2015 - IEEE Fellow For contributions to information and network security
His main research concerns Cloud computing, Computer security, Computer network, Server and Encryption. The Cloud computing study combines topics in areas such as Data integrity, Information privacy and Cryptography. His biological study spans a wide range of topics, including Delegation and Service.
His Computer network study combines topics in areas such as Wireless ad hoc network and Distributed database. Wenjing Lou has researched Server in several fields, including Outsourcing, Distributed computing and Computer security model. Wenjing Lou combines subjects such as Revocation, Information retrieval and Database with his study of Encryption.
His primary scientific interests are in Computer network, Computer security, Distributed computing, Cloud computing and Encryption. His Computer network research incorporates themes from Wireless, Wireless ad hoc network, Throughput and Wireless network. Many of his studies on Computer security involve topics that are commonly interrelated, such as Service.
His Distributed computing research is multidisciplinary, relying on both Network packet and Dynamic Source Routing. His Cloud computing research incorporates elements of Outsourcing, Information privacy and Server. His Encryption research is multidisciplinary, incorporating elements of Cryptographic primitive, Database and Access control.
Wenjing Lou mainly focuses on Computer network, Computer security, Encryption, Cloud computing and Distributed computing. His study in Computer network focuses on Server in particular. His study in the fields of Blockchain under the domain of Computer security overlaps with other disciplines such as Game theory.
His Encryption study incorporates themes from Software, Information privacy and Cryptography. The various areas that Wenjing Lou examines in his Cloud computing study include Data deduplication, Homomorphic encryption, Overhead, Outsourcing and Access control. His studies deal with areas such as Communication channel, Node, Optimization problem, Telecommunications link and Job shop scheduling as well as Distributed computing.
Wenjing Lou mainly investigates Encryption, Computer network, Cloud computing, Information privacy and Computer security. While the research belongs to areas of Encryption, Wenjing Lou spends his time largely on the problem of Software, intersecting his research to questions surrounding Access control. His Computer network research is multidisciplinary, incorporating perspectives in Wireless and Exploit.
His research in Cloud computing intersects with topics in Tree, Outsourcing and Overhead. Wenjing Lou interconnects Probabilistic logic, Symmetric-key algorithm, Forward privacy and Cryptography in the investigation of issues within Information privacy. In the field of Computer security, his study on Memory forensics overlaps with subjects such as Processor register.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
Shucheng Yu;Cong Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)
Ensuring data storage security in Cloud Computing
Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international workshop on quality of service (2009)
Privacy-preserving multi-keyword ranked search over encrypted cloud data
Ning Cao;Cong Wang;Ming Li;Kui Ren.
international conference on computer communications (2011)
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang;S. S. M. Chow;Qian Wang;Kui Ren.
IEEE Transactions on Computers (2013)
Enabling public verifiability and data dynamics for storage security in cloud computing
Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Ming Li;Shucheng Yu;Yao Zheng;Kui Ren.
IEEE Transactions on Parallel and Distributed Systems (2013)
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)
Secure Ranked Keyword Search over Encrypted Cloud Data
Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
Virginia Tech
Zhejiang University
George Mason University
Virginia Tech
Guangzhou University
Stevens Institute of Technology
Virginia Tech
City University of Hong Kong
Arizona State University
University of Florida
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: