Qiuxiang Dong

According to our database1, Qiuxiang Dong authored at least 13 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Building private blockchains over public blockchains (PoP): an attribute-based access control approach.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Attribute Based Encryption for Information Sharing on Tactical Mobile Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication.
IACR Cryptology ePrint Archive, 2017

ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption.
IACR Cryptology ePrint Archive, 2017

HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing.
IACR Cryptology ePrint Archive, 2017

Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SCRHM: A Secure Continuous Remote Health Monitoring System.
IJDSN, 2015

Attribute-Based Keyword Search Efficiency Enhancement via an Online/Offline Approach.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Trustworthy Collaborative Filtering through Downweighting Noise and Redundancy.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Large-Scale Heterogeneous Program Retrieval through Frequent Pattern Discovery and Feature Correlation Analysis.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

Fuzzy Keyword Search over Encrypted Data in the Public Key Setting.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Accelerating AES in JavaScript with WebGL.
Proceedings of the Information and Communications Security - 15th International Conference, 2013