Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2013 | 2012 | 2011 | 2010 | 2009 | 2008
Number of items: 43.

2013

Jeckmans, Arjan and Beye, Michael and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2013) Privacy in recommender systems. In: Social media retrieval. Computer Communications and Networks . Springer Verlag, London, pp. 263-281. ISBN 9781447145547

2012

Beye, Michael and Jeckmans, Arjan J.P. and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2012) Privacy in Online Social Networks. In: Computational Social Networks: Security and Privacy. Springer Verlag, London, pp. 87-113. ISBN 9781447140504

Bösch, Christoph and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security, ISC 2012, 19-21 September 2012, Passau, Germany.

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2012) Privacy-Preserving Collaborative Filtering based on Horizontally Partitioned Dataset. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 439-446).

Tang, Qiang (2012) Cryptographic framework for analyzing the privacy of recommender algorithms. In: International Conference on Collaboration Technologies and Systems, CTS 2012, 21-25 May 2012, Denver, CO, USA (pp. pp. 455-462).

Tang, Qiang (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Security and communication networks, 5 (12). pp. 1351-1362. ISSN 1939-0122

Tang, Qiang (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. International journal of applied cryptography, 2 (4). pp. 304-321. ISSN 1753-0563

2011

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. [Report]

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) Privacy-Preserving Profile Matching Using the Social Graph. In: International Conference on Computational Aspects of Social Networks, CASoN 2011, 19-21 October 2011 , Salamanca, Spain (pp. pp. 42-47).

Jeckmans, Arjan and Tang, Qiang and Hartel, Pieter (2011) POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks. In: 18th ACM conference on Computer and Communications Security, CCS 2011, 17-21 October 2011 , Chicago, IL, USA (pp. pp. 793-795).

Tang, Qiang (2011) Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. In: Proceedings of the 16th Australian conference on information security and privacy, 11-13 Jul 2011, Melbourne, Australia.

Tang, Qiang (2011) Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization. [Report]

Tang, Qiang and Chen, Liqun (2011) Extended KCI attack against two-party key establishment protocols. Information Processing Letters, 111 (15). pp. 744-747. ISSN 0020-0190

Tang, Qiang and Jeckmans, Arjan (2011) Towards a security model for computational puzzle schemes. International Journal of Computer Mathematics, 88 (11). pp. 2246-2257. ISSN 0020-7160

2010

Beye, Michael and Jeckmans, Arjan and Erkin, Zekeriya and Hartel, Pieter and Lagendijk, Reginald and Tang, Qiang (2010) Literature Overview - Privacy in Online Social Networks. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2010) Embedding renewable cryptographic keys into noisy data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262

Gong, Zheng and Tang, Qiang and Law, Yee Wei and Chen, Hongyang (2010) KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. In: International Conference on Information Security and Cryptology, INSCRYPT 2010, 20-24 Oct 2010, Shanghai, China.

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine, 1 (2). pp. 1-21. ISSN 1947-3133

Tang, Qiang (2010) User-friendly matching protocol for online social networks. In: 17th ACM Conference on Computer and Communications Security, 4-8 oct 2010, Chicago, IL (pp. pp. 732-734).

Tang, Qiang (2010) Privacy Preserving Mapping Schemes Supporting Comparison. In: ACM Cloud Computing Security Workshop, CCSW 2010, 9 oct 2010, Chicago, Illinois.

Tang, Qiang (2010) From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. [Report]

Tang, Qiang and Jeckmans, Arjan (2010) On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes. [Report]

Tang, Qiang and Jeckmans, Arjan (2010) Efficient Client Puzzle Schemes to Mitigate DoS Attacks. In: International Conference on Computational Intelligence and Security, CIS 2010, 11-14 dec 2010, Nanning, China.

2009

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th International Conference on Information Security Practice and Experience, ISPEC, 12-15 April 2009, Xi'an, China (pp. pp. 1-12).

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. [Report]

Pieters, W. and Tang, Q. (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada (pp. pp. 240-251).

Saffarian, M. and Tang, Q. and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. [Report]

Tang, Q. (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. (In Press)

Tang, Q. and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. (In Press)

Tang, Q. and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China (pp. pp. 332-347).

Weng, Jiang and Yang, Yanjiang and Tang, Qiang and Deng, Robert H. and Bao, Feng (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security. Lecture Notes in Computer Science, 5735 . Springer Verlag, Heidelberg, pp. 151-166. ISBN 9783642044731

2008

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, ICICS, October 20-22, 2008, Birmingham, UK (pp. pp. 294-310).

Dimkov, T. and Tang, Q. and Hartel, P.H. (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. [Report]

Dimkov, Trajce and Tang, Qiang and Hartel, Pieter (2008) On the inability of existing security models to cope with data mobility in dynamic organizations. In: Workshop on Modeling Security, MODSEC 2008, 28 Sep 2008, Toulouse, France (pp. pp. 1-13).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. [Report]

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: 5th VLDB Workshop on Secure Data Management, SDM, August 24, 2008, Auckland, New Zealand (pp. pp. 185-198).

Ibraimi, Luan and Tang, Qiang and Hartel, Pieter and Jonker, Willem (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Report]

Tang, Q. and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia (pp. pp. 56-70).

Tang, Q. (2008) Type-based Proxy Re-encryption and its Construction. [Report]

Tang, Q. (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. [Report]

Tang, Q. (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. [Report]

Tang, Q. (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India (pp. pp. 130-144).

Tang, Q. and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. [Report]

This list was generated on Wed Apr 23 05:23:19 2014 CEST.