Cong Wang
Title
Cited by
Cited by
Year
Ensuring data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009
2951*2009
Privacy-preserving public auditing for data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
INFOCOM, 2010 Proceedings IEEE, 1-9, 2010
29362010
Achieving secure, scalable, and fine-grained data access control in cloud computing
S Yu, C Wang, K Ren, W Lou
INFOCOM, 2010 Proceedings IEEE, 1-9, 2010
25142010
Privacy-preserving multi-keyword ranked search over encrypted cloud data
N Cao, C Wang, M Li, K Ren, W Lou
INFOCOM, 2011 Proceedings IEEE, 829-837, 2011
19332011
Privacy-preserving public auditing for secure cloud storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on computers 62 (2), 362-375, 2013
16312013
Enabling public auditability and data dynamics for storage security in cloud computing
Q Wang, C Wang, K Ren, W Lou, J Li
IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2011
14462011
Enabling public verifiability and data dynamics for storage security in cloud computing
Q Wang, C Wang, J Li, K Ren, W Lou
European symposium on research in computer security, 355-370, 2009
14182009
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
Cryptology ePrint Archive, Report 2009/593, 2009
1247*2009
Fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
INFOCOM, 2010 Proceedings IEEE, 1-5, 2010
12112010
Secure ranked keyword search over encrypted cloud data
C Wang, N Cao, J Li, K Ren, W Lou
Distributed Computing Systems (ICDCS), 2010 IEEE 30th International …, 2010
10302010
Security challenges for the public cloud
K Ren, C Wang, Q Wang
IEEE Internet Computing 16 (1), 69-73, 2012
10122012
Attribute based data sharing with attribute revocation
S Yu, C Wang, K Ren, W Lou
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
10062010
Toward secure and dependable storage services in cloud computing
C Wang, Q Wang, K Ren, N Cao, W Lou
IEEE transactions on Services Computing 5 (2), 220-232, 2012
9612012
Enabling secure and efficient ranked keyword search over outsourced cloud data
C Wang, N Cao, K Ren, W Lou
IEEE Transactions on parallel and distributed systems 23 (8), 1467-1479, 2012
6832012
Toward publicly auditable secure cloud data storage services
C Wang, K Ren, W Lou, J Li
IEEE network 24 (4), 2010
6062010
Secure and practical outsourcing of linear programming in cloud computing
C Wang, K Ren, J Wang
INFOCOM, 2011 Proceedings IEEE, 820-828, 2011
4072011
Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data
C Wang, K Ren, S Yu, KMR Urs
IEEE INFOCOM, 2012, 0
379*
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
Z Fu, F Huang, K Ren, J Weng, C Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017
273*2017
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
C Wang, K Ren, J Wang, Q Wang
IEEE TPDS 24 (6), 1172-1181, 2013
216*2013
Enabling cloud storage auditing with key-exposure resistance
J Yu, K Ren, C Wang, V Varadharajan
IEEE Transactions on Information forensics and security 10 (6), 1167-1179, 2015
1822015
The system can't perform the operation now. Try again later.
Articles 1–20