Qiang Tang

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20102021

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2021

    Defending Use-After-Free via Relationship Between Memory and Pointer

    Xu, G., Li, M., Li, X., Chen, K., Wang, R., Wang, W., Liang, K., Tang, Q. & Liu, S., 2021, Collaborative Computing: Networking, Applications and Worksharing - 16th EAI International Conference, CollaborateCom 2020, Proceedings. Gao, H., Wang, X., Iqbal, M., Yin, Y., Yin, J. & Gu, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 583-597 15 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Enhancing the retailer gift card via blockchain: Trusted resale and more

    Lu, Y., Tang, Q. & Wang, G., Jan 1 2021, In: Journal of Database Management. 32, 1, p. 49-68 20 p.

    Research output: Contribution to journalArticlepeer-review

  • 2020

    A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs

    Xu, G., Zhou, W., Sangaiah, A. K., Zhang, Y., Zheng, X., Tang, Q., Xiong, N., Liang, K. & Zhou, X., Mar 1 2020, In: IEEE Network. 34, 2, p. 22-29 8 p., 9055733.

    Research output: Contribution to journalArticlepeer-review

    6 Scopus citations
  • CCA Updatable Encryption Against Malicious Re-encryption Attacks

    Chen, L., Li, Y. & Tang, Q., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 590-620 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Decentralizing IoT management systems using blockchain for censorship resistance

    He, S., Tang, Q., Wu, C. Q. & Shen, X., Jan 2020, In: IEEE Transactions on Industrial Informatics. 16, 1, p. 715-727 13 p., 8826230.

    Research output: Contribution to journalArticlepeer-review

    4 Scopus citations
  • Dragoon: Private decentralized hits made practical

    Lu, Y., Tang, Q. & Wang, G., Nov 2020, Proceedings - 2020 IEEE 40th International Conference on Distributed Computing Systems, ICDCS 2020. Institute of Electrical and Electronics Engineers Inc., p. 910-920 11 p. 9355719. (Proceedings - International Conference on Distributed Computing Systems; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Dumbo: Faster Asynchronous BFT Protocols

    Guo, B., Lu, Z., Tang, Q., Xu, J. & Zhang, Z., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 803-818 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited

    Lu, Y., Lu, Z., Tang, Q. & Wang, G., Jul 31 2020, PODC 2020 - Proceedings of the 39th Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 129-138 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Generic superlight client for permissionless blockchains

    Lu, Y., Tang, Q. & Wang, G., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 713-733 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Multi-input Laconic Function Evaluation

    Pang, B., Chen, L., Fan, X. & Tang, Q., 2020, Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Proceedings. Liu, J. K. & Cui, H. (eds.). Springer, p. 369-388 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12248 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    A Behavior-Aware Profiling of Smart Contracts

    Wei, X., Lu, C., Ozcan, F. R., Chen, T., Wang, B., Wu, D. & Tang, Q., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 245-258 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 305 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog

    Chow, S. S. M., Russell, A., Tang, Q., Yung, M., Zhao, Y. & Zhou, H. S., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Lin, D. & Sako, K. (eds.). Springer Verlag, p. 221-251 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11442 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • On distributed information composition in big data systems

    Alquwaiee, H., He, S., Wu, C., Tang, Q. & Shen, X., Sep 2019, Proceedings - IEEE 15th International Conference on eScience, eScience 2019. Institute of Electrical and Electronics Engineers Inc., p. 168-177 10 p. 9041699. (Proceedings - IEEE 15th International Conference on eScience, eScience 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On enabling machine learning tasks atop public blockchains: A crowdsourcing approach

    Lu, Y., Tang, Q. & Wang, G., Feb 7 2019, Proceedings - 18th IEEE International Conference on Data Mining Workshops, ICDMW 2018. Zhu, F., Li, Z., Yu, J. & Tong, H. (eds.). IEEE Computer Society, p. 81-88 8 p. 8637413. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 2018-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 2018

    Censorship resistant decentralized IoT management systems

    He, S., Tang, Q. & Wu, C. Q., Nov 5 2018, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018. Association for Computing Machinery, p. 454-459 6 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Correcting subverted random oracles

    Russell, A., Tang, Q., Yung, M. & Zhou, H. S., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 241-271 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Enabling efficient and fine-grained DNA similarity search with access control over encrypted cloud data

    Li, H., Xu, G., Tang, Q., Lin, X. & Shen, X. S., 2018, Wireless Algorithms, Systems, and Applications - 13th International Conference, WASA 2018, Proceedings. Cheng, W., Li, W. & Chellappan, S. (eds.). Springer Verlag, p. 236-248 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10874 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Making any attribute-based encryption accountable, efficiently

    Lai, J. & Tang, Q., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Zhou, J., Soriano, M. & Lopez, J. (eds.). Springer Verlag, p. 527-547 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11099 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Making Public Key Functional Encryption Function Private, Distributively

    Fan, X. & Tang, Q., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Verlag, p. 218-244 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10770 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • ZebraLancer: Private and anonymous crowdsourcing system atop open blockchain

    Lu, Y., Tang, Q. & Wang, G., Jul 19 2018, Proceedings - 2018 IEEE 38th International Conference on Distributed Computing Systems, ICDCS 2018. Institute of Electrical and Electronics Engineers Inc., p. 853-865 13 p. (Proceedings - International Conference on Distributed Computing Systems; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    72 Scopus citations
  • 2017

    Cliptography: Post-snowden cryptography

    Tang, Q. & Yung, M., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2615-2616 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Generic Semantic Security against a kleptographic adversary

    Russell, A., Tang, Q., Yung, M. & Zhou, H. S., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 907-922 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • 2016

    Cliptography: Clipping the power of kleptographic attacks

    Russell, A., Tang, Q., Yung, M. & Zhou, H. S., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Cheon, J. H. & Takagi, T. (eds.). Springer Verlag, p. 34-64 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Efficient encrypted keyword search for multi-user data sharing

    Kiayias, A., Oksuz, O., Russell, A., Tang, Q. & Wang, B., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 173-195 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Scopus citations
  • Honey encryption beyond message recovery security

    Jaeger, J., Ristenpart, T. & Tang, Q., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J-S. (eds.). Springer Verlag, p. 758-788 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • On the Security of Key Extraction From Measuring Physical Quantities

    Edman, M., Kiayias, A., Tang, Q. & Yener, B., Aug 2016, In: IEEE Transactions on Information Forensics and Security. 11, 8, p. 1796-1806 11 p., 7435287.

    Research output: Contribution to journalArticlepeer-review

    12 Scopus citations
  • 2015

    Communication optimal tardos-based asymmetric fingerprinting

    Kiayias, A., Leonardos, N., Lipmaa, H., Pavlyk, K. & Tang, Q., 2015, Topics in Cryptology - CT-RSA 2015 - The Cryptographers’ Track at the RSA Conference 2015, Proceedings. Nyberg, K. (ed.). Springer Verlag, p. 469-486 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9048).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Distributed parameter generation for bilinear diffie hellman exponentiation and applications

    Kiayias, A., Oksuz, O. & Tang, Q., 2015, Information Security - 18th International Conference, ISC 2015, Proceedings. Lopez, J. & Mitchell, C. J. (eds.). Springer Verlag, p. 548-567 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9290).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Graded signatures

    Kiayias, A., Osmanoglu, M. & Tang, Q., 2015, Information Security - 18th International Conference, ISC 2015, Proceedings. Lopez, J. & Mitchell, C. J. (eds.). Springer Verlag, p. 61-80 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9290).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Making any identity-based encryption accountable, efficiently

    Kiayias, A. & Tang, Q., 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer Verlag, p. 326-346 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Traitor Deterring Schemes: Using bitcoin as collateral for digital content

    Kiayias, A. & Tang, Q., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 231-242 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2014

    Graded encryption, or how to play “who wants to be a millionaire?” Distributively

    Kiayias, A., Osmanoglu, M. & Tang, Q., 2014, Information Security - 17th International Conference, ISC 2014, Proceedings. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 377-387 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • 2013

    How to keep a secret: Leakage deterring public-key cryptosystems

    Kiayias, A. & Tang, Q., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 943-954 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • 2010

    Verifiable attribute based encryption

    Tang, Q. & Ji, D., Dec 1 2010, In: International Journal of Network Security. 10, 2, p. 114-120 7 p.

    Research output: Contribution to journalArticlepeer-review

    14 Scopus citations