Qiong Huang

According to our database1, Qiong Huang authored at least 121 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020

Group public key encryption with equality test against offline message recovery attack.
Inf. Sci., 2020

Leakage-resilient group signature: Definitions and constructions.
Inf. Sci., 2020

Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting.
IEEE Access, 2020

Improving Multi-Histogram-Based Reversible Watermarking Using Optimized Features and Adaptive Clustering Number.
IEEE Access, 2020

A New MRF-Based Lossy Compression for Encrypted Binary Images.
IEEE Access, 2020

Attribute-Based Equality Test Over Encrypted Data Without Random Oracles.
IEEE Access, 2020

Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain.
IEEE Access, 2020

2019
Leakage-resilient ring signature schemes.
Theor. Comput. Sci., 2019

Signature Scheme from Trapdoor Functions.
J. Internet Serv. Inf. Secur., 2019

Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019

Leakage-Resilient Group Signature: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2019

Multi-Party Quantum Summation Based on Quantum Teleportation.
Entropy, 2019

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups.
IEEE Access, 2019

Optimizing the Sensor Movement for Barrier Coverage in a Sink-Based Deployed Mobile Sensor Network.
IEEE Access, 2019

Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019

Plaintext-Verifiably-Checkable Encryption.
Proceedings of the Provable Security, 2019

Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable Security, 2019

Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2019

Secure, Efficient and Searchable File System on Distributed Clouds.
Proceedings of the Data Science, 2019

An Experimental Study of Emergence of Communication of Reinforcement Learning Agents.
Proceedings of the Artificial General Intelligence - 12th International Conference, 2019

Label-Smooth Learning for Fine-Grained Visual Categorization.
Proceedings of the Pattern Recognition - 5th Asian Conference, 2019

Group ID-Based Encryption with Equality Test.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Efficient Compression of Encrypted Binary Images Using the Markov Random Field.
IEEE Trans. Inf. Forensics Secur., 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018

Black-box constructions of signature schemes in the bounded leakage setting.
Inf. Sci., 2018

Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification.
IACR Cryptol. ePrint Arch., 2018

Leakage-Resilient Dual-Form Signatures.
Comput. J., 2018

Authorized Function Homomorphic Signature.
Comput. J., 2018

Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Secure File Storage System Among Distributed Public Clouds.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Chronic Kidney Disease Medication Adherence and its Influencing Factors: An Observation and Analysis.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2017
Privacy-Preserving Location Sharing Services for Social Networks.
IEEE Trans. Serv. Comput., 2017

Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Systems Journal, 2017

TabletGaze: dataset and analysis for unconstrained appearance-based gaze estimation in mobile tablets.
Mach. Vis. Appl., 2017

Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols.
J. Internet Serv. Inf. Secur., 2017

Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Secur. Appl., 2017

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks.
Inf. Sci., 2017

A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting.
Int. J. Found. Comput. Sci., 2017

2016
A Joint Random Secret Sharing Scheme with Public Verifiability.
Int. J. Netw. Secur., 2016

Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more.
Int. J. Inf. Sec., 2016

Self-Dual Codes over ℤ<sub>2</sub> × (ℤ<sub>2</sub> + uℤ<sub>2</sub>).
CoRR, 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016

A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model.
Proceedings of the Provable Security, 2016

Emergence of communication among reinforcement learning agents under coordination environment.
Proceedings of the 2016 Joint IEEE International Conference on Development and Learning and Epigenetic Robotics, 2016

Energy-Efficient Femtocells Active/Idle Control and Load Balancing in Heterogeneous Networks.
Proceedings of the Communications and Networking, 2016

Energy-Efficient Resource Allocation in Distributed Antenna Systems.
Proceedings of the Communications and Networking, 2016

2015
User-Defined Privacy Grid System for Continuous Location-Based Services.
IEEE Trans. Mob. Comput., 2015

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015

Concurrent signature without random oracles.
Theor. Comput. Sci., 2015

Ambiguous optimistic fair exchange: Definition and constructions.
Theor. Comput. Sci., 2015

A new encryption-then-compression algorithm using the rate-distortion optimization.
Signal Process. Image Commun., 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Security and Communication Networks, 2015

How to protect privacy in Optimistic Fair Exchange of digital signatures.
Inf. Sci., 2015

A Summary of the Special Issue "Cybersecurity and Cryptography".
Inf., 2015

TabletGaze: A Dataset and Baseline Algorithms for Unconstrained Appearance-based Gaze Estimation in Mobile Tablets.
CoRR, 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

2014
Extending concurrent signature to multiple parties.
Theor. Comput. Sci., 2014

Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited.
IACR Cryptol. ePrint Arch., 2014

Digital provenance: Enabling secure data forensics in cloud computing.
Future Gener. Comput. Syst., 2014

P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

A User-Based Document Management Mechanism in Cloud.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Short and efficient convertible undeniable signature schemes without random oracles.
Theor. Comput. Sci., 2013

Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures.
IEEE Trans. Computers, 2013

The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles.
Inf. Sci., 2013

New delay-dependent stability analysis for fuzzy time-delay interconnected systems.
Int. J. General Systems, 2013

Ambiguous One-Move Nominative Signature Without Random Oracles.
IACR Cryptol. ePrint Arch., 2013

A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
IACR Cryptol. ePrint Arch., 2013

An ontology-based approach to automated trust negotiation.
Comput. Stand. Interfaces, 2013

Mobility management in VANET.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

A new state estimator for spacecrafts at injection phase.
Proceedings of the Ninth International Conference on Natural Computation, 2013

2012
Cross-Layer Design of Combining HARQ with Adaptive Modulation and Coding for Nakagami-m Fading Channels.
J. Commun., 2012

A new efficient optimistic fair exchange protocol without random oracles.
Int. J. Inf. Sec., 2012

Relay vehicle based access network selection scheme for Vehicular Ad Hoc Network.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

Multi-Committer Threshold Commitment Scheme from Lattice.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

A bio-inspired adaptive end-to-end network multi-path routing to achieve load-balance.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Privacy-Preserving Noisy Keyword Search in Cloud Computing.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange.
IEEE Trans. Inf. Forensics Secur., 2011

Identity-based strong designated verifier signature revisited.
J. Syst. Softw., 2011

Group-oriented fair exchange of signatures.
Inf. Sci., 2011

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
Int. J. Inf. Sec., 2011

Efficient Multicast Key Distribution Using HOWF-based Access Control Structures.
IACR Cryptol. ePrint Arch., 2011

Heterogeneous Signcryption with Key Privacy.
Comput. J., 2011

Concurrent Signatures with Fully Negotiable Binding Control.
Proceedings of the Provable Security - 5th International Conference, 2011

An Efficient Construction of Time-Selective Convertible Undeniable Signatures.
Proceedings of the Information Security, 14th International Conference, 2011

Short Convertible Undeniable Signature in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2011

Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Universal authentication protocols for anonymous wireless communications.
IEEE Trans. Wireless Communications, 2010

Corrections to "UWB Through-Wall Imaging Based on Compressive Sensing" [Mar 10 1408-1415].
IEEE Trans. Geosci. Remote. Sens., 2010

UWB Through-Wall Imaging Based on Compressive Sensing.
IEEE Trans. Geosci. Remote. Sens., 2010

Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model.
J. Comput. Sci. Technol., 2010

Oblivious Transfer with Access Control : Realizing Disjunction without Duplication.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract).
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Extending Magic Sets Technique to Deductive Databases with Uncertainty.
Proceedings of the Fourth International VLDB workshop on Management of Uncertain Data (MUD 2010) in conjunction with VLDB 2010, 2010

Probabilistic Public Key Encryption with Equality Test.
Proceedings of the Topics in Cryptology, 2010

2009
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability.
IACR Cryptol. ePrint Arch., 2009

New Constructions of Convertible Undeniable Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2009

Non-delegatable Identity-based Designated Verifier Signature.
IACR Cryptol. ePrint Arch., 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
Generic Transformation from Weakly to Strongly Unforgeable Signatures.
J. Comput. Sci. Technol., 2008

Efficient lattice-based signature scheme.
Int. J. Appl. Cryptogr., 2008

On the relation among various security models for certificateless cryptography.
Int. J. Appl. Cryptogr., 2008

An efficient one-move Nominative Signature scheme.
Int. J. Appl. Cryptogr., 2008

Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Ambiguous Optimistic Fair Exchange.
Proceedings of the Advances in Cryptology, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
A New Security Definition for Public Key Encryption Schemes and Its Applications.
IACR Cryptol. ePrint Arch., 2007

Nominative Signature: Application, Security Model and Construction.
IACR Cryptol. ePrint Arch., 2007

Generic Certificateless Encryption in the Standard Model.
IACR Cryptol. ePrint Arch., 2007

Time Capsule Signature: Efficient and Provably Secure Constructions.
IACR Cryptol. ePrint Arch., 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Generic Certificateless Key Encapsulation Mechanism.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Generic Transformation to Strongly Unforgeable Signatures.
IACR Cryptol. ePrint Arch., 2006

Query result ranking over e-commerce web databases.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

2001
Visualization of Real Three-Dimensional Objects.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001


  Loading...