His primary areas of study are Computer network, Cloud computing, Wireless sensor network, Computer security and Distributed computing. His studies deal with areas such as Wireless and Service provider as well as Computer network. His Cloud computing research is multidisciplinary, incorporating elements of Software deployment, Information retrieval, Encryption, Information privacy and Big data.
His Wireless sensor network research includes themes of Fault tolerance, Key distribution in wireless sensor networks and Embedded system. His Computer security research is multidisciplinary, relying on both Trust network, Small-world network and Search algorithm. His work carried out in the field of Distributed computing brings together such families of science as Static routing, Geographic routing and Reliability.
His scientific interests lie mostly in Computer network, Computer security, Distributed computing, Wireless sensor network and Cloud computing. His study in Mobile computing, Routing protocol, Dynamic Source Routing, Multicast and Server is carried out as part of his Computer network studies. His study looks at the relationship between Computer security and topics such as Service provider, which overlap with Location-based service.
His Distributed computing study combines topics in areas such as Node, Wireless ad hoc network, Mobile ad hoc network and Routing. He has included themes like Wireless, Key distribution in wireless sensor networks and Real-time computing in his Wireless sensor network study. His Encryption research incorporates themes from Cryptography and Access control.
Computer security, Cloud computing, Computer network, Artificial intelligence and Encryption are his primary areas of study. The study incorporates disciplines such as Service provider and Smart city in addition to Computer security. His study in Cloud computing is interdisciplinary in nature, drawing from both Identification, Correctness, Authentication and Key.
His Computer network research incorporates elements of Wireless and Wireless ad hoc network. His work on Ciphertext as part of general Encryption research is frequently linked to Popularity, bridging the gap between disciplines. His Information privacy research includes elements of Server and Cryptography.
Guojun Wang focuses on Computer network, Computer security, Cloud computing, Service provider and Overhead. His Computer network study integrates concerns from other disciplines, such as Wireless ad hoc network and Fog computing. Guojun Wang has researched Computer security in several fields, including Theoretical computer science and Dependability.
His studies in Cloud computing integrate themes in fields like Wireless sensor network, Information privacy, Server and Encryption. His work on Sensor cloud is typically connected to Raw data as part of general Wireless sensor network study, connecting several disciplines of science. His Service provider study also includes
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Guojun Wang;Qin Liu;Jie Wu.
computer and communications security (2010)
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Guojun Wang;Qin Liu;Jie Wu.
computer and communications security (2010)
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
Guojun Wang;Qin Liu;Jie Wu;Minyi Guo.
Computers & Security (2011)
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
Guojun Wang;Qin Liu;Jie Wu;Minyi Guo.
Computers & Security (2011)
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Qin Liu;Guojun Wang;Jie Wu.
Information Sciences (2014)
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Qin Liu;Guojun Wang;Jie Wu.
Information Sciences (2014)
Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks
Zhenyu Zhou;Mianxiong Dong;Kaoru Ota;Guojun Wang.
IEEE Internet of Things Journal (2016)
Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks
Zhenyu Zhou;Mianxiong Dong;Kaoru Ota;Guojun Wang.
IEEE Internet of Things Journal (2016)
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring
Zakirul Alam Bhuiyan;Guojun Wang;Jiannong Cao;Jie Wu.
IEEE Transactions on Computers (2015)
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring
Zakirul Alam Bhuiyan;Guojun Wang;Jiannong Cao;Jie Wu.
IEEE Transactions on Computers (2015)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Temple University
Fordham University
Hong Kong Polytechnic University
Beijing Normal University
Beijing Normal University
Shanghai Jiao Tong University
Texas A&M University
Hong Kong Polytechnic University
Tsinghua University
University of Technology Sydney
University of California, San Diego
Autonomous University of Barcelona
Chinese Academy of Sciences
Norwegian University of Life Sciences
Spanish National Research Council
National Museum of Natural History
Ruhr University Bochum
Radboud University Nijmegen
Kanazawa University
Field Museum of Natural History
Ludwig-Maximilians-Universität München
Swansea University
University of Melbourne
University of Tokyo
New York University
RWTH Aachen University