Fang Qi

According to our database1, Fang Qi authored at least 24 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation.
Telecommunication Systems, 2018

2017
An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Traceable and Complete Fine-Grained Revocable Multi-authority Attribute-Based Encryption Scheme in Social Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Module-Level Software Streaming Loading Model Based on Hypervisor.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Optimal transitional trajectory generation for automatic machines.
IJCSE, 2016

Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
A local binary pattern based texture descriptors for classification of tea leaves.
Neurocomputing, 2015

Selective partial recovery optimisation strategy for SSL connection migration.
IJAACS, 2015

Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems.
Proceedings of the 2015 IEEE International Conference on Peer-to-Peer Computing, 2015

Efficient Private Matching Scheme for Friend Information Exchange.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

New Escrow-Free Scheme for Hierarchical Identity-Based Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Some topics in modeling ranking data.
PhD thesis, 2014

Unified Security Architecture Research for 5G Wireless System.
Proceedings of the 11th Web Information System and Application Conference, 2014

2013
User requirements-aware security ranking in SSL protocol.
The Journal of Supercomputing, 2013

2011
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users.
Security and Communication Networks, 2011

Dynamic fuzzy neural network for the intelligent control of a humanoid robot.
Comput. Syst. Sci. Eng., 2011

2009
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
Attacks vs. Countermeasures of SSL Protected Trust Model.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2006
Preventing Web-Spoofing with Automatic Detecting Security Indicator.
Proceedings of the Information Security Practice and Experience, 2006

2005
Batching SSL/TLS Handshake Improved.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Available Bandwidth Measurement Schemes over Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...