dblp.uni-trier.dewww.uni-trier.de

Qiang Tang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
21EELuan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker: Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. ISPEC 2009: 1-12
2008
20EEIleana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis: Embedding Renewable Cryptographic Keys into Continuous Noisy Data. ICICS 2008: 294-310
19EEQiang Tang: Type-Based Proxy Re-encryption and Its Construction. INDOCRYPT 2008: 130-144
18EEQiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval: A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. ISPEC 2008: 56-70
17EEQiang Tang, Pieter H. Hartel, Willem Jonker: Inter-domain Identity-Based Proxy Re-encryption. Inscrypt 2008: 332-347
16EELuan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker: A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Secure Data Management 2008: 185-198
15EEQiang Tang, Panos Nasiopoulos, Rabab Kreidieh Ward: Compensation of Requantization and Interpolation Errors in MPEG-2 to H.264 Transcoding. IEEE Trans. Circuits Syst. Video Techn. 18(3): 314-325 (2008)
14 Liqun Chen, Qiang Tang: Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. UCS 14(3): 416-440 (2008)
2007
13EEJulien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer: An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. ACISP 2007: 96-106
12EEJulien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang: Extended Private Information Retrieval and Its Application in Biometrics Authentications. CANS 2007: 175-193
11EEAlexander W. Dent, Qiang Tang: Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. ISC 2007: 158-174
10EEQiang Tang: On The Security of a Group Key Agreement Protocol. Comput. J. 50(5): 589-590 (2007)
2006
9EEQiang Tang, Kim-Kwang Raymond Choo: Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. ACNS 2006: 162-177
8EEJie Liu, Junan Lu, Qiang Tang: Projective Synchronization in Chaotic Dynamical Networks. ICICIC (1) 2006: 729-732
7EEQiang Tang, Rabab K. Ward, Panos Nasiopoulos: An Efficient MPEG2 to H.264 Half-Pixel Motion Compensation Transcoding. ICIP 2006: 865-868
6EEZhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang: Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. ISPEC 2006: 202-213
5EEQiang Tang, Chris J. Mitchell: Cryptanalysis of a hybrid authentication protocol for large mobile networks. Journal of Systems and Software 79(4): 496-501 (2006)
2005
4EEQiang Tang, Chris J. Mitchell: On the Security of Some Password-Based Key Agreement Schemes. CIS (2) 2005: 149-154
3EEQiang Tang, Chris J. Mitchell: Efficient Compilers for Authenticated Group Key Exchange. CIS (2) 2005: 192-197
2EEQiang Tang, Xiangpeng Li, Jie Liu: Method of scores analysis based on rough set theory. GrC 2005: 259-261
1EEQiang Tang, Chris J. Mitchell: Security Properties of Two Authenticated Conference Key Agreement Protocols. ICICS 2005: 304-314

Coauthor Index

1Julien Bringer [12] [13] [18]
2Ileana Buhan [20]
3Hervé Chabanne [12] [13] [18]
4Liqun Chen [6] [14]
5Zhaohui Cheng [6]
6Kim-Kwang Raymond Choo [9]
7Richard Comley [6]
8Alexander W. Dent [11]
9Jeroen Doumen [20]
10Pieter H. Hartel [16] [17] [20] [21]
11Luan Ibraimi [16] [21]
12Malika Izabachène [13]
13Willem Jonker [16] [17] [21]
14Xiangpeng Li [2]
15Jie Liu [2] [8]
16Junan Lu [8]
17Chris J. Mitchell [1] [3] [4] [5]
18Panos Nasiopoulos [7] [15]
19David Pointcheval [12] [13] [18]
20Raymond N. J. Veldhuis [20]
21Rabab Kreidieh Ward (Rabab K. Ward) [7] [15]
22Sébastien Zimmer [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)