Follow
Qiong Huang
Qiong Huang
South China Agricultural University
Verified email at my.cityu.edu.hk
Title
Cited by
Cited by
Year
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Q Huang, H Li
Information Sciences 403, 1-14, 2017
3212017
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
3052010
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
2242011
Efficient public key encryption with equality test supporting flexible authorization
S Ma, Q Huang, M Zhang, B Yang
IEEE Transactions on Information Forensics and Security 10 (3), 458-470, 2014
1932014
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1712010
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
1552011
Multi-authority fine-grained access control with accountability and its application in cloud
J Li, X Chen, SSM Chow, Q Huang, DS Wong, Z Liu
Journal of Network and Computer Applications 112, 89-96, 2018
1432018
User-defined privacy grid system for continuous location-based services
R Schlegel, CY Chow, Q Huang, DS Wong
IEEE Transactions on Mobile Computing 14 (10), 2158-2172, 2015
1392015
Public key encryption with delegated equality test in a multi-user setting
S Ma, M Zhang, Q Huang, B Yang
The Computer Journal 58 (4), 986-1002, 2015
1142015
Public-key authenticated encryption with keyword search revisited: Security model and constructions
B Qin, Y Chen, Q Huang, X Liu, D Zheng
Information Sciences 516, 515-528, 2020
1132020
Designated-server identity-based authenticated encryption with keyword search for encrypted emails
H Li, Q Huang, J Shen, G Yang, W Susilo
Information Sciences 481, 330-343, 2019
1092019
Heterogeneous signcryption with key privacy
Q Huang, DS Wong, G Yang
The Computer Journal 54 (4), 525-536, 2011
832011
Generic certificateless encryption in the standard model
Q Huang, DS Wong
International workshop on security, 278-291, 2007
742007
Generic transformation to strongly unforgeable signatures
Q Huang, DS Wong, Y Zhao
International Conference on Applied Cryptography and Network Security, 1-17, 2007
692007
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
Q Huang, G Yang, DS Wong, W Susilo
International Journal of Information Security 10, 373-385, 2011
682011
Ambiguous optimistic fair exchange
Q Huang, G Yang, DS Wong, W Susilo
Advances in Cryptology-ASIACRYPT 2008: 14th International Conference on the …, 2008
652008
Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles
Q Huang, G Yang, DS Wong, W Susilo
Cryptographers’ Track at the RSA Conference, 106-120, 2008
622008
Cryptographic solutions for cloud storage: Challenges and research opportunities
L Zhang, H Xiong, Q Huang, J Li, KKR Choo, J Li
IEEE Transactions on Services Computing 15 (1), 567-587, 2019
602019
Privacy-preserving location sharing services for social networks
R Schlegel, CY Chow, Q Huang, DS Wong
IEEE Transactions on Services Computing 10 (5), 811-825, 2016
582016
Digital provenance: Enabling secure data forensics in cloud computing
J Li, X Chen, Q Huang, DS Wong
Future Generation Computer Systems 37, 259-266, 2014
582014
The system can't perform the operation now. Try again later.
Articles 1–20