Qiang Tang

Calculated based on number of publications stored in Pure and citations from Scopus

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2014

    Graded encryption, or how to play “who wants to be a millionaire?” Distributively

    Kiayias, A., Osmanoglu, M. & Tang, Q., 2014, Information Security - 17th International Conference, ISC 2014, Proceedings. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 377-387 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations