Follow
Cong Wang
Cong Wang
Department of Computer Science, City University of Hong Kong
Verified email at cityu.edu.hk - Homepage
Title
Cited by
Cited by
Year
Ensuring data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009
3031*2009
Privacy-preserving public auditing for data storage security in cloud computing
C Wang, Q Wang, K Ren, W Lou
2010 proceedings ieee infocom, 1-9, 2010
30142010
Achieving secure, scalable, and fine-grained data access control in cloud computing
S Yu, C Wang, K Ren, W Lou
2010 Proceedings IEEE INFOCOM, 1-9, 2010
26262010
Privacy-preserving multi-keyword ranked search over encrypted cloud data
N Cao, C Wang, M Li, K Ren, W Lou
INFOCOM, 2011 Proceedings IEEE, 829-837, 2011
20722011
Privacy-preserving public auditing for secure cloud storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on computers 62 (2), 362-375, 2013
17702013
Enabling public auditability and data dynamics for storage security in cloud computing
Q Wang, C Wang, K Ren, W Lou, J Li
IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2011
15282011
Enabling public verifiability and data dynamics for storage security in cloud computing
Q Wang, C Wang, J Li, K Ren, W Lou
European symposium on research in computer security, 355-370, 2009
14642009
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
Cryptology ePrint Archive, Report 2009/593, 2009
1326*2009
Fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
2010 Proceedings IEEE INFOCOM, 1-5, 2010
12892010
Security challenges for the public cloud
K Ren, C Wang, Q Wang
IEEE Internet Computing 16 (1), 69-73, 2012
11082012
Secure ranked keyword search over encrypted cloud data
C Wang, N Cao, J Li, K Ren, W Lou
2010 IEEE 30th international conference on distributed computing systems …, 2010
10812010
Attribute based data sharing with attribute revocation
S Yu, C Wang, K Ren, W Lou
Proceedings of the 5th ACM symposium on information, computer and …, 2010
10282010
Toward secure and dependable storage services in cloud computing
C Wang, Q Wang, K Ren, N Cao, W Lou
IEEE transactions on Services Computing 5 (2), 220-232, 2012
9852012
Enabling secure and efficient ranked keyword search over outsourced cloud data
C Wang, N Cao, K Ren, W Lou
IEEE Transactions on parallel and distributed systems 23 (8), 1467-1479, 2012
7232012
Toward publicly auditable secure cloud data storage services
C Wang, K Ren, W Lou, J Li
IEEE network 24 (4), 19-24, 2010
6232010
Secure and practical outsourcing of linear programming in cloud computing
C Wang, K Ren, J Wang
2011 Proceedings IEEE Infocom, 820-828, 2011
4312011
Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data
C Wang, K Ren, S Yu, KMR Urs
IEEE INFOCOM, 2012, 0
405*
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
Z Fu, F Huang, K Ren, J Weng, C Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017
305*2017
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
C Wang, K Ren, J Wang, Q Wang
IEEE TPDS 24 (6), 1172-1181, 2013
233*2013
Enabling cloud storage auditing with key-exposure resistance
J Yu, K Ren, C Wang, V Varadharajan
IEEE Transactions on Information forensics and security 10 (6), 1167-1179, 2015
2072015
The system can't perform the operation now. Try again later.
Articles 1–20