Chunming Tang
Orcid: 0000-0001-7634-4705Affiliations:
- Guangzhou University, Guangzhou, China
According to our database1,
Chunming Tang
authored at least 103 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
RIC-SDA: A Reputation Incentive Committee-Based Secure Conditional Dual Authentication Scheme for VANETs.
IEEE Trans. Mob. Comput., December, 2024
BCS-CPP: A Blockchain and Collaborative Service-Based Conditional Privacy-Preserving Scheme for Internet of Vehicles.
IEEE Trans. Intell. Veh., February, 2024
PSSC: Practical and Secure Sidechain Construction for Heterogeneous Blockchains Orienting IoT.
IEEE Internet Things J., February, 2024
RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare.
IEEE Trans. Serv. Comput., 2024
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance.
IEEE Trans. Inf. Forensics Secur., 2024
IACR Cryptol. ePrint Arch., 2024
SG-FCB: A Stackelberg Game-Driven Fair Committee-Based Blockchain Consensus Protocol.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
Blockchain-Assisted Secure Data Sharing Protocol With a Dynamic Multiuser Keyword Search in IIoT.
IEEE Internet Things J., September, 2023
Correction to: FPSO-GA: A Fuzzy Metaheuristic Load Balancing Algorithm to Reduce Energy Consumption in Cloud Networks.
Wirel. Pers. Commun., March, 2023
Quantum Inf. Process., January, 2023
Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2023
Des. Codes Cryptogr., 2023
Complex., 2023
2022
FPSO-GA: A Fuzzy Metaheuristic Load Balancing Algorithm to Reduce Energy Consumption in Cloud Networks.
Wirel. Pers. Commun., 2022
IEEE Trans. Inf. Theory, 2022
Quantum Inf. Process., 2022
Quantum Inf. Process., 2022
Quantum Inf. Process., 2022
J. Cloud Comput., 2022
IET Inf. Secur., 2022
A weak Galerkin finite element method for indefinite time-harmonic Maxwell equations.
Appl. Math. Comput., 2022
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
2021
Design of a model-free adaptive sliding mode control to synchronize chaotic fractional-order systems with input saturation: An application in secure communications.
J. Frankl. Inst., 2021
Int. J. Inf. Sec., 2021
Entropy, 2021
Concurr. Comput. Pract. Exp., 2021
2020
Using Markov Learning Utilization Model for Resource Allocation in Cloud of Thing Network.
Wirel. Pers. Commun., 2020
IEEE Trans. Commun., 2020
IEEE Syst. J., 2020
Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion.
Signal Process., 2020
Inf. Sci., 2020
Int. J. Found. Comput. Sci., 2020
2019
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash.
Frontiers Inf. Technol. Electron. Eng., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Entropy, 2019
Des. Codes Cryptogr., 2019
Clust. Comput., 2019
Adv. Math. Commun., 2019
More Optimal Difference Systems of Sets and Frequency-Hopping Sequences From Zero-Difference Functions.
IEEE Access, 2019
Appl. Algebra Eng. Commun. Comput., 2019
2018
Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
J. Ambient Intell. Humaniz. Comput., 2018
A Kind of Disjoint Cyclic Perfect Mendelsohn Difference Family and Its Applications in Strictly Optimal FHSs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEEE Commun. Lett., 2018
Discret. Appl. Math., 2018
Vibration Boundary Control for a One-Dimensional Flexible Beam System With Restricted Input.
IEEE Access, 2018
Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things.
IEEE Access, 2018
Proceedings of the IEEE Information Theory Workshop, 2018
2017
Soft Comput., 2017
J. Netw. Comput. Appl., 2017
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017
IACR Cryptol. ePrint Arch., 2017
Finite Fields Their Appl., 2017
Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage.
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
A kind of disjoint cyclic perfect mendelsohn difference family and its applications in strictly optimal FHSs.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
A Method to Enlarge the Design Distance of BCH Codes and Some Classes of Infinite Optimal Cyclic Codes.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
MD-<i>VC</i><sub>Matrix</sub>: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication.
Proceedings of the Network and System Security - 10th International Conference, 2016
Highly Efficient Proxy Re-encryption Schemes for User-End Encrypted Cloud Data Sharing.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
2015
J. Cloud Comput., 2015
Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix.
J. Cloud Comput., 2015
Int. J. Inf. Commun. Technol., 2015
Sci. China Inf. Sci., 2015
2014
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014
Int. J. High Perform. Syst. Archit., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Math. Comput. Model., 2013
J. Syst. Sci. Complex., 2013
Inf. Process. Lett., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
2012
Sci. China Inf. Sci., 2012
Sci. China Inf. Sci., 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
Sci. China Inf. Sci., 2011
The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution).
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
2010
2009
J. Syst. Sci. Complex., 2009
How to construct efficient on-line/off-line threshold signature schemes through the simulation approach.
Concurr. Comput. Pract. Exp., 2009
2008
IACR Cryptol. ePrint Arch., 2008
Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs.
Sci. China Ser. F Inf. Sci., 2008
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003