Qiang Tang

Qiang Tang
Postal Address Université du Luxembourg
2, avenue de l'Université
L-4365 Esch-sur-Alzette
powered by
orbilu.uni.lu

2018

Full Text
See detailThe Price of Privacy in Collaborative Learning
Pejo, Balazs; Tang, Qiang; Gergely, Biczok

Poster (2018, October)

Top of Page

2016

Full Text
See detailOn the power of Public-key Function-Private Functional Encryption
Iovino, Vincenzo; Tang, Qiang; Zebrowski, Karol

in 15th International Conference on Cryptology and Network Security (2016)

Full Text
See detailTwo More Efficient Variants of the J-PAKE Protocol
Skrobot, Marjan; Lancrenon, Jean; Tang, Qiang

in ACNS 2016 (2016, June)

Top of Page

2015

Full Text
See detailKey Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes
Chenal, Massimo; Tang, Qiang

in Information Security - 18th International Conference, ISC 2015 (2015, September)

Full Text
See detailMethods to Mitigate Risk of Composition Attack in Independent Data Publications
Li, Jiuyong; Sattar, Sarowar A.; Baig, Muzammil M.; Liu, Jixue; Tang, Qiang; Malin, Bradley

in Medical Data Privacy Handbook 2015 (2015)

Full Text
See detailTowards Forward Security Properties for PEKS and IBE
Tang, Qiang

in Information Security and Privacy - 20th Australasian Conference, ACISP 2015 (2015)

Full Text
See detailExtend the Concept of Public Key Encryption with Delegated Search
Tang, Qiang; Ma, Hua; Chen, Xiaofeng

in Computer Journal (2015), 58(4), 11

Full Text
See detailPrivacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions
Tang, Qiang; Wang, Jun

in Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security (2015, September)

Top of Page

2014

Full Text
See detailDistributed Searchable Symmetric Encryption
Bosch; Peter, Andreas; Leenders, Bram; Lim, Hoon Wei; Tang, Qiang; Wang, Huaxiong; Hartel, Pieter; Jonker, Willem

in PST2014 International Conference on Privacy, Security and Trust (2014)

Full Text
See detailNew Algorithms for Secure Outsourcing of Modular Exponentiations
Chen, Xiaofeng; Li, Jin; Ma, Jianfeng; Tang, Qiang; Lou, Wenjing

in IEEE Trans. Parallel Distrib. Syst. (2014), 25(9), 2386-2396

Full Text
See detailEfficient Algorithms for Secure Outsourcing of Bilinear Pairings
Chen, Xiaofeng; Susilo, Willy; Li, Jin; Wong, Duncan; Ma, Jianfeng; Tang, Shaohua; Tang, Qiang

in Theoretical Computer Science (2014)

Full Text
See detailOn Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Chenal, Massimo; Tang, Qiang

in Progress in Cryptology - LATINCRYPT 2014, Florianópolis 17-19 September 2014 (2014)

Full Text
See detailTrapdoor Privacy in Asymmetric Searchable Encryption Schemes
Delerue Arriaga, Afonso; Tang, Qiang; Ryan, Peter

in Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014 (2014)

Full Text
See detailNothing is for Free: Security in Searching Shared & Encrypted Data
Tang, Qiang

in IEEE Transactions on Information Forensics & Security (2014)

Top of Page

2013

Full Text
See detailProving Prêt à Voter Receipt Free Using Computational Security Models
Khader, Dalia; Ryan, Peter; Tang, Qiang

in USENIX Journal of Election Technology and Systems (2013), 1(1), 62-81

Full Text
See detailTowards a privacy-preserving solution for OSNs
Tang, Qiang

in Sandhu, Ravi; Lopez, Javier; Huang, Xinyi (Eds.) Towards a privacy-preserving solution for OSNs (2013)

Full Text
See detailSearch in Encrypted Data: Theoretical Models and Practical Applications
Tang, Qiang

in Theory and Practice of Cryptography Solutions for Secure Information Systems (2013)

Full Text
See detailTowards asymmetric searchable encryption with message recovery and flexible search authorization
Tang, Qiang; Chen, Xiaofeng

in Proceeding of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (2013)

Top of Page