The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Qiang Tang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qiang Tang, Kim-Kwang Raymond Choo
    Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:162-177 [Conf]
  2. Qiang Tang, Chris J. Mitchell
    On the Security of Some Password-Based Key Agreement Schemes. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:149-154 [Conf]
  3. Qiang Tang, Chris J. Mitchell
    Efficient Compilers for Authenticated Group Key Exchange. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:192-197 [Conf]
  4. Qiang Tang, Chris J. Mitchell
    Security Properties of Two Authenticated Conference Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:304-314 [Conf]
  5. Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
    Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:202-213 [Conf]
  6. Jie Liu, Jun an Lu, Qiang Tang
    Projective Synchronization in Chaotic Dynamical Networks. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:729-732 [Conf]
  7. Qiang Tang, Xiangpeng Li, Jie Liu
    Method of scores analysis based on rough set theory. [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:259-261 [Conf]
  8. Qiang Tang, Chris J. Mitchell
    Cryptanalysis of a hybrid authentication protocol for large mobile networks. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:4, pp:496-501 [Journal]
  9. Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
    An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:96-106 [Conf]
  10. Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
    Extended Private Information Retrieval and Its Application in Biometrics Authentications. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:175-193 [Conf]
  11. Qiang Tang, Rabab K. Ward, Panos Nasiopoulos
    An Efficient MPEG2 to H.264 Half-Pixel Motion Compensation Transcoding. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:865-868 [Conf]
  12. Alexander W. Dent, Qiang Tang
    Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:158-174 [Conf]

  13. Inter-domain Identity-Based Proxy Re-encryption. [Citation Graph (, )][DBLP]


  14. Data Is Key: Introducing the Data-Based Access Control Paradigm. [Citation Graph (, )][DBLP]


  15. Multifractal Analysis of Shanghai Stock Exchange Composite Index and Shenzhen Stock Exchange Component Index. [Citation Graph (, )][DBLP]


  16. Testing for chaos of Yangtze River streamflow at different timescales. [Citation Graph (, )][DBLP]


  17. Embedding Renewable Cryptographic Keys into Continuous Noisy Data. [Citation Graph (, )][DBLP]


  18. Efficient motion vector re-estimation for MPEG-2 TO H.264/AVC transcoding with arbitrary down-sizing ratios. [Citation Graph (, )][DBLP]


  19. Type-Based Proxy Re-encryption and Its Construction. [Citation Graph (, )][DBLP]


  20. RTKPS: A Key Pre-distribution Scheme Based on Rooted-Tree in Wireless Sensor and Actor Network. [Citation Graph (, )][DBLP]


  21. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Citation Graph (, )][DBLP]


  22. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. [Citation Graph (, )][DBLP]


  23. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. [Citation Graph (, )][DBLP]


  24. A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. [Citation Graph (, )][DBLP]


  25. MS-Leach: A Routing Protocol Combining Multi-hop Transmissions and Single-hop Transmissions. [Citation Graph (, )][DBLP]


  26. Fast block size prediction for MPEG-2 to H.264/AVC transcoding. [Citation Graph (, )][DBLP]


  27. Efficient Chrominance Compensation for MPEG2 to H.264 Transcoding. [Citation Graph (, )][DBLP]


  28. On The Security of a Group Key Agreement Protocol. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002