Cong Wang mainly investigates Server, Information privacy, Encryption, Computer security and Cryptography. His Server research includes themes of Data security and Distributed computing. His Information privacy research is multidisciplinary, incorporating elements of The Internet and Service.
The study incorporates disciplines such as Ranking, Edit distance, Data mining and Database in addition to Encryption. While the research belongs to areas of Computer security, Cong Wang spends his time largely on the problem of Cloud computing security, intersecting his research to questions surrounding Storage security and Data integrity. His studies in Cryptography integrate themes in fields like Information retrieval and Relevance.
The scientist’s investigation covers issues in Encryption, Computer security, Server, Computer network and Cryptography. His study in Encryption is interdisciplinary in nature, drawing from both Scalability, Database and Information privacy. Cong Wang usually deals with Information privacy and limits it to topics linked to Cloud storage and Data integrity.
In his study, Storage security is strongly linked to Cloud computing security, which falls under the umbrella field of Computer security. His Server research incorporates elements of Ciphertext and Distributed computing, Distributed database. Cryptography connects with themes related to Key in his study.
Cong Wang mostly deals with Computer security, Encryption, Server, Blockchain and Cryptography. His Smart contract study in the realm of Computer security interacts with subjects such as Situation awareness. Cong Wang has researched Encryption in several fields, including Scalability and Theoretical computer science.
His study explores the link between Scalability and topics such as Overhead that cross with problems in Data mining, Data integrity and Public-key cryptography. His research in Server intersects with topics in Middlebox, Ciphertext, Information privacy and Distributed computing. The concepts of his Cryptography study are interwoven with issues in Traitor tracing, Inference and Access control.
His main research concerns Encryption, Computer security, Server, Distributed computing and Ciphertext. Cong Wang integrates Encryption with Outsourcing in his study. When carried out as part of a general Computer security research project, his work on Data integrity and Public-key cryptography is frequently linked to work in Global Positioning System and Perception, therefore connecting diverse disciplines of study.
His Server research integrates issues from Plaintext, Homomorphic encryption, Range query and Obfuscation. His Distributed computing research is multidisciplinary, incorporating perspectives in Data modeling, Information privacy and Upload. Ciphertext is a primary field of his research addressed under Computer network.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Ning Cao;Cong Wang;Ming Li;Kui Ren.
IEEE Transactions on Parallel and Distributed Systems (2014)
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
Shucheng Yu;Cong Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)
Ensuring Data Storage Security in Cloud Computing.
Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
IACR Cryptology ePrint Archive (2009)
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang;S. S. M. Chow;Qian Wang;Kui Ren.
IEEE Transactions on Computers (2013)
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)
Enabling public verifiability and data dynamics for storage security in cloud computing
Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)
Secure Ranked Keyword Search over Encrypted Cloud Data
Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)
Security Challenges for the Public Cloud
Kui Ren;Cong Wang;Qian Wang.
IEEE Internet Computing (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Zhejiang University
Wuhan University
Virginia Tech
City University of Hong Kong
Chinese Academy of Sciences
Jinan University
University of Toronto
Commonwealth Scientific and Industrial Research Organisation
Hong Kong Polytechnic University
University of Hong Kong
Microsoft (United States)
University of Tennessee at Knoxville
Radboud University Nijmegen
Technion – Israel Institute of Technology
University of Strasbourg
ETH Zurich
Osaka University
James Hutton Institute
Bulgarian Academy of Sciences
University of Stuttgart
Imperial College London
National Oceanic and Atmospheric Administration
Aristotle University of Thessaloniki
Washington University in St. Louis
University of Amsterdam
McMaster University