Cong Wang mainly investigates Server, Information privacy, Encryption, Computer security and Cryptography. His Server research includes themes of Data security and Distributed computing. His Information privacy research is multidisciplinary, incorporating elements of The Internet and Service.
The study incorporates disciplines such as Ranking, Edit distance, Data mining and Database in addition to Encryption. While the research belongs to areas of Computer security, Cong Wang spends his time largely on the problem of Cloud computing security, intersecting his research to questions surrounding Storage security and Data integrity. His studies in Cryptography integrate themes in fields like Information retrieval and Relevance.
The scientist’s investigation covers issues in Encryption, Computer security, Server, Computer network and Cryptography. His study in Encryption is interdisciplinary in nature, drawing from both Scalability, Database and Information privacy. Cong Wang usually deals with Information privacy and limits it to topics linked to Cloud storage and Data integrity.
In his study, Storage security is strongly linked to Cloud computing security, which falls under the umbrella field of Computer security. His Server research incorporates elements of Ciphertext and Distributed computing, Distributed database. Cryptography connects with themes related to Key in his study.
Cong Wang mostly deals with Computer security, Encryption, Server, Blockchain and Cryptography. His Smart contract study in the realm of Computer security interacts with subjects such as Situation awareness. Cong Wang has researched Encryption in several fields, including Scalability and Theoretical computer science.
His study explores the link between Scalability and topics such as Overhead that cross with problems in Data mining, Data integrity and Public-key cryptography. His research in Server intersects with topics in Middlebox, Ciphertext, Information privacy and Distributed computing. The concepts of his Cryptography study are interwoven with issues in Traitor tracing, Inference and Access control.
His main research concerns Encryption, Computer security, Server, Distributed computing and Ciphertext. Cong Wang integrates Encryption with Outsourcing in his study. When carried out as part of a general Computer security research project, his work on Data integrity and Public-key cryptography is frequently linked to work in Global Positioning System and Perception, therefore connecting diverse disciplines of study.
His Server research integrates issues from Plaintext, Homomorphic encryption, Range query and Obfuscation. His Distributed computing research is multidisciplinary, incorporating perspectives in Data modeling, Information privacy and Upload. Ciphertext is a primary field of his research addressed under Computer network.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
Shucheng Yu;Cong Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)
Ensuring data storage security in Cloud Computing
Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international workshop on quality of service (2009)
Privacy-preserving multi-keyword ranked search over encrypted cloud data
Ning Cao;Cong Wang;Ming Li;Kui Ren.
international conference on computer communications (2011)
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang;S. S. M. Chow;Qian Wang;Kui Ren.
IEEE Transactions on Computers (2013)
Enabling public verifiability and data dynamics for storage security in cloud computing
Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)
Secure Ranked Keyword Search over Encrypted Cloud Data
Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)
Attribute based data sharing with attribute revocation
Shucheng Yu;Cong Wang;Kui Ren;Wenjing Lou.
computer and communications security (2010)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
Zhejiang University
Wuhan University
Virginia Tech
City University of Hong Kong
Guangzhou University
Jinan University
University of Toronto
Commonwealth Scientific and Industrial Research Organisation
University at Buffalo, State University of New York
University of Hong Kong
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: