Shaohua Tang

According to our database1, Shaohua Tang authored at least 117 papers between 1997 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Return just your search: privacy-preserving homoglyph search for arbitrary languages.
Frontiers Comput. Sci., 2022

2021
PACE: Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

Repot: Real-time and privacy-preserving online task assignment for mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021

A verifiable and privacy-preserving multidimensional data aggregation scheme in mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021

2020
EGeoIndis: An effective and efficient location privacy protection framework in traffic density detection.
Veh. Commun., 2020

Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

Reversible Data Hiding in JPEG Images Based on Negative Influence Models.
IEEE Trans. Inf. Forensics Secur., 2020

A novel selective encryption scheme for H.264/AVC video with improved visual security.
Signal Process. Image Commun., 2020

Improved block ordering and frequency selection for reversible data hiding in JPEG images.
Signal Process., 2020

IronM: Privacy-Preserving Reliability Estimation of Heterogeneous Data for Mobile Crowdsensing.
IEEE Internet Things J., 2020

Reversible contrast enhancement for medical images with background segmentation.
IET Image Process., 2020

2019
On Reliable Task Assignment for Spatial Crowdsourcing.
IEEE Trans. Emerg. Top. Comput., 2019

A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., 2019

A high-capacity reversible data hiding method for homomorphic encrypted images.
J. Vis. Commun. Image Represent., 2019

Privacy-preserving k nearest neighbor query with authentication on road networks.
J. Parallel Distributed Comput., 2019

Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Netw. Comput. Appl., 2019

RTPT: A framework for real-time privacy-preserving truth discovery on crowdsensed data streams.
Comput. Networks, 2019

Dynamic and Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing.
IEEE Access, 2019

Secure Encrypted Data With Authorized Deduplication in Cloud.
IEEE Access, 2019

High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction.
IEEE Access, 2019

BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing.
IEEE Access, 2019

Reversible Data Hiding With Image Contrast Enhancement Based on Two-Dimensional Histogram Modification.
IEEE Access, 2019

Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing.
Proceedings of the Information Security Applications - 20th International Conference, 2019

A privacy-preserving data aggregation of mobile crowdsensing based on local differential privacy.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
JPEG Image Encryption With Improved Format Compatibility and File Size Preservation.
IEEE Trans. Multim., 2018

New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions.
IEEE Trans. Inf. Theory, 2018

A novel reversible data hiding method with image contrast enhancement.
Signal Process. Image Commun., 2018

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition.
Secur. Commun. Networks, 2018

Circulant UOV: a new UOV variant with shorter private key and faster signature generation.
KSII Trans. Internet Inf. Syst., 2018

Precomputation Methods for UOV Signature on Energy-Harvesting Sensors.
IEEE Access, 2018

A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction.
IEEE Access, 2018

Image reversible visual transformation based on MSB replacement and histogram bin mapping.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

A Homomorphic LWE-Based Verifiable Electronic Voting System.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Online/offline signature based on UOV in wireless sensor networks.
Wirel. Networks, 2017

SpatialRecruiter: Maximizing Sensing Coverage in Selecting Workers for Spatial Crowdsourcing.
IEEE Trans. Veh. Technol., 2017

Online/Offline Provable Data Possession.
IEEE Trans. Inf. Forensics Secur., 2017

A secure image sharing scheme with high quality stego-images based on steganography.
Multim. Tools Appl., 2017

HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere.
KSII Trans. Internet Inf. Syst., 2017

Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation.
IEEE Access, 2017

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017

Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Secure Variant of the SRP Encryption Scheme with Shorter Private Key.
Proceedings of the Information Security Practice and Experience, 2017

A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016

Power analysis attacks against FPGA implementation of KLEIN.
Secur. Commun. Networks, 2016

A description logic-based policy compliance checker for trust negotiation.
Peer-to-Peer Netw. Appl., 2016

Key recovery on several matrix public-key encryption schemes.
IET Inf. Secur., 2016

Building a new secure variant of Rainbow signature scheme.
IET Inf. Secur., 2016

Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016

Incentives for Mobile Crowd Sensing: A Survey.
IEEE Commun. Surv. Tutorials, 2016

Fast Inversions in Small Finite Fields by Using Binary Trees.
Comput. J., 2016

Very Small FPGA Processor for Multivariate Signatures.
Comput. J., 2016

RGB, a Mixed Multivariate Signature Scheme.
Comput. J., 2016

Skeleton Genetics: a comprehensive database for genes and mutations related to genetic skeletal disorders.
Database J. Biol. Databases Curation, 2016

Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU.
Proceedings of the Information Security Practice and Experience, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Hybrid MQ Signature for Embedded Device.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

Analyses of several recently proposed group key management schemes.
Secur. Commun. Networks, 2015

Server-Aided Verification Signature with Privacy for Mobile Computing.
Mob. Inf. Syst., 2015

一种AVR环境下KLEIN分组密码抗计时和缓存边信道攻击的快速保护方法 (Fast Implementation of KLEIN for Resisting Timing and Cache Side-channel Attacks on AVR).
计算机科学, 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Extended Nested Dual System Groups, Revisited.
IACR Cryptol. ePrint Arch., 2015

Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing.
Future Gener. Comput. Syst., 2015

Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature Generation.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Provably Secure Group Key Management Approach Based upon Hyper-Sphere.
IEEE Trans. Parallel Distributed Syst., 2014

Verifiable computation with access control in cloud computing.
J. Supercomput., 2014

Preface.
J. Supercomput., 2014

A Novel and Lightweight System to Secure Wireless Medical Sensor Networks.
IEEE J. Biomed. Health Informatics, 2014

Timed-release oblivious transfer.
Secur. Commun. Networks, 2014

Adding variables variation to Rainbow-like scheme to enhance its security level against MinRank attack.
Secur. Commun. Networks, 2014

Yet another attack on the chinese remainder theorem-based hierarchical access control scheme.
Secur. Commun. Networks, 2014

TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks.
J. Comput. Sci. Technol., 2014

Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials.
Future Gener. Comput. Syst., 2014

2013
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Ubiquitous One-Time Password Service Using the Generic Authentication Architecture.
Mob. Networks Appl., 2013

Power Analysis Attacks against FPGA Implementations of KLEIN.
IACR Cryptol. ePrint Arch., 2013

Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs.
IACR Cryptol. ePrint Arch., 2013

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature.
IACR Cryptol. ePrint Arch., 2013

TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor.
IACR Cryptol. ePrint Arch., 2013

Attacks and Comments on Several Recently Proposed Key Management Schemes.
IACR Cryptol. ePrint Arch., 2013

An ontology-based approach to automated trust negotiation.
Comput. Stand. Interfaces, 2013

A Survey of Side Channel Attacks on MPKCs potential for RFID.
Proceedings of the Radio Frequency Identification System Security, 2013

Simple Matrix Scheme for Encryption.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.
Proceedings of the Network and System Security - 7th International Conference, 2013

A novel method of virtual network embedding based on topology convergence-degree.
Proceedings of the IEEE International Conference on Communications, 2013

An Anti-power Attacks Implementation of AES Algorithm in ASIC.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Cryptanalysis of a Certificateless Proxy Re-encryption Scheme.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Server-Aided Verification Signatures with Privacy.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

IBUOV, A Provably Secure Identity-Based UOV Signature Scheme.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
A Versatile Multi-Input Multiplier over Finite Fields.
IACR Cryptol. ePrint Arch., 2012

Building General-Purpose Security Services on EMV Payment Cards.
Proceedings of the Security and Privacy in Communication Networks, 2012

Proxy Signature Scheme Based on Isomorphisms of Polynomials.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
A Novel Group Signature Scheme Based on MPKC.
IACR Cryptol. ePrint Arch., 2011

Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere.
IACR Cryptol. ePrint Arch., 2011

A Simple and Efficient New Group Key Management Approach Based on Linear Geometry.
IACR Cryptol. ePrint Arch., 2011

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

High-Speed Hardware Implementation of Rainbow Signature on FPGAs.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

Building General Purpose Security Services on Trusted Computing.
Proceedings of the Trusted Systems - Third International Conference, 2011

2010
Formal security analysis of automated trust negotiation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
A CPK-Based Security Scheme at Network Layer.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A Multi-level Trust Evaluation Model Based on D-S Theory for Grid.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Formal Privacy Analysis of an Electronic Voting Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Sharing Multi-Secret Based on Circle Properties.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2006
Dual-Role Based Access Control Framework for Grid Services.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

2005
Web Services Single Sign-on Protocol and Formal Analysis on It.
J. Circuits Syst. Comput., 2005

Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2002
Correlative Message Group Digital Signature and Its Application to E-Commerce.
J. Circuits Syst. Comput., 2002

1999
ID-Based Digital Multisignature Scheme.
J. Circuits Syst. Comput., 1999

Directed User Authentication Scheme Based on Discrete Logarithm.
J. Circuits Syst. Comput., 1999

1997
Description-based communication for autonomous agents under ideal conditions.
J. Exp. Theor. Artif. Intell., 1997


  Loading...