Cong Wang
Cong Wang
Correu electrònic verificat a cityu.edu.hk - Pàgina d'inici
Títol
Citada per
Citada per
Any
Ensuring data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009
2637*2009
Privacy-preserving public auditing for data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
INFOCOM, 2010 Proceedings IEEE, 1-9, 2010
26222010
Achieving secure, scalable, and fine-grained data access control in cloud computing
S Yu, C Wang, K Ren, W Lou
INFOCOM, 2010 Proceedings IEEE, 1-9, 2010
23162010
Privacy-preserving multi-keyword ranked search over encrypted cloud data
N Cao, C Wang, M Li, K Ren, W Lou
INFOCOM, 2011 Proceedings IEEE, 829-837, 2011
16722011
Privacy-preserving public auditing for secure cloud storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on computers 62 (2), 362-375, 2013
14002013
Enabling public auditability and data dynamics for storage security in cloud computing
Q Wang, C Wang, K Ren, W Lou, J Li
IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2011
12962011
Enabling public verifiability and data dynamics for storage security in cloud computing
Q Wang, C Wang, J Li, K Ren, W Lou
European symposium on research in computer security, 355-370, 2009
12922009
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
Cryptology ePrint Archive, Report 2009/593, 2009
1107*2009
Fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
INFOCOM, 2010 Proceedings IEEE, 1-5, 2010
10762010
Secure ranked keyword search over encrypted cloud data
C Wang, N Cao, J Li, K Ren, W Lou
Distributed Computing Systems (ICDCS), 2010 IEEE 30th International …, 2010
9222010
Attribute based data sharing with attribute revocation
S Yu, C Wang, K Ren, W Lou
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
9182010
Security challenges for the public cloud
K Ren, C Wang, Q Wang
IEEE Internet Computing 16 (1), 69-73, 2012
8842012
Toward secure and dependable storage services in cloud computing
C Wang, Q Wang, K Ren, N Cao, W Lou
IEEE transactions on Services Computing 5 (2), 220-232, 2012
8542012
Enabling secure and efficient ranked keyword search over outsourced cloud data
C Wang, N Cao, K Ren, W Lou
IEEE Transactions on parallel and distributed systems 23 (8), 1467-1479, 2012
6002012
Toward publicly auditable secure cloud data storage services
C Wang, K Ren, W Lou, J Li
IEEE network 24 (4), 2010
5672010
Secure and practical outsourcing of linear programming in cloud computing
C Wang, K Ren, J Wang
INFOCOM, 2011 Proceedings IEEE, 820-828, 2011
3622011
Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data
C Wang, K Ren, S Yu, KMR Urs
IEEE INFOCOM, 2012, 0
342*
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
Z Fu, F Huang, K Ren, J Weng, C Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017
248*2017
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
C Wang, K Ren, J Wang, Q Wang
IEEE TPDS 24 (6), 1172-1181, 2013
191*2013
Enabling cloud storage auditing with key-exposure resistance
J Yu, K Ren, C Wang, V Varadharajan
IEEE Transactions on Information forensics and security 10 (6), 1167-1179, 2015
1482015
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20