamic integrity assurance", ACM Transactions on Senor Networks (ToSN), vol. 8, no. 1, 08/2011.
Yu, S., K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks", IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 4, 05/2011.
2010
Li, M., S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings", 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, 09/2010.
Wang, C., K. Ren, W. Lou, and J. Li, "Towards publicly auditable secure cloud data storage services", IEEE Networks Magazine special issue on Future Internet: New Applications and Emerging Services, vol. 24, no. 4, 07/2010.
Yu, S., K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation", 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, 04/2010.
Li, M., W. Lou, and K. Ren, "Data security and privacy in wireless body area networks", IEEE Wireless Communications special issue on Wireless Technologies for E-healthcare, vol. 17, no. 1, 02/2010.
Yu, S., W. Lou, and K. Ren, "Privacy-preserving user authentication in wireless access networks", Encyclopedia of Cryptography and Security (2nd ed.): Springer, 2010.
Li, M., W. Lou, and K. Ren, "Secure device pairing,” in Encyclopedia of Cryptography and Security (2nd ed.)", Encyclopedia of Cryptography and Security (2nd ed.): Springer, 2010.
2009
Wang, Q., K. Ren, C. Wang, and W. Lou, "Efficient fine-grained data access control in wireless sensor networks", IEEE Military Communication Conference (MILCOM 2009), Boston, MA, 10/2009.
Ren, K., S. Yu, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks", IEEE Transactions on Vehicular Technology, vol. 58, no. 8, 10/2009.
Yu, S., K. Ren, W. Lou, and J. Li, "Defending against key abuse attacks in KP-ABE enabled broadcast systems", The 5th International ICST Conference on Security and Privacy in Communication Networks (Securecomm 2009), Athens, Greece, 09/2009.
Lou, W., and K. Ren, "Security, privacy, and accountability in wireless access networks", IEEE Wireless Communications, vol. 16, no. 4, 08/2009.
Wang, C., Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing", 17th IEEE International Workshop on Quality of Service (IWQoS 2009), Charleston, South Carolina, 07/2009.
Yu, S., K. Ren, and W. Lou, "Accountable attribute-based broadcast", IEEE Symposium on Security and Privacy (S&P 2009), Oakland, CA, 05/2009.