


default search action
Wenjing Lou
- > Home > Persons > Wenjing Lou
Publications
- 2014
- [j58]Ning Cao, Cong Wang
, Ming Li, Kui Ren
, Wenjing Lou:
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distributed Syst. 25(1): 222-233 (2014) - 2013
- [j53]Ming Li, Shucheng Yu
, Kui Ren
, Wenjing Lou, Y. Thomas Hou
:
Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4): 1-0 (2013) - [j52]Cong Wang
, Sherman S. M. Chow
, Qian Wang
, Kui Ren
, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers 62(2): 362-375 (2013) - [j50]Ming Li, Shucheng Yu
, Joshua D. Guttman
, Wenjing Lou, Kui Ren
:
Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Networks 9(2): 18:1-18:35 (2013) - [j49]Ming Li, Shucheng Yu
, Yao Zheng
, Kui Ren
, Wenjing Lou:
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Trans. Parallel Distributed Syst. 24(1): 131-143 (2013) - 2012
- [j44]Cong Wang
, Ning Cao, Kui Ren
, Wenjing Lou:
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Trans. Parallel Distributed Syst. 23(8): 1467-1479 (2012) - [j43]Cong Wang
, Qian Wang
, Kui Ren
, Ning Cao, Wenjing Lou:
Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Serv. Comput. 5(2): 220-232 (2012) - 2011
- [j36]Qian Wang
, Kui Ren
, Shucheng Yu
, Wenjing Lou:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. ACM Trans. Sens. Networks 8(1): 9:1-9:24 (2011) - [j35]Shucheng Yu
, Kui Ren
, Wenjing Lou:
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 22(4): 673-686 (2011) - [j34]Qian Wang
, Cong Wang
, Kui Ren
, Wenjing Lou, Jin Li:
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 22(5): 847-859 (2011) - [c47]Ning Cao, Zhenyu Yang, Cong Wang
, Kui Ren
, Wenjing Lou:
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. ICDCS 2011: 393-402 - [c46]Ning Cao, Cong Wang
, Ming Li, Kui Ren
, Wenjing Lou:
Privacy-preserving multi-keyword ranked search over encrypted cloud data. INFOCOM 2011: 829-837 - [r2]Shucheng Yu, Wenjing Lou, Kui Ren:
Privacy-Preserving Authentication in Wireless Access Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 972-974 - [r1]Ming Li, Wenjing Lou, Kui Ren:
Secure Device Pairing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1111-1115 - 2010
- [j32]Shucheng Yu
, Kui Ren
, Wenjing Lou:
Attribute-based on-demand multicast group setup with membership anonymity. Comput. Networks 54(3): 377-386 (2010) - [j31]Cong Wang
, Kui Ren
, Wenjing Lou, Jin Li:
Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4): 19-24 (2010) - [j30]Kui Ren
, Shucheng Yu
, Wenjing Lou, Yanchao Zhang:
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. IEEE Trans. Parallel Distributed Syst. 21(2): 203-215 (2010) - [j28]Ming Li, Wenjing Lou, Kui Ren
:
Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1): 51-58 (2010) - [c44]Shucheng Yu
, Cong Wang
, Kui Ren
, Wenjing Lou:
Attribute based data sharing with attribute revocation. AsiaCCS 2010: 261-270 - [c43]Ning Cao, Qian Wang
, Kui Ren
, Wenjing Lou:
Distributed Storage Coding for Flexible and Efficient Data Dissemination and Retrieval in Wireless Sensor Networks. ICC 2010: 1-5 - [c42]Cong Wang
, Ning Cao, Jin Li, Kui Ren
, Wenjing Lou:
Secure Ranked Keyword Search over Encrypted Cloud Data. ICDCS 2010: 253-262 - [c40]Jin Li, Qian Wang
, Cong Wang
, Ning Cao, Kui Ren
, Wenjing Lou:
Fuzzy Keyword Search over Encrypted Data in Cloud Computing. INFOCOM 2010: 441-445 - [c38]Cong Wang
, Qian Wang
, Kui Ren
, Wenjing Lou:
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. INFOCOM 2010: 525-533 - [c37]Shucheng Yu
, Cong Wang
, Kui Ren
, Wenjing Lou:
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. INFOCOM 2010: 534-542 - [c36]Ming Li, Shucheng Yu
, Wenjing Lou, Kui Ren
:
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. INFOCOM 2010: 2651-2659 - [c35]Ming Li, Shucheng Yu
, Kui Ren
, Wenjing Lou:
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. SecureComm 2010: 89-106 - 2009
- [j27]Kui Ren
, Wenjing Lou, Bo Zhu, Sushil Jajodia:
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation. IEEE Trans. Veh. Technol. 58(4): 2018-2029 (2009) - [j25]Kui Ren
, Shucheng Yu
, Wenjing Lou, Yanchao Zhang:
Multi-User Broadcast Authentication in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 58(8): 4554-4564 (2009) - [j24]Wenjing Lou, Kui Ren
:
Security, privacy, and accountability in wireless access networks. IEEE Wirel. Commun. 16(4): 80-87 (2009) - [j23]Kai Zeng, Kui Ren
, Wenjing Lou, Patrick J. Moran:
Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply. Wirel. Networks 15(1): 39-51 (2009) - [c34]Qian Wang
, Cong Wang
, Jin Li, Kui Ren
, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS 2009: 355-370 - [c31]Qian Wang
, Kui Ren
, Wenjing Lou, Yanchao Zhang:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. INFOCOM 2009: 954-962 - [c30]Shucheng Yu
, Kui Ren
, Wenjing Lou:
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. INFOCOM 2009: 963-971 - [c29]Cong Wang
, Qian Wang
, Kui Ren
, Wenjing Lou:
Ensuring data storage security in Cloud Computing. IWQoS 2009: 1-9 - [c27]Shucheng Yu
, Kui Ren
, Wenjing Lou, Jin Li:
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. SecureComm 2009: 311-329 - [i5]Cong Wang, Qian Wang, Kui Ren, Wenjing Lou:
Ensuring Data Storage Security in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 81 (2009) - [i4]Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
Enabling Public Verifiability and Data Dynamics for Storage Security. IACR Cryptol. ePrint Arch. 2009: 281 (2009) - [i3]Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li:
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. IACR Cryptol. ePrint Arch. 2009: 295 (2009) - [i2]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IACR Cryptol. ePrint Arch. 2009: 579 (2009) - [i1]Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou:
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing. IACR Cryptol. ePrint Arch. 2009: 593 (2009) - 2008
- [j20]Kui Ren
, Wenjing Lou, Yanchao Zhang:
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 7(5): 585-598 (2008) - [j19]Kui Ren
, Kai Zeng, Wenjing Lou:
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 7(1): 354-363 (2008) - [c25]Kai Zeng, Shucheng Yu
, Kui Ren
, Wenjing Lou, Yanchao Zhang:
Towards Secure Link Quality Measurement in Multihop Wireless Networks. GLOBECOM 2008: 4946-4950 - [c24]Kui Ren
, Wenjing Lou:
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. ICDCS 2008: 286-294 - [c23]Wei Ren
, Kui Ren
, Wenjing Lou:
Optimized User Revocation for Group Signature Based Privacy-Aware PKI. ICDCS Workshops 2008: 388-393 - [c21]Wei Ren
, Kui Ren
, Wenjing Lou, Yanchao Zhang:
Efficient user revocation for privacy-aware PKI. QSHINE 2008: 11 - [c19]Shucheng Yu
, Kui Ren
, Wenjing Lou:
Attribute-based on-demand multicast group setup with membership anonymity. SecureComm 2008: 18 - [c18]Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel:
Anonymous ID-Based Group Key Agreement for Wireless Networks. WCNC 2008: 2615-2620 - 2007
- [j17]Kui Ren
, Wenjing Lou:
Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. Mob. Networks Appl. 12(1): 79-92 (2007) - [j15]Kui Ren
, Wenjing Lou, Kai Zeng, Patrick J. Moran:
On Broadcast Authentication in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 6(11): 4136-4144 (2007) - [c16]Kui Ren
, Wenjing Lou, Yanchao Zhang:
Multi-user Broadcast Authentication in Wireless Sensor Networks. SECON 2007: 223-232 - 2006
- [j13]Kui Ren
, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
:
Routing optimization security in mobile IPv6. Comput. Networks 50(13): 2401-2419 (2006) - [j8]Kui Ren
, Wenjing Lou, Kwangjo Kim, Robert H. Deng
:
A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Trans. Veh. Technol. 55(4): 1373-1384 (2006) - [j6]Kui Ren
, Kai Zeng, Wenjing Lou:
A new approach for random key pre-distribution in large-scale wireless sensor networks. Wirel. Commun. Mob. Comput. 6: 307-318 (2006) - [c15]Kui Ren
, Kai Zeng, Wenjing Lou:
Fault-tolerant Event Boundary Detection in Wireless Sensor Networks. GLOBECOM 2006 - [c14]Kui Ren
, Wenjing Lou, Yanchao Zhang:
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. INFOCOM 2006 - [c13]Kai Zeng, Kui Ren
, Wenjing Lou, Patrick J. Moran:
Energy-aware geographic routing in lossy wireless sensor networks with environmental energy supply. QSHINE 2006: 8 - [c12]Kui Ren, Kai Zeng, Wenjing Lou, Patrick J. Moran:
On Broadcast Authentication in Wireless Sensor Networks. WASA 2006: 502-514 - 2005
- [c11]Kui Ren, Wenjing Lou:
Privacy enhanced access control in pervasive computing environments. BROADNETS 2005: 384-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-13 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint