Qiang Tang
Title
Cited by
Cited by
Year
ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain
Y Lu, Q Tang, G Wang
2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), 2018
722018
Cliptography: Clipping the power of kleptographic attacks
A Russell, Q Tang, M Yung, HS Zhou
International Conference on the Theory and Application of Cryptology and …, 2016
572016
Efficient encrypted keyword search for multi-user data sharing
A Kiayias, O Oksuz, A Russell, Q Tang, B Wang
European symposium on research in computer security, 173-195, 2016
452016
Generic semantic security against a kleptographic adversary
A Russell, Q Tang, M Yung, HS Zhou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
312017
Optimal rate private information retrieval from homomorphic encryption
A Kiayias, N Leonardos, H Lipmaa, K Pavlyk, Q Tang
Proceedings on Privacy Enhancing Technologies 2015 (2), 222-243, 2015
272015
On the security of key extraction from measuring physical quantities
M Edman, A Kiayias, Q Tang, B Yener
IEEE Transactions on Information Forensics and Security 11 (8), 1796-1806, 2016
242016
Verifiable Attribute-based Encryption.
Q Tang, D Ji
IJ Network Security 10 (2), 114-120, 2010
202010
Traitor deterring schemes: Using bitcoin as collateral for digital content
A Kiayias, Q Tang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
172015
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
A Russell, Q Tang, M Yung, HS Zhou
IACR Cryptol. ePrint Arch. 2016, 530, 2016
142016
How to keep a secret: leakage deterring public-key cryptosystems
A Kiayias, Q Tang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
142013
Correcting subverted random oracles
A Russell, Q Tang, M Yung, HS Zhou
Annual International Cryptology Conference, 241-271, 2018
132018
Honey encryption beyond message recovery security
J Jaeger, T Ristenpart, Q Tang
Annual International Conference on the Theory and Applications of …, 2016
132016
Making Any Identity-Based Encryption Accountable, Efficiently
A Kiayias, Q Tang
European Symposium on Research in Computer Security, 326-346, 2015
122015
Multi-Authority Verifiable Attribute-Based Encryption [J]
Q TANG, D JI
Journal of Wuhan University (Natural Science Edition) 5, 2008
9*2008
On enabling machine learning tasks atop public blockchains: A crowdsourcing approach
Y Lu, Q Tang, G Wang
2018 IEEE International Conference on Data Mining Workshops (ICDMW), 81-88, 2018
82018
Making Any Attribute-Based Encryption Accountable, Efficiently
J Lai, Q Tang
European Symposium on Research in Computer Security 11099, 527-547, 2018
82018
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog
SSM Chow, A Russell, Q Tang, M Yung, Y Zhao, HS Zhou
IACR International Workshop on Public Key Cryptography, 221-251, 2019
72019
Communication optimal tardos-based asymmetric fingerprinting
A Kiayias, N Leonardos, H Lipmaa, K Pavlyk, Q Tang
Cryptographers’ Track at the RSA Conference, 469-486, 2015
62015
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs
G Xu, W Zhou, AK Sangaiah, Y Zhang, X Zheng, Q Tang, N Xiong, ...
IEEE Network 34 (2), 22-29, 2020
52020
Decentralizing IoT management systems using blockchain for censorship resistance
S He, Q Tang, CQ Wu, X Shen
IEEE Transactions on Industrial Informatics 16 (1), 715-727, 2019
4*2019
The system can't perform the operation now. Try again later.
Articles 1–20