1.Balancing Performance, Accuracy, and Precision for Secure loud Transactions
2.Building Confidential and Efficient Query Services in the Cloudwith RASP Data Perturbation
3.Consistency as a Service: Auditing Cloud Consistency
4.Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
5.Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
6.Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
2.Building Confidential and Efficient Query Services in the Cloudwith RASP Data Perturbation
3.Consistency as a Service: Auditing Cloud Consistency
4.Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
5.Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
6.Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1.An Empirical Performance Evaluation of Relational Keyword Search Techniques
2. Product Aspect Ranking and Its Applications
3. Secure Mining of Association Rules in Horizontally Distributed Databases
4.Supporting Privacy Protection in Personalized Web Search
5.TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
6.Typicality-Based Collaborative Filtering Recommendation
1.A System for Denial-of-Service Attack Detection Based onMultivariate Correlation Analysis
2. An Error-Minimizing Framework for Localizing Jammers inWireless Networks
3. Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
4. Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
5. Multicast Capacity in MANET with Infrastructure Support
6. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks