Boyang Wang
Title
Cited by
Cited by
Year
Oruta: Privacy-preserving public auditing for shared data in the cloud
B Wang, B Li, H Li
Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 295-302, 2012
6312012
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE Transactions on Services Computing, 1-1, 2014
5302014
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE INFOCOM, 2904-2912, 2013
530*2013
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
X Liu, Y Zhang, B Wang, J Yan
IEEE Transactions on Parallel and Distributed Systems (TPDS) 6 (24), 1182-1191, 2013
4192013
Knox: privacy-preserving auditing for shared data with large groups in the cloud
B Wang, B Li, H Li
International Conference on Applied Cryptography and Network Security, 507-525, 2012
2482012
Storing shared data on the cloud via security-mediator
B Wang, SSM Chow, M Li, H Li
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
2272013
Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
B Wang, H Li, M Li
IEEE ICC, 539--543, 2013
1032013
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index
B Wang, Y Hou, M Li, H Wang, H Li
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
962014
Certificateless Public Auditing for Data Integrity in the Cloud
B Wang, B Li, H Li
IEEE CNS, 276--284, 2013
942013
Computing encrypted cloud data efficiently under multiple keys
B Wang, M Li, SSM Chow, H Li
2013 IEEE Conference on Communications and Network Security (CNS), 504-513, 2013
912013
Geometric Range Search on Encrypted Spatial Data
B Wang, M Li, H Wang
IEEE Transactions on Information Forensics and Security, 2016
762016
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data
B Wang, Y Hou, M Li
IEEE International Conference on Computer Communications, 2016
552016
Circular Range Search on Encrypted Spatial Data
B Wang, M Li, H Wang, H Li
IEEE Conference on Communications and Network Security (CNS), 2015, 2015
542015
A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys
B Wang, M Li, S Chow, H Li
2nd IEEE Conference on Communications and Network Security, 2014
522014
Comments on a public auditing mechanism for shared cloud data service
Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li
IEEE Transactions on Services Computing 8 (6), 998-999, 2015
472015
On the security of a public auditing mechanism for shared cloud data service
Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li
IEEE Transactions on Services Computing 8 (6), 998-999, 2014
47*2014
An anonymous data aggregation scheme for smart grid systems
X Liu, Y Zhang, B Wang, H Wang
Security and Communication Networks 7 (3), 602-610, 2014
312014
Efficient public verification on the integrity of multi-owner data in the cloud
B Wang, H Li, X Liu, F Li, X Li
Journal of Communications and Networks 16 (6), 592-599, 2014
292014
Toward practical privacy-preserving frequent itemset mining on encrypted cloud data
S Qiu, B Wang, M Li, J Liu, Y Shi
IEEE Transactions on Cloud Computing, 2017
242017
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
B Wang, M Li, L Xiong
IEEE Transactions on Dependable and Secure Computing, 2017
232017
The system can't perform the operation now. Try again later.
Articles 1–20