Ensuring data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009 | 3251* | 2009 |
Achieving secure, scalable, and fine-grained data access control in cloud computing S Yu, C Wang, K Ren, W Lou 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 2783 | 2010 |
Privacy-preserving public auditing for data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou 2010 proceedings ieee infocom, 1-9, 2010 | 2294 | 2010 |
Privacy-preserving public auditing for data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou 2010 proceedings ieee infocom, 1-9, 2010 | 2294 | 2010 |
Privacy-preserving multi-keyword ranked search over encrypted cloud data N Cao, C Wang, M Li, K Ren, W Lou INFOCOM, 2011 Proceedings IEEE, 829-837, 2011 | 2281 | 2011 |
Privacy-preserving public auditing for secure cloud storage C Wang, SSM Chow, Q Wang, K Ren, W Lou IEEE Transactions on computers 62 (2), 362-375, 2013 | 1992 | 2013 |
Enabling public auditability and data dynamics for storage security in cloud computing Q Wang, C Wang, K Ren, W Lou, J Li IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2011 | 1693 | 2011 |
Enabling public verifiability and data dynamics for storage security in cloud computing Q Wang, C Wang, J Li, K Ren, W Lou Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 1584 | 2009 |
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing J Li, Q Wang, C Wang, N Cao, K Ren, W Lou Cryptology ePrint Archive, Report 2009/593, 2009 | 1408* | 2009 |
Fuzzy keyword search over encrypted data in cloud computing J Li, Q Wang, C Wang, N Cao, K Ren, W Lou 2010 Proceedings IEEE INFOCOM, 1-5, 2010 | 1369 | 2010 |
Security challenges for the public cloud K Ren, C Wang, Q Wang IEEE Internet Computing 16 (1), 69-73, 2012 | 1241 | 2012 |
Secure ranked keyword search over encrypted cloud data C Wang, N Cao, J Li, K Ren, W Lou 2010 IEEE 30th international conference on distributed computing systems …, 2010 | 1139 | 2010 |
Attribute based data sharing with attribute revocation S Yu, C Wang, K Ren, W Lou Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 1085 | 2010 |
Toward secure and dependable storage services in cloud computing C Wang, Q Wang, K Ren, N Cao, W Lou IEEE transactions on Services Computing 5 (2), 220-232, 2012 | 1070 | 2012 |
Enabling secure and efficient ranked keyword search over outsourced cloud data C Wang, N Cao, K Ren, W Lou IEEE Transactions on parallel and distributed systems 23 (8), 1467-1479, 2012 | 786 | 2012 |
Toward publicly auditable secure cloud data storage services C Wang, K Ren, W Lou, J Li IEEE network 24 (4), 19-24, 2010 | 658 | 2010 |
Secure and practical outsourcing of linear programming in cloud computing C Wang, K Ren, J Wang 2011 Proceedings Ieee Infocom, 820-828, 2011 | 459 | 2011 |
Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data C Wang, K Ren, S Yu, KMR Urs IEEE INFOCOM, 2012, 0 | 438* | |
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data Z Fu, F Huang, K Ren, J Weng, C Wang IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017 | 339* | 2017 |
Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization S Hu, C Cai, Q Wang, C Wang, X Luo, K Ren IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 792-800, 2018 | 260 | 2018 |