Qiang Tang

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20102021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2014

    Graded encryption, or how to play “who wants to be a millionaire?” Distributively

    Kiayias, A., Osmanoglu, M. & Tang, Q., 2014, Information Security - 17th International Conference, ISC 2014, Proceedings. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 377-387 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations