Tang Qiang
TitelCiteras avÅr
New algorithms for secure outsourcing of modular exponentiations
X Chen, J Li, J Ma, Q Tang, W Lou
IEEE Transactions on Parallel and Distributed Systems 25 (9), 2386-2396, 2013
3612013
Type-based proxy re-encryption and its construction
Q Tang
International Conference on Cryptology in India, 130-144, 2008
1552008
An application of the Goldwasser-Micali cryptosystem to biometric authentication
J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer
Australasian Conference on Information Security and Privacy, 96-106, 2007
1452007
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
L Ibraimi, Q Tang, P Hartel, W Jonker
International Conference on Information Security Practice and Experience, 1-12, 2009
1322009
Efficient conditional proxy re-encryption with chosen-ciphertext security
J Weng, Y Yang, Q Tang, RH Deng, F Bao
International Conference on Information Security, 151-166, 2009
992009
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
Comput. Sci. Inf. Syst. 10 (2), 667-684, 2013
902013
Public-key encryption with registered keyword search
Q Tang, L Chen
European Public Key Infrastructure Workshop, 163-178, 2009
772009
Public key encryption supporting plaintext equality test and user‐specified authorization
Q Tang
Security and Communication Networks 5 (12), 1351-1362, 2012
762012
Public key encryption schemes supporting equality test with authorisation of different granularity
Q Tang
International journal of applied cryptography 2 (4), 304-321, 2012
762012
Towards public key encryption scheme supporting equality test with fine-grained authorization
Q Tang
Australasian Conference on Information Security and Privacy, 389-406, 2011
742011
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
702013
Efficient algorithms for secure outsourcing of bilinear pairings
X Chen, W Susilo, J Li, DS Wong, J Ma, S Tang, Q Tang
Theoretical Computer Science 562, 112-121, 2015
632015
Extended private information retrieval and its application in biometrics authentications
J Bringer, H Chabanne, D Pointcheval, Q Tang
International Conference on Cryptology and Network Security, 175-193, 2007
582007
A formal study of the privacy concerns in biometric-based remote authentication schemes
Q Tang, J Bringer, H Chabanne, D Pointcheval
International Conference on Information Security Practice and Experience, 56-70, 2008
542008
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search.
Y Zhao, X Chen, H Ma, Q Tang, H Zhu
JoWUA 3 (1/2), 72-81, 2012
492012
A type-and-identity-based proxy re-encryption scheme and its application in healthcare
L Ibraimi, Q Tang, P Hartel, W Jonker
Workshop on Secure Data Management, 185-198, 2008
482008
Revisiting the security model for timed-release encryption with pre-open capability
AW Dent, Q Tang
International Conference on Information Security, 158-174, 2007
482007
Nothing is for free: security in searching shared and encrypted data
Q Tang
IEEE Transactions on Information Forensics and Security 9 (11), 1943-1952, 2014
442014
Inter-domain identity-based proxy re-encryption
Q Tang, P Hartel, W Jonker
International Conference on Information Security and Cryptology, 332-347, 2008
442008
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational Social Networks, 87-113, 2012
412012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20