Shaohua Tang

According to our database1, Shaohua Tang authored at least 93 papers between 1997 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
JPEG Image Encryption With Improved Format Compatibility and File Size Preservation.
IEEE Trans. Multimedia, 2018

New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions.
IEEE Trans. Information Theory, 2018

A novel reversible data hiding method with image contrast enhancement.
Sig. Proc.: Image Comm., 2018

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition.
Security and Communication Networks, 2018

Circulant UOV: a new UOV variant with shorter private key and faster signature generation.
TIIS, 2018

Image reversible visual transformation based on MSB replacement and histogram bin mapping.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

2017
Online/offline signature based on UOV in wireless sensor networks.
Wireless Networks, 2017

SpatialRecruiter: Maximizing Sensing Coverage in Selecting Workers for Spatial Crowdsourcing.
IEEE Trans. Vehicular Technology, 2017

Online/Offline Provable Data Possession.
IEEE Trans. Information Forensics and Security, 2017

A secure image sharing scheme with high quality stego-images based on steganography.
Multimedia Tools Appl., 2017

HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere.
TIIS, 2017

New Classes of Ternary Bent Functions from the Coulter-Matthews Bent Functions.
CoRR, 2017

Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation.
IEEE Access, 2017

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017

Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Secure Variant of the SRP Encryption Scheme with Shorter Private Key.
Proceedings of the Information Security Practice and Experience, 2017

A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Information Forensics and Security, 2016

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016

Power analysis attacks against FPGA implementation of KLEIN.
Security and Communication Networks, 2016

A description logic-based policy compliance checker for trust negotiation.
Peer-to-Peer Networking and Applications, 2016

Key recovery on several matrix public-key encryption schemes.
IET Information Security, 2016

Building a new secure variant of Rainbow signature scheme.
IET Information Security, 2016

Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptography, 2016

Incentives for Mobile Crowd Sensing: A Survey.
IEEE Communications Surveys and Tutorials, 2016

Fast Inversions in Small Finite Fields by Using Binary Trees.
Comput. J., 2016

Very Small FPGA Processor for Multivariate Signatures.
Comput. J., 2016

RGB, a Mixed Multivariate Signature Scheme.
Comput. J., 2016

Skeleton Genetics: a comprehensive database for genes and mutations related to genetic skeletal disorders.
Database, 2016

Extended Nested Dual System Groups, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU.
Proceedings of the Information Security Practice and Experience, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Hybrid MQ Signature for Embedded Device.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

Analyses of several recently proposed group key management schemes.
Security and Communication Networks, 2015

Server-Aided Verification Signature with Privacy for Mobile Computing.
Mobile Information Systems, 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Extended Nested Dual System Groups, Revisited.
IACR Cryptology ePrint Archive, 2015

Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing.
Future Generation Comp. Syst., 2015

Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature Generation.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Provably Secure Group Key Management Approach Based upon Hyper-Sphere.
IEEE Trans. Parallel Distrib. Syst., 2014

Verifiable computation with access control in cloud computing.
The Journal of Supercomputing, 2014

Preface.
The Journal of Supercomputing, 2014

A Novel and Lightweight System to Secure Wireless Medical Sensor Networks.
IEEE J. Biomedical and Health Informatics, 2014

Timed-release oblivious transfer.
Security and Communication Networks, 2014

Adding variables variation to Rainbow-like scheme to enhance its security level against MinRank attack.
Security and Communication Networks, 2014

Yet another attack on the chinese remainder theorem-based hierarchical access control scheme.
Security and Communication Networks, 2014

TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks.
J. Comput. Sci. Technol., 2014

Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials.
Future Generation Comp. Syst., 2014

Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs.
Proceedings of the Information Security Practice and Experience, 2014

2013
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2013

Ubiquitous One-Time Password Service Using the Generic Authentication Architecture.
MONET, 2013

Power Analysis Attacks against FPGA Implementations of KLEIN.
IACR Cryptology ePrint Archive, 2013

Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs.
IACR Cryptology ePrint Archive, 2013

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature.
IACR Cryptology ePrint Archive, 2013

TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor.
IACR Cryptology ePrint Archive, 2013

Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme.
IACR Cryptology ePrint Archive, 2013

Attacks and Comments on Several Recently Proposed Key Management Schemes.
IACR Cryptology ePrint Archive, 2013

An ontology-based approach to automated trust negotiation.
Computer Standards & Interfaces, 2013

A Survey of Side Channel Attacks on MPKCs potential for RFID.
Proceedings of the Radio Frequency Identification System Security, 2013

Simple Matrix Scheme for Encryption.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.
Proceedings of the Network and System Security - 7th International Conference, 2013

A novel method of virtual network embedding based on topology convergence-degree.
Proceedings of the IEEE International Conference on Communications, 2013

An Anti-power Attacks Implementation of AES Algorithm in ASIC.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Cryptanalysis of a Certificateless Proxy Re-encryption Scheme.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Server-Aided Verification Signatures with Privacy.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

IBUOV, A Provably Secure Identity-Based UOV Signature Scheme.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
A Versatile Multi-Input Multiplier over Finite Fields.
IACR Cryptology ePrint Archive, 2012

Building General-Purpose Security Services on EMV Payment Cards.
Proceedings of the Security and Privacy in Communication Networks, 2012

Proxy Signature Scheme Based on Isomorphisms of Polynomials.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
A Novel Group Signature Scheme Based on MPKC.
IACR Cryptology ePrint Archive, 2011

Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere.
IACR Cryptology ePrint Archive, 2011

A Simple and Efficient New Group Key Management Approach Based on Linear Geometry.
IACR Cryptology ePrint Archive, 2011

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

High-Speed Hardware Implementation of Rainbow Signature on FPGAs.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

A Novel Group Signature Scheme Based on MPKC.
Proceedings of the Information Security Practice and Experience, 2011

Building General Purpose Security Services on Trusted Computing.
Proceedings of the Trusted Systems - Third International Conference, 2011

2010
Formal security analysis of automated trust negotiation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
A CPK-Based Security Scheme at Network Layer.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A Multi-level Trust Evaluation Model Based on D-S Theory for Grid.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Formal Privacy Analysis of an Electronic Voting Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Sharing Multi-Secret Based on Circle Properties.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2006
Dual-Role Based Access Control Framework for Grid Services.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

2005
Web Services Single Sign-on Protocol and Formal Analysis on It.
Journal of Circuits, Systems, and Computers, 2005

Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2002
Correlative Message Group Digital Signature and Its Application to E-Commerce.
Journal of Circuits, Systems, and Computers, 2002

1999
ID-Based Digital Multisignature Scheme.
Journal of Circuits, Systems, and Computers, 1999

Directed User Authentication Scheme Based on Discrete Logarithm.
Journal of Circuits, Systems, and Computers, 1999

1997
Description-based communication for autonomous agents under ideal conditions.
J. Exp. Theor. Artif. Intell., 1997


  Loading...