Qiang Tang

From MaRDI portal
Person:476850

Available identifiers

zbMath Open tang.qiangMaRDI QIDQ476850

List of research outcomes





PublicationDate of PublicationType
Efficient secure storage with version control and key rotation2024-09-13Paper
Predicate aggregate signatures and applications2024-06-26Paper
Retraction Note: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment2024-05-02Paper
Privacy-preserving decentralised singular value decomposition2024-04-19Paper
Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting)2023-11-16Paper
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)2023-05-12Paper
Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy2023-04-13Paper
CCA updatable encryption against malicious re-encryption attacks2023-03-29Paper
Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment2022-12-01Paper
Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service2022-10-14Paper
Making \textit{any} attribute-based encryption accountable, efficiently2022-08-25Paper
Making Any Identity-Based Encryption Accountable, Efficiently2022-08-19Paper
Witness authenticating NIZKs and applications2022-05-18Paper
Multi-input laconic function evaluation2021-06-08Paper
Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited2021-03-15Paper
A survey on true random number generators based on chaos2020-02-18Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
Graded signatures2018-10-18Paper
Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes2018-10-18Paper
Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications2018-10-18Paper
Correcting subverted random oracles2018-09-26Paper
Making public key functional encryption function private, distributively2018-05-29Paper
Updatable functional encryption2017-10-23Paper
A Homotopy Method for Locating All the Poles of a Parallel Plate Waveguide With the PML2017-09-20Paper
Cliptography: Clipping the Power of Kleptographic Attacks2017-01-06Paper
Honey Encryption Beyond Message Recovery Security2016-09-09Paper
Communication Optimal Tardos-Based Asymmetric Fingerprinting2016-03-02Paper
Towards Forward Security Properties for PEKS and IBE2015-10-20Paper
On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes2015-09-17Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
New Algorithms for Secure Outsourcing of Modular Exponentiations2013-10-23Paper
Extended KCI attack against two-party key establishment protocols2013-04-04Paper
Public key encryption schemes supporting equality test with authorisation of different granularity2012-11-16Paper
Towards a security model for computational puzzle schemes2011-11-29Paper
KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks2011-07-29Paper
https://portal.mardi4nfdi.de/entity/Q30167182011-07-19Paper
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization2011-07-07Paper
COMPARISON OF DIFFERENT DAILY STREAMFLOW SERIES IN US AND CHINA, UNDER A VIEWPOINT OF COMPLEX NETWORKS2010-09-23Paper
TF/TA<sup>2</sup> trajectory tracking using nonlinear predictive control approach2009-11-06Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security2009-09-29Paper
Inter-domain Identity-Based Proxy Re-encryption2009-04-29Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication2009-03-06Paper
Type-Based Proxy Re-encryption and Its Construction2009-01-22Paper
SCALING BEHAVIOR OF DIFFUSION LIMITED AGGREGATION IN PERCOLATION CLUSTER2008-11-03Paper
https://portal.mardi4nfdi.de/entity/Q35184162008-08-07Paper
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability2008-06-24Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications2008-04-15Paper
Applied Cryptography and Network Security2007-05-02Paper
Information and Communications Security2006-10-24Paper

Research outcomes over time

This page was built for person: Qiang Tang