Theo dõi
Qiang Tang
Qiang Tang
Email được xác minh tại sydney.edu.au - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Zebralancer: Private and anonymous crowdsourcing system atop open blockchain
Y Lu, Q Tang, G Wang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
3272018
Dumbo: Faster asynchronous bft protocols
B Guo, Z Lu, Q Tang, J Xu, Z Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
2672020
Dumbo-mvba: Optimal multi-valued validated asynchronous byzantine agreement, revisited
Y Lu, Z Lu, Q Tang, G Wang
Proceedings of the 39th symposium on principles of distributed computing …, 2020
1542020
Cliptography: Clipping the power of kleptographic attacks
A Russell, Q Tang, M Yung, HS Zhou
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
1272016
Efficient encrypted keyword search for multi-user data sharing
A Kiayias, O Oksuz, A Russell, Q Tang, B Wang
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
1082016
Speeding dumbo: Pushing asynchronous bft closer to practice
B Guo, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang
The Network and Distributed System Security Symposium (NDSS), 2022, 2022
872022
Dumbo-ng: Fast asynchronous bft consensus with throughput-oblivious latency
Y Gao, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
852022
Generic semantic security against a kleptographic adversary
A Russell, Q Tang, M Yung, HS Zhou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
852017
Bolt-dumbo transformer: Asynchronous consensus as fast as the pipelined bft
Y Lu, Z Lu, Q Tang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
662022
Optimal rate private information retrieval from homomorphic encryption
A Kiayias, N Leonardos, H Lipmaa, K Pavlyk, Q Tang
Proceedings on Privacy Enhancing Technologies 2015 (2), 2015
602015
Decentralizing IoT management systems using blockchain for censorship resistance
S He, Q Tang, CQ Wu, X Shen
IEEE Transactions on Industrial Informatics 16 (1), 715-727, 2019
48*2019
On the security of key extraction from measuring physical quantities
M Edman, A Kiayias, Q Tang, B Yener
IEEE Transactions on Information Forensics and Security 11 (8), 1796-1806, 2016
452016
Sidechains with fast cross-chain transfers
L Yin, J Xu, Q Tang
IEEE Transactions on Dependable and Secure Computing 19 (6), 3925-3940, 2021
442021
Efficient asynchronous byzantine agreement without private setups
Y Gao, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang
2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022
432022
Correcting subverted random oracles
A Russell, Q Tang, M Yung, HS Zhou
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
422018
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog
SSM Chow, A Russell, Q Tang, M Yung, Y Zhao, HS Zhou
IACR International Workshop on Public Key Cryptography, 221-251, 2019
382019
Honey encryption beyond message recovery security
J Jaeger, T Ristenpart, Q Tang
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
382016
How to keep a secret: leakage deterring public-key cryptosystems
A Kiayias, Q Tang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
382013
A security-enhanced certificateless aggregate signature authentication protocol for InVANETs
G Xu, W Zhou, AK Sangaiah, Y Zhang, X Zheng, Q Tang, N Xiong, ...
IEEE network 34 (2), 22-29, 2020
352020
On enabling machine learning tasks atop public blockchains: A crowdsourcing approach
Y Lu, Q Tang, G Wang
2018 IEEE international conference on data mining workshops (ICDMW), 81-88, 2018
352018
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20