PEJO, B., TANG, Q., & Gergely, B. (October 2018). The Price of Privacy in Collaborative Learning [Poster presentation]. The 25th ACM Conference on Computer and Communications Security, Toronto, Canada. doi:10.1145/3243734.3278525 |
SKROBOT, M., LANCRENON, J., & TANG, Q. (2016). Two More Efficient Variants of the J-PAKE Protocol. In ACNS 2016. doi:10.1007/978-3-319-39555-5_4 Peer reviewed |
IOVINO, V., TANG, Q., & Zebrowski, K. (2016). On the power of Public-key Function-Private Functional Encryption. In 15th International Conference on Cryptology and Network Security. Springer Seciurity and Cryptology. doi:10.1007/978-3-319-48965-0 Peer reviewed |
TANG, Q., & WANG, J. (2015). Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security. Peer reviewed |
CHENAL, M., & TANG, Q. (2015). Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes. In Information Security - 18th International Conference, ISC 2015. doi:10.1007/978-3-319-23318-5_22 Peer reviewed |
TANG, Q., Ma, H., & Chen, X. (June 2015). Extend the Concept of Public Key Encryption with Delegated Search. Computer Journal, 58 (4), 11. doi:10.1093/comjnl/bxt102 Peer Reviewed verified by ORBi |
Li, J., Sattar, S. A., Baig, M. M., Liu, J., TANG, Q., & Malin, B. (2015). Methods to Mitigate Risk of Composition Attack in Independent Data Publications. In Medical Data Privacy Handbook 2015. Springer. Peer reviewed |
TANG, Q. (2015). Towards Forward Security Properties for PEKS and IBE. In Information Security and Privacy - 20th Australasian Conference, ACISP 2015. doi:10.1007/978-3-319-19962-7_8 Peer reviewed |
Chen, X., Li, J., Ma, J., TANG, Q., & Lou, W. (July 2014). New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Transactions on Parallel and Distributed Systems, 25 (9), 2386-2396. doi:10.1109/TPDS.2013.180 Peer Reviewed verified by ORBi |
Chen, X., Susilo, W., Li, J., Wong, D., Ma, J., Tang, S., & TANG, Q. (2014). Efficient Algorithms for Secure Outsourcing of Bilinear Pairings. Theoretical Computer Science. doi:10.1016/j.tcs.2014.09.038 Peer reviewed |
Bosch, Peter, A., Leenders, B., Lim, H. W., TANG, Q., Wang, H., Hartel, P., & Jonker, W. (2014). Distributed Searchable Symmetric Encryption. In PST2014 International Conference on Privacy, Security and Trust. doi:10.1109/PST.2014.6890956 Peer reviewed |
DELERUE ARRIAGA, A., TANG, Q., & RYAN, P. (2014). Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. In Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014. Peer reviewed |
CHENAL, M., & TANG, Q. (2014). On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes. In Progress in Cryptology - LATINCRYPT 2014, Florianópolis 17-19 September 2014. Peer reviewed |
TANG, Q. (2014). From Ephemerizer to Timed-Ephemerizer - Achieve Assured Lifecycle Enforcement for Sensitive Data. Computer Journal. doi:10.1093/comjnl/bxu030 Peer Reviewed verified by ORBi |
TANG, Q. (2014). Nothing is for Free: Security in Searching Shared & Encrypted Data. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2014.2359389 Peer reviewed |
KHADER, D., RYAN, P., & TANG, Q. (13 August 2013). Proving Prêt à Voter Receipt Free Using Computational Security Models. USENIX Journal of Election Technology and Systems, 1 (1), 62-81. Peer reviewed |
TANG, Q. (2013). Search in Encrypted Data: Theoretical Models and Practical Applications. In Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 84-108). IGI. doi:10.4018/978-1-4666-4030-6.ch004 Peer reviewed |
TANG, Q. (2013). Towards a privacy-preserving solution for OSNs. In R. Sandhu, J. Lopez, ... X. Huang (Eds.), Towards a privacy-preserving solution for OSNs. Peer reviewed |
TANG, Q., & Chen, X. (2013). Towards asymmetric searchable encryption with message recovery and flexible search authorization. In Proceeding of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (pp. 253-264). doi:10.1145/2484313.2484346 Peer reviewed |