@inproceedings{wei_yu_2014, title={Integrity assurance for outsourced databases without DBMS modification}, volume={8566}, booktitle={Data and applications security and privacy xxviii}, author={Wei, W. and Yu, T.}, year={2014}, pages={1–16} } @article{zhang_wei_yu_2009, title={On the modeling of honest players in reputation systems}, volume={24}, DOI={10.1007/s11390-009-9271-y}, number={5}, journal={Journal of Computer Science and Technology}, author={Zhang, Q. and Wei, W. and Yu, T.}, year={2009}, pages={808–819} } @inproceedings{wei_du_yu_gu_2009, title={SecureMR: A service integrity assurance framework for map reduce}, DOI={10.1109/acsac.2009.17}, booktitle={25th Annual Computer Security Applications Conference}, author={Wei, W. and Du, J. and Yu, T. and Gu, X. H.}, year={2009}, pages={73–82} }