Miaomiao Tian

Orcid: 0000-0002-8195-5823

Affiliations:
  • Anhui University, Hefei, China
  • University of Science and Technology of China, Hefei, China (PhD 2014)


According to our database1, Miaomiao Tian authored at least 43 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Forward and backward secure searchable encryption with multi-keyword search and result verification.
Sci. China Inf. Sci., 2022

2021
Fair auctioning and trading framework for cloud virtual machines based on blockchain.
Comput. Commun., 2021

2020
Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks.
IEEE Trans. Veh. Technol., 2020

Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain.
CoRR, 2020

Lightweight Proofs of Storage with Public Verifiability from Lattices.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
PATH: privacy-preserving auction for heterogeneous spectrum allocations.
Wirel. Networks, 2019

Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem.
IEEE Access, 2019

A Lattice-Based Incremental Signature Scheme.
IEEE Access, 2019

2018
A Load-Balancing Mechanism for Distributed SDN Control Plane Using Response Time.
IEEE Trans. Netw. Serv. Manag., 2018

Attribute-based Data Integrity Checking for Cloud Storage.
Fundam. Informaticae, 2018

Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data.
IEEE Access, 2018

A Simpler Construction of Identity-Based Ring Signatures from Lattices.
Proceedings of the Provable Security, 2018

PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Identity-Based Proofs of Storage with Enhanced Privacy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SMCLBRT: A Novel Load-Balancing Strategy of Multiple SDN Controllers Based on Response Time.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication.
Int. J. Netw. Secur., 2016

Identity-based Signatures from Lattices: Simpler, Faster, Shorter.
Fundam. Informaticae, 2016

An Efficient Task Assignment Mechanism for Crowdsensing Systems.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation in Wireless Communications.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
Certificateless and certificate-based signatures from lattices.
Secur. Commun. Networks, 2015

Identity-based proxy re-signatures from lattices.
Inf. Process. Lett., 2015

STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Personalized Privacy-Preserving Data Aggregation for Histogram Estimation.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
A novel distributed covert channel in HTTP.
Secur. Commun. Networks, 2014

Improvement of a Lattice-based Signature Scheme.
J. Inf. Hiding Multim. Signal Process., 2014

Security Analysis of a fuzzy Identity-Based Encryption Scheme.
J. Circuits Syst. Comput., 2014

Insecurity of an efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2014

Two Simple Attacks on a Blind Signature Scheme.
Int. J. Netw. Secur., 2014

On the security of an enhanced signature scheme.
Int. J. Inf. Commun. Technol., 2014

Practical certificateless short signature scheme.
Int. J. Electron. Secur. Digit. Forensics, 2014

Cryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme.
Fundam. Informaticae, 2014

Efficient Identity-Based Signature from Lattices.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

PS-TRUST: Provably secure solution for truthful double spectrum auctions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Efficient hierarchical identity-based signatures from lattices.
Int. J. Electron. Secur. Digit. Forensics, 2013

Lattice-based message recovery signature schemes.
Int. J. Electron. Secur. Digit. Forensics, 2013

Cryptanalysis of a certificateless signature scheme without pairings.
Int. J. Commun. Syst., 2013

2012
Security of a Biometric Identity-based Encryption Scheme.
Int. J. Netw. Secur., 2012

A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model.
Int. J. Netw. Secur., 2012

Breaking A Proxy Signature Scheme From Lattices.
Int. J. Netw. Secur., 2012

A note on 'An efficient certificateless aggregate signature with constant pairing computations'.
IACR Cryptol. ePrint Arch., 2012

On the Security of an identity-based short signature scheme
CoRR, 2012

2011
Protocol to Compute Polygon Intersection in STC Model.
Proceedings of the Information Computing and Applications, 2011


  Loading...