Qiang Tang
Orcid: 0000-0002-6153-4255Affiliations:
- Luxembourg Institute of Science and Technology, Luxembourg
- University of Twente, Enschede, The Netherlands (former)
- University of London, UK (PhD 2007)
According to our database1,
Qiang Tang
authored at least 120 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on wwwde.uni.lu
-
on tangqiang.eu
On csauthors.net:
Bibliography
2024
Future Internet, April, 2024
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities.
IEEE Internet Things Mag., March, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
ACM Trans. Spatial Algorithms Syst., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
IEEE Access, 2022
IEEE Access, 2022
Proceedings of the Information Security Practice and Experience, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Proc. Priv. Enhancing Technol., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Comput. J., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Collaborative Recommendations, 2018
2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016
2015
Theor. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data.
Comput. J., 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Comput. Sci. Inf. Syst., 2013
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Towards asymmetric searchable encryption with message recovery and flexible search authorization.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Public key encryption supporting plaintext equality test and user-specified authorization.
Secur. Commun. Networks, 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012
Public key encryption schemes supporting equality test with authorisation of different granularity.
Int. J. Appl. Cryptogr., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Privacy-preserving collaborative filtering based on horizontally partitioned dataset.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
2011
Inf. Process. Lett., 2011
Int. J. Comput. Math., 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records.
Int. J. Comput. Model. Algorithms Medicine, 2010
IACR Cryptol. ePrint Arch., 2010
KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Proceedings of the Data and Applications Security XXIII, 2009
2008
J. Univers. Comput. Sci., 2008
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security, 10th International Conference, 2007
Extended Private Information Retrieval and Its Application in Biometrics Authentications.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
J. Syst. Softw., 2006
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability.
IACR Cryptol. ePrint Arch., 2006
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Comput. Stand. Interfaces, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004