Ensuring data storage security in cloud computing C Wang, Q Wang, K Ren, W Lou Quality of Service, 2009. IWQoS. 17th International Workshop on, 1-9, 2009 | 3257* | 2009 |
Achieving secure, scalable, and fine-grained data access control in cloud computing S Yu, C Wang, K Ren, W Lou 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 2778 | 2010 |
Privacy-preserving multi-keyword ranked search over encrypted cloud data N Cao, C Wang, M Li, K Ren, W Lou IEEE Transactions on parallel and distributed systems 25 (1), 222-233, 2013 | 2326 | 2013 |
Privacy-preserving public auditing for secure cloud storage C Wang, SSM Chow, Q Wang, K Ren, W Lou IEEE transactions on computers 62 (2), 362-375, 2011 | 2000 | 2011 |
Enabling public auditability and data dynamics for storage security in cloud computing Q Wang, C Wang, K Ren, W Lou, J Li IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2010 | 1718 | 2010 |
Enabling public verifiability and data dynamics for storage security in cloud computing Q Wang, C Wang, J Li, K Ren, W Lou Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 1597 | 2009 |
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption M Li, S Yu, Y Zheng, K Ren, W Lou IEEE transactions on parallel and distributed systems 24 (1), 131-143, 2012 | 1578 | 2012 |
Fuzzy keyword search over encrypted data in cloud computing J Li, Q Wang, C Wang, N Cao, K Ren, W Lou 2010 Proceedings IEEE INFOCOM, 1-5, 2010 | 1387 | 2010 |
Secure ranked keyword search over encrypted cloud data C Wang, N Cao, J Li, K Ren, W Lou 2010 IEEE 30th international conference on distributed computing systems …, 2010 | 1143 | 2010 |
Attribute based data sharing with attribute revocation S Yu, C Wang, K Ren, W Lou Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 1090 | 2010 |
Toward secure and dependable storage services in cloud computing C Wang, Q Wang, K Ren, N Cao, W Lou IEEE transactions on Services Computing 5 (2), 220-232, 2011 | 1073 | 2011 |
A survey of distributed consensus protocols for blockchain networks Y Xiao, N Zhang, W Lou, YT Hou IEEE Communications Surveys & Tutorials 22 (2), 1432-1465, 2020 | 953 | 2020 |
Secure deduplication with efficient and reliable convergent key management J Li, X Chen, M Li, J Li, PPC Lee, W Lou IEEE transactions on parallel and distributed systems 25 (6), 1615-1625, 2013 | 823 | 2013 |
Data security and privacy in wireless body area networks M Li, W Lou, K Ren IEEE Wireless communications 17 (1), 51-58, 2010 | 813 | 2010 |
Enabling secure and efficient ranked keyword search over outsourced cloud data C Wang, N Cao, K Ren, W Lou IEEE Transactions on parallel and distributed systems 23 (8), 1467-1479, 2011 | 795 | 2011 |
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings M Li, S Yu, K Ren, W Lou Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010 | 695 | 2010 |
Toward publicly auditable secure cloud data storage services C Wang, K Ren, W Lou, J Li IEEE network 24 (4), 19-24, 2010 | 666 | 2010 |
Wireless power transfer and applications to sensor networks L Xie, Y Shi, YT Hou, A Lou IEEE Wireless Communications 20 (4), 140-145, 2013 | 638 | 2013 |
Authorized private keyword search over encrypted data in cloud computing M Li, S Yu, N Cao, W Lou 2011 31st international conference on distributed computing systems, 383-392, 2011 | 579 | 2011 |
A hybrid cloud approach for secure authorized deduplication J Li, YK Li, X Chen, PPC Lee, W Lou IEEE transactions on parallel and distributed systems 26 (5), 1206-1216, 2014 | 572 | 2014 |