Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
Number of items: 44.

2014

Bösch, Christoph and Peter, Andreas and Leenders, Bram and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, Pieter and Jonker, Willem (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada.

2013

Jeckmans, Arjan and Beye, Michael and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2013) Privacy in recommender systems. In: Social media retrieval. Computer Communications and Networks . Springer Verlag, London, pp. 263-281. ISBN 9781447145547

2012

Beye, Michael and Jeckmans, Arjan J.P. and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 9781447140504

Bösch, Christoph and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security, ISC 2012, 19-21 September 2012, Passau, Germany.

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 439-446).

Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 455-462).

Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and communication networks, 5 (12). pp. 1351-1362. ISSN 1939-0122

Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International journal of applied cryptography, 2 (4). pp. 304-321. ISSN 1753-0563

2011

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. [Report]

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 October 2011 , Salamanca, Spain (pp. pp. 42-47).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: 18th ACM conference on Computer and Communications Security, CCS 2011, 17-21 October 2011 , Chicago, IL, USA (pp. pp. 793-795).

Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia.

Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. [Report]

Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information Processing Letters, 111 (15). pp. 744-747. ISSN 0020-0190

Tang, Qiang and Jeckmans, Arjan (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160

2010

Beye, Michael and Jeckmans, Arjan and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2010) Embedding renewable cryptographic keys into noisy data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262

Gong, Zheng and Tang, Qiang and Law, Yee Wei and Chen, Hongyang (2010) KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In: International Conference on Information Security and Cryptology, INSCRYPT 2010, 20-24 Oct 2010, Shanghai, China.

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine, 1 (2). pp. 1-21. ISSN 1947-3133

Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: 17th ACM Conference on Computer and Communications Security, 4-8 oct 2010, Chicago, IL (pp. pp. 732-734).

Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop, CCSW 2010, 9 oct 2010, Chicago, Illinois.

Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. [Report]

Tang, Qiang and Jeckmans, Arjan (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. [Report]

Tang, Qiang and Jeckmans, Arjan (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security, CIS 2010, 11-14 dec 2010, Nanning, China.

2009

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th International Conference on Information Security Practice and Experience, ISPEC, 12-15 April 2009, Xi'an, China (pp. pp. 1-12).

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. [Report]

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada (pp. pp. 240-251).

Saffarian, M. and Tang, Q. and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. [Report]

Tang, Q. (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. (In Press)

Tang, Q. and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. (In Press)

Tang, Q. and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China (pp. pp. 332-347).

Weng, Jiang and Yang, Yanjiang and Tang, Qiang and Deng, Robert H. and Bao, Feng (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security. Lecture Notes in Computer Science, 5735 . Springer Verlag, Heidelberg, pp. 151-166. ISBN 9783642044731

2008

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, ICICS, October 20-22, 2008, Birmingham, UK (pp. pp. 294-310).

Dimkov, T. and Tang, Q. and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. [Report]

Dimkov, Trajce and Tang, Qiang and Hartel, Pieter (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Workshop on Modeling Security, MODSEC 2008, 28 Sep 2008, Toulouse, France (pp. pp. 1-13).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. [Report]

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: 5th VLDB Workshop on Secure Data Management, SDM, August 24, 2008, Auckland, New Zealand (pp. pp. 185-198).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Report]

Tang, Q. and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia (pp. pp. 56-70).

Tang, Q. (2008) Type-based Proxy Re-encryption and its Construction. [Report]

Tang, Q. (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. [Report]

Tang, Q. (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. [Report]

Tang, Q. (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India (pp. pp. 130-144).

Tang, Q. and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. [Report]

This list was generated on Mon Jul 28 05:22:19 2014 CEST.