New algorithms for secure outsourcing of modular exponentiations X Chen, J Li, J Ma, Q Tang, W Lou IEEE Transactions on Parallel and Distributed Systems 25 (9), 2386-2396, 2013 | 523 | 2013 |
Type-based proxy re-encryption and its construction Q Tang International Conference on Cryptology in India, 130-144, 2008 | 195 | 2008 |
Privacy in recommender systems AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang Social media retrieval, 263-281, 2013 | 194 | 2013 |
Efficient and provable secure ciphertext-policy attribute-based encryption schemes L Ibraimi, Q Tang, P Hartel, W Jonker Information Security Practice and Experience: 5th International Conference …, 2009 | 184 | 2009 |
An application of the Goldwasser-Micali cryptosystem to biometric authentication J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007 | 181 | 2007 |
Public key encryption supporting plaintext equality test and user‐specified authorization Q Tang Security and Communication Networks 5 (12), 1351-1362, 2012 | 179 | 2012 |
Public key encryption schemes supporting equality test with authorisation of different granularity Q Tang International journal of applied cryptography 2 (4), 304-321, 2012 | 170 | 2012 |
Towards public key encryption scheme supporting equality test with fine-grained authorization Q Tang Australasian conference on information security and privacy, 389-406, 2011 | 167 | 2011 |
Public-key encryption with registered keyword search Q Tang, L Chen European public key infrastructure workshop, 163-178, 2009 | 149 | 2009 |
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen Computer science and information systems 10 (2), 667-684, 2013 | 140 | 2013 |
Efficient conditional proxy re-encryption with chosen-ciphertext security J Weng, Y Yang, Q Tang, RH Deng, F Bao Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009 | 125 | 2009 |
Efficient algorithms for secure outsourcing of bilinear pairings X Chen, W Susilo, J Li, DS Wong, J Ma, S Tang, Q Tang Theoretical Computer Science 562, 112-121, 2015 | 100 | 2015 |
Privacy-preserving contact tracing: current solutions and open questions Q Tang arXiv preprint arXiv:2004.06818, 2020 | 91 | 2020 |
Nothing is for free: Security in searching shared and encrypted data Q Tang IEEE Transactions on Information Forensics and Security 9 (11), 1943-1952, 2014 | 84 | 2014 |
A formal study of the privacy concerns in biometric-based remote authentication schemes Q Tang, J Bringer, H Chabanne, D Pointcheval International Conference on Information Security Practice and Experience, 56-70, 2008 | 68 | 2008 |
Extended private information retrieval and its application in biometrics authentications J Bringer, H Chabanne, D Pointcheval, Q Tang International Conference on Cryptology and Network Security, 175-193, 2007 | 68 | 2007 |
On key recovery attacks against existing somewhat homomorphic encryption schemes M Chenal, Q Tang Progress in Cryptology-LATINCRYPT 2014: Third International Conference on …, 2015 | 64 | 2015 |
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search. Y Zhao, X Chen, H Ma, Q Tang, H Zhu J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 72-81, 2012 | 64 | 2012 |
A type-and-identity-based proxy re-encryption scheme and its application in healthcare L Ibraimi, Q Tang, P Hartel, W Jonker Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand …, 2008 | 63 | 2008 |
Post-quantum era privacy protection for intelligent infrastructures L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ... IEEE Access 9, 36038-36077, 2021 | 62 | 2021 |