Follow
Chunming Rong
Title
Cited by
Cited by
Year
Beyond lightning: A survey on security challenges in cloud computing
C Rong, ST Nguyen, MG Jaatun
Computers & Electrical Engineering 39 (1), 47-54, 2013
4782013
Detecting spammers on social networks
X Zheng, Z Zeng, Z Chen, Y Yu, C Rong
Neurocomputing 159, 27-34, 2015
2582015
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
L Yan, C Rong, G Zhao
Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009
2432009
Security in wireless ad hoc and sensor networks
E Cayirci, C Rong
John Wiley & Sons, 2008
2182008
A comprehensive survey of blockchain: From theory to IoT applications and beyond
M Wu, K Wang, X Cai, S Guo, M Guo, C Rong
IEEE Internet of Things Journal 6 (5), 8114-8154, 2019
2082019
A survey of key management in ad hoc networks
AM Hegland, E Winjum, SF Mjolsnes, C Rong, O Kure, P Spilling
IEEE Communications Surveys & Tutorials 8 (3), 48-66, 2006
1882006
Trusted data sharing over untrusted cloud storage providers
G Zhao, C Rong, J Li, F Zhang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
1632010
Using Spearman's correlation coefficients for exploratory data analysis on big dataset
C Xiao, J Ye, RM Esteves, C Rong
Concurrency and Computation: Practice and Experience 28 (14), 3866-3878, 2016
1352016
New families of almost perfect nonlinear power mappings
T Helleseth, C Rong, D Sandberg
IEEE transactions on Information Theory 45 (2), 475-485, 1999
1351999
Ushare: user controlled social media based on blockchain
A Chakravorty, C Rong
Proceedings of the 11th international conference on ubiquitous information …, 2017
1192017
Privacy preserving data analytics for smart homes
A Chakravorty, T Wlodarczyk, C Rong
2013 IEEE Security and Privacy Workshops, 23-27, 2013
1192013
Fine-grained data access control systems with user accountability in cloud computing
J Li, G Zhao, X Chen, D Xie, C Rong, W Li, L Tang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
1192010
K-means clustering in the cloud--a Mahout test
RM Esteves, R Pais, C Rong
2011 IEEE Workshops of International Conference on Advanced Information …, 2011
1062011
Secure big data storage and sharing scheme for cloud tenants
H Cheng, C Rong, K Hwang, W Wang, Y Li
China Communications 12 (6), 106-115, 2015
1042015
Fast algorithms to evaluate collaborative filtering recommender systems
F Zhang, T Gong, VE Lee, G Zhao, C Rong, G Qu
Knowledge-Based Systems 96, 96-103, 2016
1012016
Accountability for cloud and other future internet services
S Pearson, V Tountopoulos, D Catteddu, M Südholt, R Molva, C Reich, ...
4th IEEE international conference on cloud computing technology and science …, 2012
992012
Using Mahout for clustering Wikipedia's latest articles: A comparison between k-means and fuzzy c-means in the cloud
C Rong
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
952011
Energy-aware task consolidation technique for cloud computing
CH Hsu, SC Chen, CC Lee, HY Chang, KC Lai, KC Li, C Rong
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
862011
Identity-based key agreement and encryption for wireless sensor networks
Y Geng, C Rong, C Veigner, JT Wang, HB Cheng
The Journal of China Universities of Posts and Telecommunications 13 (4), 54-60, 2006
822006
On-line e-wallet system with decentralized credential keepers
SF Mjølsnes, C Rong
Mobile Networks and Applications 8, 87-99, 2003
732003
The system can't perform the operation now. Try again later.
Articles 1–20