Qiong Huang

According to our database1, Qiong Huang authored at least 107 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient Compression of Encrypted Binary Images Using the Markov Random Field.
IEEE Trans. Information Forensics and Security, 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Network and Computer Applications, 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018

Black-box constructions of signature schemes in the bounded leakage setting.
Inf. Sci., 2018

An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks.
IACR Cryptology ePrint Archive, 2018

Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification.
IACR Cryptology ePrint Archive, 2018

Leakage-Resilient Dual-Form Signatures.
Comput. J., 2018

Authorized Function Homomorphic Signature.
Comput. J., 2018

Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Secure File Storage System Among Distributed Public Clouds.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Privacy-Preserving Location Sharing Services for Social Networks.
IEEE Trans. Services Computing, 2017

Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Systems Journal, 2017

TabletGaze: dataset and analysis for unconstrained appearance-based gaze estimation in mobile tablets.
Mach. Vis. Appl., 2017

Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols.
J. Internet Serv. Inf. Secur., 2017

Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Sec. Appl., 2017

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks.
Inf. Sci., 2017

A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting.
Int. J. Found. Comput. Sci., 2017

Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting.
IACR Cryptology ePrint Archive, 2017

2016
A Joint Random Secret Sharing Scheme with Public Verifiability.
I. J. Network Security, 2016

Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more.
Int. J. Inf. Sec., 2016

Self-Dual Codes over ℤ2 × (ℤ2 + uℤ2).
CoRR, 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurrency and Computation: Practice and Experience, 2016

A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model.
Proceedings of the Provable Security, 2016

Emergence of communication among reinforcement learning agents under coordination environment.
Proceedings of the 2016 Joint IEEE International Conference on Development and Learning and Epigenetic Robotics, 2016

Energy-Efficient Femtocells Active/Idle Control and Load Balancing in Heterogeneous Networks.
Proceedings of the Communications and Networking, 2016

Energy-Efficient Resource Allocation in Distributed Antenna Systems.
Proceedings of the Communications and Networking, 2016

2015
User-Defined Privacy Grid System for Continuous Location-Based Services.
IEEE Trans. Mob. Comput., 2015

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Information Forensics and Security, 2015

Concurrent signature without random oracles.
Theor. Comput. Sci., 2015

Ambiguous optimistic fair exchange: Definition and constructions.
Theor. Comput. Sci., 2015

A new encryption-then-compression algorithm using the rate-distortion optimization.
Sig. Proc.: Image Comm., 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Security and Communication Networks, 2015

How to protect privacy in Optimistic Fair Exchange of digital signatures.
Inf. Sci., 2015

A Summary of the Special Issue "Cybersecurity and Cryptography".
Information, 2015

TabletGaze: A Dataset and Baseline Algorithms for Unconstrained Appearance-based Gaze Estimation in Mobile Tablets.
CoRR, 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

2014
Extending concurrent signature to multiple parties.
Theor. Comput. Sci., 2014

Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited.
IACR Cryptology ePrint Archive, 2014

Digital provenance: Enabling secure data forensics in cloud computing.
Future Generation Comp. Syst., 2014

P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

A User-Based Document Management Mechanism in Cloud.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Short and efficient convertible undeniable signature schemes without random oracles.
Theor. Comput. Sci., 2013

Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures.
IEEE Trans. Computers, 2013

The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles.
Inf. Sci., 2013

New delay-dependent stability analysis for fuzzy time-delay interconnected systems.
Int. J. General Systems, 2013

Ambiguous One-Move Nominative Signature Without Random Oracles.
IACR Cryptology ePrint Archive, 2013

A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
IACR Cryptology ePrint Archive, 2013

An ontology-based approach to automated trust negotiation.
Computer Standards & Interfaces, 2013

Mobility management in VANET.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
Proceedings of the Information Security Practice and Experience, 2013

A new state estimator for spacecrafts at injection phase.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Ambiguous One-Move Nominative Signature Without Random Oracles.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
Cross-Layer Design of Combining HARQ with Adaptive Modulation and Coding for Nakagami-m Fading Channels.
JCM, 2012

A new efficient optimistic fair exchange protocol without random oracles.
Int. J. Inf. Sec., 2012

Concurrent Signature without Random Oracles.
IACR Cryptology ePrint Archive, 2012

Relay vehicle based access network selection scheme for Vehicular Ad Hoc Network.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Multi-Committer Threshold Commitment Scheme from Lattice.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

A bio-inspired adaptive end-to-end network multi-path routing to achieve load-balance.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Privacy-Preserving Noisy Keyword Search in Cloud Computing.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange.
IEEE Trans. Information Forensics and Security, 2011

Identity-based strong designated verifier signature revisited.
Journal of Systems and Software, 2011

Group-oriented fair exchange of signatures.
Inf. Sci., 2011

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
Int. J. Inf. Sec., 2011

Efficient Multicast Key Distribution Using HOWF-based Access Control Structures.
IACR Cryptology ePrint Archive, 2011

Heterogeneous Signcryption with Key Privacy.
Comput. J., 2011

Concurrent Signatures with Fully Negotiable Binding Control.
Proceedings of the Provable Security - 5th International Conference, 2011

An Efficient Construction of Time-Selective Convertible Undeniable Signatures.
Proceedings of the Information Security, 14th International Conference, 2011

Short Convertible Undeniable Signature in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2011

Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Universal authentication protocols for anonymous wireless communications.
IEEE Trans. Wireless Communications, 2010

Corrections to "UWB Through-Wall Imaging Based on Compressive Sensing" [Mar 10 1408-1415].
IEEE Trans. Geoscience and Remote Sensing, 2010

UWB Through-Wall Imaging Based on Compressive Sensing.
IEEE Trans. Geoscience and Remote Sensing, 2010

Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model.
J. Comput. Sci. Technol., 2010

Oblivious Transfer with Access Control : Realizing Disjunction without Duplication.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract).
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Extending Magic Sets Technique to Deductive Databases with Uncertainty.
Proceedings of the Fourth International VLDB workshop on Management of Uncertain Data (MUD 2010) in conjunction with VLDB 2010, 2010

Probabilistic Public Key Encryption with Equality Test.
Proceedings of the Topics in Cryptology, 2010

2009
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability.
IACR Cryptology ePrint Archive, 2009

Group-Oriented Fair Exchange of Signatures.
IACR Cryptology ePrint Archive, 2009

New Constructions of Convertible Undeniable Signature Schemes without Random Oracles.
IACR Cryptology ePrint Archive, 2009

Non-delegatable Identity-based Designated Verifier Signature.
IACR Cryptology ePrint Archive, 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
Generic Transformation from Weakly to Strongly Unforgeable Signatures.
J. Comput. Sci. Technol., 2008

Efficient lattice-based signature scheme.
IJACT, 2008

On the relation among various security models for certificateless cryptography.
IJACT, 2008

An efficient one-move Nominative Signature scheme.
IJACT, 2008

Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Ambiguous Optimistic Fair Exchange.
Proceedings of the Advances in Cryptology, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
A New Security Definition for Public Key Encryption Schemes and Its Applications.
IACR Cryptology ePrint Archive, 2007

Nominative Signature: Application, Security Model and Construction.
IACR Cryptology ePrint Archive, 2007

An Efficient One-move Nominative Signature Scheme.
IACR Cryptology ePrint Archive, 2007

Generic Certificateless Encryption in the Standard Model.
IACR Cryptology ePrint Archive, 2007

Time Capsule Signature: Efficient and Provably Secure Constructions.
IACR Cryptology ePrint Archive, 2007

Generic Certificateless Encryption in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Time Capsule Signature: Efficient and Provably Secure Constructions.
Proceedings of the Public Key Infrastructure, 2007

Generic Transformation to Strongly Unforgeable Signatures.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Generic Certificateless Key Encapsulation Mechanism.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Generic Transformation to Strongly Unforgeable Signatures.
IACR Cryptology ePrint Archive, 2006

Query result ranking over e-commerce web databases.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

2001
Visualization of Real Three-Dimensional Objects.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001


  Loading...