2009 |
21 | EE | Luan Ibraimi,
Qiang Tang,
Pieter H. Hartel,
Willem Jonker:
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes.
ISPEC 2009: 1-12 |
2008 |
20 | EE | Ileana Buhan,
Jeroen Doumen,
Pieter H. Hartel,
Qiang Tang,
Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
ICICS 2008: 294-310 |
19 | EE | Qiang Tang:
Type-Based Proxy Re-encryption and Its Construction.
INDOCRYPT 2008: 130-144 |
18 | EE | Qiang Tang,
Julien Bringer,
Hervé Chabanne,
David Pointcheval:
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
ISPEC 2008: 56-70 |
17 | EE | Qiang Tang,
Pieter H. Hartel,
Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption.
Inscrypt 2008: 332-347 |
16 | EE | Luan Ibraimi,
Qiang Tang,
Pieter H. Hartel,
Willem Jonker:
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.
Secure Data Management 2008: 185-198 |
15 | EE | Qiang Tang,
Panos Nasiopoulos,
Rabab Kreidieh Ward:
Compensation of Requantization and Interpolation Errors in MPEG-2 to H.264 Transcoding.
IEEE Trans. Circuits Syst. Video Techn. 18(3): 314-325 (2008) |
14 | | Liqun Chen,
Qiang Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols.
J. UCS 14(3): 416-440 (2008) |
2007 |
13 | EE | Julien Bringer,
Hervé Chabanne,
Malika Izabachène,
David Pointcheval,
Qiang Tang,
Sébastien Zimmer:
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.
ACISP 2007: 96-106 |
12 | EE | Julien Bringer,
Hervé Chabanne,
David Pointcheval,
Qiang Tang:
Extended Private Information Retrieval and Its Application in Biometrics Authentications.
CANS 2007: 175-193 |
11 | EE | Alexander W. Dent,
Qiang Tang:
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability.
ISC 2007: 158-174 |
10 | EE | Qiang Tang:
On The Security of a Group Key Agreement Protocol.
Comput. J. 50(5): 589-590 (2007) |
2006 |
9 | EE | Qiang Tang,
Kim-Kwang Raymond Choo:
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
ACNS 2006: 162-177 |
8 | EE | Jie Liu,
Junan Lu,
Qiang Tang:
Projective Synchronization in Chaotic Dynamical Networks.
ICICIC (1) 2006: 729-732 |
7 | EE | Qiang Tang,
Rabab K. Ward,
Panos Nasiopoulos:
An Efficient MPEG2 to H.264 Half-Pixel Motion Compensation Transcoding.
ICIP 2006: 865-868 |
6 | EE | Zhaohui Cheng,
Liqun Chen,
Richard Comley,
Qiang Tang:
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings.
ISPEC 2006: 202-213 |
5 | EE | Qiang Tang,
Chris J. Mitchell:
Cryptanalysis of a hybrid authentication protocol for large mobile networks.
Journal of Systems and Software 79(4): 496-501 (2006) |
2005 |
4 | EE | Qiang Tang,
Chris J. Mitchell:
On the Security of Some Password-Based Key Agreement Schemes.
CIS (2) 2005: 149-154 |
3 | EE | Qiang Tang,
Chris J. Mitchell:
Efficient Compilers for Authenticated Group Key Exchange.
CIS (2) 2005: 192-197 |
2 | EE | Qiang Tang,
Xiangpeng Li,
Jie Liu:
Method of scores analysis based on rough set theory.
GrC 2005: 259-261 |
1 | EE | Qiang Tang,
Chris J. Mitchell:
Security Properties of Two Authenticated Conference Key Agreement Protocols.
ICICS 2005: 304-314 |