Boyang Wang
Title
Cited by
Cited by
Year
Oruta: Privacy-preserving public auditing for shared data in the cloud
B Wang, B Li, H Li
Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 295-302, 2012
6082012
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE Transactions on Services Computing, 1-1, 2014
5002014
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
B Wang, B Li, H Li
IEEE INFOCOM, 2904-2912, 2013
500*2013
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
X Liu, Y Zhang, B Wang, J Yan
IEEE Transactions on Parallel and Distributed Systems (TPDS) 6 (24), 1182-1191, 2013
4012013
Knox: privacy-preserving auditing for shared data with large groups in the cloud
B Wang, B Li, H Li
International Conference on Applied Cryptography and Network Security, 507-525, 2012
2412012
Storing shared data on the cloud via security-mediator
B Wang, SSM Chow, M Li, H Li
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
2212013
Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
B Wang, H Li, M Li
IEEE ICC, 539--543, 2013
972013
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index
B Wang, Y Hou, M Li, H Wang, H Li
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
922014
Computing encrypted cloud data efficiently under multiple keys
B Wang, M Li, SSM Chow, H Li
2013 IEEE Conference on Communications and Network Security (CNS), 504-513, 2013
882013
Certificateless Public Auditing for Data Integrity in the Cloud
B Wang, B Li, H Li
IEEE CNS, 276--284, 2013
872013
Geometric Range Search on Encrypted Spatial Data
B Wang, M Li, H Wang
IEEE Transactions on Information Forensics and Security, 2016
692016
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data
B Wang, Y Hou, M Li
IEEE International Conference on Computer Communications, 2016
512016
A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys
B Wang, M Li, S Chow, H Li
2nd IEEE Conference on Communications and Network Security, 2014
492014
Circular Range Search on Encrypted Spatial Data
B Wang, M Li, H Wang, H Li
IEEE Conference on Communications and Network Security (CNS), 2015, 2015
482015
Comments on a public auditing mechanism for shared cloud data service
Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li
IEEE Transactions on Services Computing 8 (6), 998-999, 2015
442015
On the security of a public auditing mechanism for shared cloud data service
Y Yu, J Ni, MH Au, Y Mu, B Wang, H Li
IEEE Transactions on Services Computing 8 (6), 998-999, 2014
44*2014
An anonymous data aggregation scheme for smart grid systems
X Liu, Y Zhang, B Wang, H Wang
Security and Communication Networks 7 (3), 602-610, 2014
292014
Efficient public verification on the integrity of multi-owner data in the cloud
B Wang, H Li, X Liu, F Li, X Li
Journal of Communications and Networks 16 (6), 592-599, 2014
262014
Toward practical privacy-preserving frequent itemset mining on encrypted cloud data
S Qiu, B Wang, M Li, J Liu, Y Shi
IEEE Transactions on Cloud Computing, 2017
212017
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
B Wang, M Li, L Xiong
IEEE Transactions on Dependable and Secure Computing, 2017
202017
The system can't perform the operation now. Try again later.
Articles 1–20