|
Search the dblp DataBase
Qiang Tang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Qiang Tang, Kim-Kwang Raymond Choo
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:162-177 [Conf]
- Qiang Tang, Chris J. Mitchell
On the Security of Some Password-Based Key Agreement Schemes. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:149-154 [Conf]
- Qiang Tang, Chris J. Mitchell
Efficient Compilers for Authenticated Group Key Exchange. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:192-197 [Conf]
- Qiang Tang, Chris J. Mitchell
Security Properties of Two Authenticated Conference Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:304-314 [Conf]
- Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:202-213 [Conf]
- Jie Liu, Jun an Lu, Qiang Tang
Projective Synchronization in Chaotic Dynamical Networks. [Citation Graph (0, 0)][DBLP] ICICIC (1), 2006, pp:729-732 [Conf]
- Qiang Tang, Xiangpeng Li, Jie Liu
Method of scores analysis based on rough set theory. [Citation Graph (0, 0)][DBLP] GrC, 2005, pp:259-261 [Conf]
- Qiang Tang, Chris J. Mitchell
Cryptanalysis of a hybrid authentication protocol for large mobile networks. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2006, v:79, n:4, pp:496-501 [Journal]
- Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:96-106 [Conf]
- Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
Extended Private Information Retrieval and Its Application in Biometrics Authentications. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:175-193 [Conf]
- Qiang Tang, Rabab K. Ward, Panos Nasiopoulos
An Efficient MPEG2 to H.264 Half-Pixel Motion Compensation Transcoding. [Citation Graph (0, 0)][DBLP] ICIP, 2006, pp:865-868 [Conf]
- Alexander W. Dent, Qiang Tang
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:158-174 [Conf]
Inter-domain Identity-Based Proxy Re-encryption. [Citation Graph (, )][DBLP]
Data Is Key: Introducing the Data-Based Access Control Paradigm. [Citation Graph (, )][DBLP]
Multifractal Analysis of Shanghai Stock Exchange Composite Index and Shenzhen Stock Exchange Component Index. [Citation Graph (, )][DBLP]
Testing for chaos of Yangtze River streamflow at different timescales. [Citation Graph (, )][DBLP]
Embedding Renewable Cryptographic Keys into Continuous Noisy Data. [Citation Graph (, )][DBLP]
Efficient motion vector re-estimation for MPEG-2 TO H.264/AVC transcoding with arbitrary down-sizing ratios. [Citation Graph (, )][DBLP]
Type-Based Proxy Re-encryption and Its Construction. [Citation Graph (, )][DBLP]
RTKPS: A Key Pre-distribution Scheme Based on Rooted-Tree in Wireless Sensor and Actor Network. [Citation Graph (, )][DBLP]
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Citation Graph (, )][DBLP]
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. [Citation Graph (, )][DBLP]
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. [Citation Graph (, )][DBLP]
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. [Citation Graph (, )][DBLP]
MS-Leach: A Routing Protocol Combining Multi-hop Transmissions and Single-hop Transmissions. [Citation Graph (, )][DBLP]
Fast block size prediction for MPEG-2 to H.264/AVC transcoding. [Citation Graph (, )][DBLP]
Efficient Chrominance Compensation for MPEG2 to H.264 Transcoding. [Citation Graph (, )][DBLP]
On The Security of a Group Key Agreement Protocol. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|