scispace - formally typeset
W

Wai Kit Wong

Researcher at University of Hong Kong

Publications -  15
Citations -  1153

Wai Kit Wong is an academic researcher from University of Hong Kong. The author has contributed to research in topics: Encryption & Service provider. The author has an hindex of 8, co-authored 15 publications receiving 981 citations. Previous affiliations of Wai Kit Wong include Hang Seng Management College.

Papers
More filters
Proceedings ArticleDOI

Secure kNN computation on encrypted databases

TL;DR: A new asymmetric scalar-product-preserving encryption (ASPE) that preserves a special type of scalar product and is shown to resist practical attacks of a different background knowledge level, at a different overhead cost.
Proceedings ArticleDOI

Secure query processing with data interoperability in a cloud database environment

TL;DR: A secure query processing system (SDB) on relational tables and a set of elementary operators on encrypted data that allow data interoperability, which allows a wide range of SQL queries to be processed by the SP on encrypted information is proposed.
Proceedings Article

Security in outsourcing of association rule mining

TL;DR: This paper proposes a more secure encryption scheme based on a one-to-n item mapping that transforms transactions non-deterministically, yet guarantees correct decryption and develops an effective and efficient encryption algorithm based on this method.
Proceedings ArticleDOI

Non-homogeneous generalization in privacy preserving data publishing

TL;DR: This work provides a methodology for verifying whether a non-homogeneous generalization violates k-anonymity, and proposes a randomization method that prevents this type of attack and shows that k-Anonymity is not compromised by it.
Journal ArticleDOI

An audit environment for outsourcing of frequent itemset mining

TL;DR: This work proposes and develops an audit environment, which consists of a database transformation method and a result verification method that addresses the integrity issue in the outsourcing process, i.e., how the data owner verifies the correctness of the mining results.