Qiang Tang
Qiang Tang
Verified email at sydney.edu.au - Homepage
Title
Cited by
Cited by
Year
ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain
Y Lu, Q Tang, G Wang
2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), 2018
962018
Cliptography: Clipping the power of kleptographic attacks
A Russell, Q Tang, M Yung, HS Zhou
International Conference on the Theory and Application of Cryptology and …, 2016
642016
Efficient encrypted keyword search for multi-user data sharing
A Kiayias, O Oksuz, A Russell, Q Tang, B Wang
European symposium on research in computer security, 173-195, 2016
482016
Generic semantic security against a kleptographic adversary
A Russell, Q Tang, M Yung, HS Zhou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
342017
Optimal Rate Private Information Retrieval from Homomorphic Encryption.
A Kiayias, N Leonardos, H Lipmaa, K Pavlyk, Q Tang
PoPETs 2015 (2), 222-243, 2015
322015
On the security of key extraction from measuring physical quantities
M Edman, A Kiayias, Q Tang, B Yener
IEEE Transactions on Information Forensics and Security 11 (8), 1796-1806, 2016
252016
Verifiable Attribute-based Encryption.
Q Tang, D Ji
IJ Network Security 10 (2), 114-120, 2010
212010
Traitor deterring schemes: Using bitcoin as collateral for digital content
A Kiayias, Q Tang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
192015
Correcting subverted random oracles
A Russell, Q Tang, M Yung, HS Zhou
Annual International Cryptology Conference, 241-271, 2018
162018
How to keep a secret: leakage deterring public-key cryptosystems
A Kiayias, Q Tang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
152013
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
A Russell, Q Tang, M Yung, HS Zhou
IACR Cryptol. ePrint Arch. 2016, 530, 2016
142016
Honey encryption beyond message recovery security
J Jaeger, T Ristenpart, Q Tang
Annual International Conference on the Theory and Applications of …, 2016
142016
Making Any Identity-Based Encryption Accountable, Efficiently
A Kiayias, Q Tang
European Symposium on Research in Computer Security, 326-346, 2015
132015
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog
SSM Chow, A Russell, Q Tang, M Yung, Y Zhao, HS Zhou
IACR International Workshop on Public Key Cryptography, 221-251, 2019
112019
Making Any Attribute-Based Encryption Accountable, Efficiently
J Lai, Q Tang
European Symposium on Research in Computer Security 11099, 527-547, 2018
112018
On enabling machine learning tasks atop public blockchains: A crowdsourcing approach
Y Lu, Q Tang, G Wang
2018 IEEE International Conference on Data Mining Workshops (ICDMW), 81-88, 2018
102018
Multi-authority verifiable attribute-based encryption
Q TANG, D JI
Journal of Wuhan University (Natural Science Edition) 54 (5), 607-610, 2008
10*2008
Dumbo-mvba: Optimal multi-valued validated asynchronous byzantine agreement, revisited
Y Lu, Z Lu, Q Tang, G Wang
Proceedings of the 39th Symposium on Principles of Distributed Computing …, 2020
92020
A security-enhanced certificateless aggregate signature authentication protocol for invanets
G Xu, W Zhou, AK Sangaiah, Y Zhang, X Zheng, Q Tang, N Xiong, ...
IEEE Network 34 (2), 22-29, 2020
92020
Dumbo: Faster asynchronous bft protocols
B Guo, Z Lu, Q Tang, J Xu, Z Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
8*2020
The system can't perform the operation now. Try again later.
Articles 1–20