Ensuring data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009 | 2787* | 2009 |
Privacy-preserving public auditing for data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou INFOCOM, 2010 Proceedings IEEE, 1-9, 2010 | 2773 | 2010 |
Achieving secure, scalable, and fine-grained data access control in cloud computing S Yu, C Wang, K Ren, W Lou INFOCOM, 2010 Proceedings IEEE, 1-9, 2010 | 2431 | 2010 |
Privacy-preserving multi-keyword ranked search over encrypted cloud data N Cao, C Wang, M Li, K Ren, W Lou INFOCOM, 2011 Proceedings IEEE, 829-837, 2011 | 1816 | 2011 |
Privacy-preserving public auditing for secure cloud storage C Wang, SSM Chow, Q Wang, K Ren, W Lou IEEE Transactions on computers 62 (2), 362-375, 2013 | 1539 | 2013 |
Enabling public auditability and data dynamics for storage security in cloud computing Q Wang, C Wang, K Ren, W Lou, J Li IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2011 | 1370 | 2011 |
Enabling public verifiability and data dynamics for storage security in cloud computing Q Wang, C Wang, J Li, K Ren, W Lou European symposium on research in computer security, 355-370, 2009 | 1368 | 2009 |
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing J Li, Q Wang, C Wang, N Cao, K Ren, W Lou Cryptology ePrint Archive, Report 2009/593, 2009 | 1188* | 2009 |
Fuzzy keyword search over encrypted data in cloud computing J Li, Q Wang, C Wang, N Cao, K Ren, W Lou INFOCOM, 2010 Proceedings IEEE, 1-5, 2010 | 1155 | 2010 |
Secure ranked keyword search over encrypted cloud data C Wang, N Cao, J Li, K Ren, W Lou Distributed Computing Systems (ICDCS), 2010 IEEE 30th International …, 2010 | 978 | 2010 |
Attribute based data sharing with attribute revocation S Yu, C Wang, K Ren, W Lou Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 975 | 2010 |
Security challenges for the public cloud K Ren, C Wang, Q Wang IEEE Internet Computing 16 (1), 69-73, 2012 | 953 | 2012 |
Toward secure and dependable storage services in cloud computing C Wang, Q Wang, K Ren, N Cao, W Lou IEEE transactions on Services Computing 5 (2), 220-232, 2012 | 910 | 2012 |
Enabling secure and efficient ranked keyword search over outsourced cloud data C Wang, N Cao, K Ren, W Lou IEEE Transactions on parallel and distributed systems 23 (8), 1467-1479, 2012 | 652 | 2012 |
Toward publicly auditable secure cloud data storage services C Wang, K Ren, W Lou, J Li IEEE network 24 (4), 2010 | 579 | 2010 |
Secure and practical outsourcing of linear programming in cloud computing C Wang, K Ren, J Wang INFOCOM, 2011 Proceedings IEEE, 820-828, 2011 | 390 | 2011 |
Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data C Wang, K Ren, S Yu, KMR Urs IEEE INFOCOM, 2012, 0 | 361* | |
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data Z Fu, F Huang, K Ren, J Weng, C Wang IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017 | 259* | 2017 |
Harnessing the cloud for securely outsourcing large-scale systems of linear equations C Wang, K Ren, J Wang, Q Wang IEEE TPDS 24 (6), 1172-1181, 2013 | 207* | 2013 |
Enabling cloud storage auditing with key-exposure resistance J Yu, K Ren, C Wang, V Varadharajan IEEE Transactions on Information forensics and security 10 (6), 1167-1179, 2015 | 167 | 2015 |