


Остановите войну!
for scientists:


default search action
Qiong Huang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j83]Hongbo Li
, Qiong Huang
, Jianye Huang
, Willy Susilo
:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. IEEE Trans. Inf. Forensics Secur. 18: 396-410 (2023) - 2022
- [j82]Ningbin Yang, Quan Zhou, Qiong Huang, Chunming Tang:
Multi-Recipient encryption with keyword search without pairing for cloud storage. J. Cloud Comput. 11: 10 (2022) - [j81]Xinjian Chen, Qiong Huang, Hongbo Li, Zhijian Liao, Willy Susilo
:
A novel identity-based multi-signature scheme over NTRU lattices. Theor. Comput. Sci. 933: 163-176 (2022) - [j80]Jianye Huang
, Willy Susilo
, Fuchun Guo
, Ge Wu
, Zhen Zhao
, Qiong Huang
:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. IEEE Trans. Dependable Secur. Comput. 19(2): 1280-1291 (2022) - [j79]Hongbo Li
, Qiong Huang
, Willy Susilo
:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. IEEE Trans. Dependable Secur. Comput. 19(3): 1532-1543 (2022) - [j78]Meiyan Xiao
, Hongbo Li, Qiong Huang
, Shui Yu
, Willy Susilo
:
Attribute-Based Hierarchical Access Control With Extendable Policy. IEEE Trans. Inf. Forensics Secur. 17: 1868-1883 (2022) - [j77]Ying Miao
, Qiong Huang
, Meiyan Xiao
, Willy Susilo
:
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 3663-3676 (2022) - [j76]Sha Ma
, Yijian Zhong
, Qiong Huang
:
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments. IEEE Trans. Inf. Forensics Secur. 17: 3758-3772 (2022) - [j75]Lei Zhang
, Hu Xiong
, Qiong Huang
, Jiguo Li
, Kim-Kwang Raymond Choo
, Jiangtao Li
:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Trans. Serv. Comput. 15(1): 567-587 (2022) - [j74]Meiyan Xiao
, Qiong Huang
, Ying Miao, Shunpeng Li, Willy Susilo
:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. IEEE Trans. Serv. Comput. 15(6): 3143-3155 (2022) - [c60]Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu:
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts. ACISP 2022: 449-468 - [c59]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang:
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search. ProvSec 2022: 20-35 - [c58]Meiyan Xiao, Qiong Huang, Ying Miao, Shunpeng Li, Willy Susilo
:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. SERVICES 2022: 31 - [i22]Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen:
Multi-party Secure Broad Learning System for Privacy Preserving. CoRR abs/2206.11133 (2022) - 2021
- [j73]Qingwen Guo, Qiong Huang, Sha Ma, Meiyan Xiao, Guomin Yang
, Willy Susilo
:
Functional signatures: new definition and constructions. Sci. China Inf. Sci. 64(12) (2021) - [j72]Zhen Liu, Qiong Huang, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors. Comput. J. 64(4): 575-598 (2021) - [j71]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li
, Yijian Zhong, Yunzhi Ling:
Efficient Group ID-Based Encryption With Equality Test Against Insider Attack. Comput. J. 64(4): 661-674 (2021) - [j70]Sha Ma, Qiong Huang:
CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model. Comput. J. 64(8): 1239-1252 (2021) - [j69]Wenbo Liu, Qiong Huang
, Xinjian Chen, Hongbo Li:
Efficient functional encryption for inner product with simulation-based security. Cybersecur. 4(1): 2 (2021) - [j68]Xianjie Zhang, Yu Liu, Xiujuan Xu, Qiong Huang, Hangyu Mao, Anil Carie:
Structural relational inference actor-critic for multi-agent reinforcement learning. Neurocomputing 459: 383-394 (2021) - [j67]Ge Song, Yuqiao Deng, Qiong Huang, Changgen Peng, Chunming Tang, Xiaohua Wang:
Hierarchical identity-based inner product functional encryption. Inf. Sci. 573: 332-344 (2021) - [j66]Yuanhao Wang, Qiong Huang
, Hongbo Li, Meiyan Xiao
, Sha Ma
, Willy Susilo
:
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets. IEEE Trans. Inf. Forensics Secur. 16: 4050-4062 (2021) - [c57]Xueqiao Liu
, Kai He
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Qiong Huang
:
Broadcast Authenticated Encryption with Keyword Search. ACISP 2021: 193-213 - [c56]Xinjian Chen, Qiong Huang, Jianye Huang:
A Novel Certificateless Multi-signature Scheme over NTRU Lattices. ISPEC 2021: 345-362 - [c55]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang
:
Public Key Encryption with Fuzzy Matching. ProvSec 2021: 39-62 - [c54]Ru Xiang, Sha Ma, Qiong Huang, Ximing Li
:
A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model. ProvSec 2021: 279-295 - [e1]Qiong Huang, Yu Yu:
Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings. Lecture Notes in Computer Science 13059, Springer 2021, ISBN 978-3-030-90401-2 [contents] - 2020
- [j65]Chuntao Wang
, Tianzheng Li
, Jiangqun Ni
, Qiong Huang
:
A New MRF-Based Lossy Compression for Encrypted Binary Images. IEEE Access 8: 11328-11341 (2020) - [j64]Yuanhao Wang, Yuzhao Cui, Qiong Huang
, Hongbo Li, Jianye Huang, Guomin Yang
:
Attribute-Based Equality Test Over Encrypted Data Without Random Oracles. IEEE Access 8: 32891-32903 (2020) - [j63]Yijian Zhong
, Sha Ma
, Qiong Huang
:
Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting. IEEE Access 8: 132825-132840 (2020) - [j62]Weili Wang
, Chuntao Wang
, Junxiang Wang
, Shan Bian
, Qiong Huang
:
Improving Multi-Histogram-Based Reversible Watermarking Using Optimized Features and Adaptive Clustering Number. IEEE Access 8: 134334-134350 (2020) - [j61]Ying Miao, Qiong Huang
, Meiyan Xiao, Hongbo Li
:
Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain. IEEE Access 8: 139813-139826 (2020) - [j60]Sha Ma, Qiong Huang:
A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search. Comput. J. 63(12): 1849-1858 (2020) - [j59]Jianye Huang, Qiong Huang
, Willy Susilo
:
Leakage-resilient group signature: Definitions and constructions. Inf. Sci. 509: 119-132 (2020) - [j58]Yunhao Ling, Sha Ma
, Qiong Huang
, Ximing Li
, Yunzhi Ling:
Group public key encryption with equality test against offline message recovery attack. Inf. Sci. 510: 16-32 (2020) - [j57]Baodong Qin
, Yu Chen, Qiong Huang
, Ximeng Liu
, Dong Zheng:
Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf. Sci. 516: 515-528 (2020) - [j56]Zhenhua Chen, Luqi Huang
, Xiaonan Shi, Qiong Huang
, Hao Wang
, Xueqiao Liu
:
Privacy-preserving polynomial interpolation and its applications on predictive analysis. Inf. Sci. 541: 259-270 (2020) - [c53]Fubin Wang, Qiong Huang:
Application of Asynchronous Multi-sensor in the Fusion of School Sports, Home Sports and Community Sports. CSIA (2) 2020: 42-49 - [c52]Jiaxian Wu, Shuangjuan Li, Qiong Huang:
Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor Networks. ISCC 2020: 1-6 - [c51]Tuotuo Li, Qiong Huang, Santiago Alfaro, Alexey Supikov, Joshua Ratcliff, Ginni Grover, Ronald T. Azuma:
Light-Field Displays: a View-Dependent Approach. SIGGRAPH Emerging Technologies 2020: 19:1-19:2
2010 – 2019
- 2019
- [j55]Hongbo Li
, Qiong Huang
, Sha Ma
, Jian Shen
, Willy Susilo
:
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage. IEEE Access 7: 25409-25421 (2019) - [j54]Yuanhao Wang, Qiong Huang
, Hongbo Li, Jianye Huang, Guomin Yang
, Willy Susilo
:
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups. IEEE Access 7: 135999-136011 (2019) - [j53]Shuangjuan Li
, Hong Shen, Qiong Huang
, Longkun Guo:
Optimizing the Sensor Movement for Barrier Coverage in a Sink-Based Deployed Mobile Sensor Network. IEEE Access 7: 156301-156314 (2019) - [j52]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. Comput. J. 62(8): 1166-1177 (2019) - [j51]Cai Zhang
, Mohsen Razavi
, Zhiwei Sun
, Qiong Huang, Haozhen Situ
:
Multi-Party Quantum Summation Based on Quantum Teleportation. Entropy 21(7): 719 (2019) - [j50]Hongbo Li, Qiong Huang
, Jian Shen
, Guomin Yang
, Willy Susilo
:
Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481: 330-343 (2019) - [j49]Yuanhao Wang, Meiyan Xiao, Ying Miao, Wenbo Liu, Qiong Huang:
Signature Scheme from Trapdoor Functions. J. Internet Serv. Inf. Secur. 9(2): 31-41 (2019) - [j48]Jianye Huang
, Qiong Huang
, Willy Susilo
:
Leakage-resilient ring signature schemes. Theor. Comput. Sci. 759: 1-13 (2019) - [c50]Yunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, Ximing Li
:
Group ID-Based Encryption with Equality Test. ACISP 2019: 39-57 - [c49]Xianjie Mo, Tingting Wei, Hengmin Zhang, Qiong Huang, Wei Luo
:
Label-Smooth Learning for Fine-Grained Visual Categorization. ACPR (1) 2019: 17-31 - [c48]Qiong Huang
, Kenji Doya
:
An Experimental Study of Emergence of Communication of Reinforcement Learning Agents. AGI 2019: 91-100 - [c47]Ximing Li
, Weizhao Chen, Yubin Guo, Sha Ma, Qiong Huang:
Secure, Efficient and Searchable File System on Distributed Clouds. ICPCSEE (2) 2019: 246-266 - [c46]Sha Ma, Qiong Huang:
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model. ISPEC 2019: 3-19 - [c45]Xueqiao Liu, Hongbo Li, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. ProvSec 2019: 113-129 - [c44]Sha Ma, Qiong Huang, Ximing Li
, Meiyan Xiao:
Plaintext-Verifiably-Checkable Encryption. ProvSec 2019: 149-166 - [i21]Jianye Huang, Qiong Huang:
Leakage-Resilient Group Signature: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2019: 2 (2019) - 2018
- [j47]Jianye Huang, Qiong Huang, Willy Susilo
:
Leakage-Resilient Dual-Form Signatures. Comput. J. 61(8): 1216-1227 (2018) - [j46]Qingwen Guo
, Qiong Huang, Guomin Yang
:
Authorized Function Homomorphic Signature. Comput. J. 61(12): 1897-1908 (2018) - [j45]Jianye Huang, Qiong Huang:
Black-box constructions of signature schemes in the bounded leakage setting. Inf. Sci. 423: 313-325 (2018) - [j44]Willy Susilo
, Guomin Yang
, Fuchun Guo, Qiong Huang:
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429: 349-360 (2018) - [j43]Jin Li, Xiaofeng Chen, Sherman S. M. Chow
, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j42]Chuntao Wang
, Jiangqun Ni
, Xinpeng Zhang
, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. IEEE Trans. Inf. Forensics Secur. 13(5): 1271-1285 (2018) - [c43]Min Zhang, Dingjun Zhang, Suyuan Peng, Lizhe Fu, Jiaowang Tan, Meiqin Ye, Qiong Huang, Li Luo, Xusheng Liu, Yifan Wu:
Chronic Kidney Disease Medication Adherence and its Influencing Factors: An Observation and Analysis. BIBM 2018: 1959-1966 - [c42]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
:
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. Inscrypt 2018: 448-467 - [c41]Ximing Li, Weizhao Chen, Yubin Guo, Senyang Zhang, Qiong Huang:
Secure File Storage System Among Distributed Public Clouds. ICCCS (3) 2018: 277-289 - [c40]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li
:
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack. ICCCS (3) 2018: 370-382 - [c39]Ohud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati:
Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information. ICISSP 2018: 373-378 - [i20]Qiong Huang, Hongbo Li:
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks. IACR Cryptol. ePrint Arch. 2018: 7 (2018) - [i19]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. IACR Cryptol. ePrint Arch. 2018: 1058 (2018) - 2017
- [j41]Jianye Huang, Qiong Huang, Chunhua Pan:
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting. Int. J. Found. Comput. Sci. 28(6): 761-780 (2017) - [j40]Qiong Huang, Hongbo Li:
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403: 1-14 (2017) - [j39]Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo
, Fuchun Guo, Qiong Huang:
Sequence aware functional encryption and its application in searchable encryption. J. Inf. Secur. Appl. 35: 106-118 (2017) - [j38]Qingwen Guo
, Yuzhao Cui, Xiaomeng Zou, Qiong Huang:
Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols. J. Internet Serv. Inf. Secur. 7(2): 44-56 (2017) - [j37]Qiong Huang
, Ashok Veeraraghavan, Ashutosh Sabharwal:
TabletGaze: dataset and analysis for unconstrained appearance-based gaze estimation in mobile tablets. Mach. Vis. Appl. 28(5-6): 445-461 (2017) - [j36]Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu:
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments. IEEE Syst. J. 11(2): 1018-1026 (2017) - [j35]Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong:
Privacy-Preserving Location Sharing Services for Social Networks. IEEE Trans. Serv. Comput. 10(5): 811-825 (2017) - [i18]Qiong Huang, Jianye Huang:
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting. IACR Cryptol. ePrint Arch. 2017: 619 (2017) - 2016
- [j34]Zhenhua Chen, Shundong Li, Qiong Huang, Yilei Wang, Sufang Zhou:
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurr. Comput. Pract. Exp. 28(10): 2858-2876 (2016) - [j33]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more. Int. J. Inf. Sec. 15(1): 15-33 (2016) - [j32]Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding:
A Joint Random Secret Sharing Scheme with Public Verifiability. Int. J. Netw. Secur. 18(5): 917-925 (2016) - [c38]Xiaoge Huang, Weipeng Dai, Zhifang Zhang, Qiong Huang, Qianbin Chen
:
Energy-Efficient Resource Allocation in Distributed Antenna Systems. ChinaCom (1) 2016: 97-106 - [c37]Xiaoge Huang, Zhifang Zhang, Weipeng Dai, Qiong Huang, Qianbin Chen
:
Energy-Efficient Femtocells Active/Idle Control and Load Balancing in Heterogeneous Networks. ChinaCom (2) 2016: 237-247 - [c36]Qiong Huang, Eiji Uchibe, Kenji Doya:
Emergence of communication among reinforcement learning agents under coordination environment. ICDL-EPIROB 2016: 57-58 - [c35]Jianye Huang, Qiong Huang, Chunhua Pan:
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model. ProvSec 2016: 320-339 - [i17]Long Yu, Qiong Huang, Hongwei Liu, Xiusheng Liu:
Self-Dual Codes over ℤ2 × (ℤ2 + uℤ2). CoRR abs/1610.00900 (2016) - 2015
- [j31]Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. Comput. J. 58(4): 986-1002 (2015) - [j30]Qiong Huang, Guomin Yang
:
A Summary of the Special Issue "Cybersecurity and Cryptography". Inf. 6(4): 833-835 (2015) - [j29]Qiong Huang, Duncan S. Wong, Willy Susilo
:
How to protect privacy in Optimistic Fair Exchange of digital signatures. Inf. Sci. 325: 300-315 (2015) - [j28]Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:
A distributed secret share update scheme with public verifiability for ad hoc network. Secur. Commun. Networks 8(8): 1485-1493 (2015) - [j27]Chuntao Wang
, Jiangqun Ni, Qiong Huang:
A new encryption-then-compression algorithm using the rate-distortion optimization. Signal Process. Image Commun. 39: 141-150 (2015) - [j26]Qiong Huang, Guomin Yang
, Duncan S. Wong, Willy Susilo
:
Ambiguous optimistic fair exchange: Definition and constructions. Theor. Comput. Sci. 562: 177-193 (2015) - [j25]Xiao Tan
, Qiong Huang, Duncan S. Wong:
Concurrent signature without random oracles. Theor. Comput. Sci. 562: 194-212 (2015) - [j24]Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang:
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization. IEEE Trans. Inf. Forensics Secur. 10(3): 458-470 (2015) - [j23]Roman Schlegel, Chi-Yin Chow
, Qiong Huang, Duncan S. Wong:
User-Defined Privacy Grid System for Continuous Location-Based Services. IEEE Trans. Mob. Comput. 14(10): 2158-2172 (2015) - [i16]Qiong Huang, Ashok Veeraraghavan, Ashutosh Sabharwal:
TabletGaze: A Dataset and Baseline Algorithms for Unconstrained Appearance-based Gaze Estimation in Mobile Tablets. CoRR abs/1508.01244 (2015) - 2014
- [j22]Jin Li, Xiaofeng Chen, Qiong Huang, Duncan S. Wong:
Digital provenance: Enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37: 259-266 (2014) - [j21]Xiao Tan
, Qiong Huang, Duncan S. Wong:
Extending concurrent signature to multiple parties. Theor. Comput. Sci. 548: 54-67 (2014) - [c34]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. ACISP 2014: 274-289 - [c33]Guozhen Shi, Mang Su, Fenghua Li, Jiapeng Lou, Qiong Huang:
A User-Based Document Management Mechanism in Cloud. CIS 2014: 377-381 - [c32]Qiong Huang, Duncan S. Wong, Willy Susilo
:
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures. CT-RSA 2014: 367-384 - [c31]Shu Wang, Junjie Bao, Bin Shen, Qiong Huang, Qianbin Chen
:
Eigenvector based cooperative wideband spectrum sensing for cognitive radios. ICUFN 2014: 346-351 - [i15]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited. IACR Cryptol. ePrint Arch. 2014: 310 (2014) - 2013
- [j20]Xinxin Liu, Shaohua Tang, Qiong Huang, Zhiwen Yu:
An ontology-based approach to automated trust negotiation. Comput. Stand. Interfaces 36(1): 219-230 (2013) - [j19]Guanjie Yu, Hongbin Zhang, Qiong Huang, Chuangyin Dang
:
New delay-dependent stability analysis for fuzzy time-delay interconnected systems. Int. J. Gen. Syst. 42(7): 739-753 (2013) - [j18]Qiong Huang, Duncan S. Wong, Willy Susilo
:
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Inf. Sci. 228: 222-238 (2013) - [j17]Jing Liu, Qiong Huang, Bo Yang, Yang Zhang:
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures. IEEE Trans. Computers 62(8): 1656-1672 (2013) - [j16]Qiong Huang, Duncan S. Wong:
Short and efficient convertible undeniable signature schemes without random oracles. Theor. Comput. Sci. 476: 67-83 (2013) - [c30]Dennis Y. W. Liu
, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. ICISC 2013: 325-341 - [c29]Nanke Du, Junshan Mu, Qiong Huang, Yongxing Mao, Liwei Zhu:
A new state estimator for spacecrafts at injection phase. ICNC 2013: 1244-1249 - [c28]Kaitai Liang
, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. ISPEC 2013: 132-146 - [c27]Yibo Yang, Hongling Li, Qiong Huang:
Mobility management in VANET. WOCC 2013: 298-303 - [i14]Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. IACR Cryptol. ePrint Arch. 2013: 115 (2013) - [i13]Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. IACR Cryptol. ePrint Arch. 2013: 711 (2013) - 2012
- [j15]Qiong Huang, Guomin Yang
, Duncan S. Wong, Willy Susilo
:
A new efficient optimistic fair exchange protocol without random oracles. Int. J. Inf. Sec. 11(1): 53-63 (2012) - [j14]Cui-Qin Dai, Yu Rao, Li Jiang, Qian-Bin Chen
, Qiong Huang:
Cross-Layer Design of Combining HARQ with Adaptive Modulation and Coding for Nakagami-m Fading Channels. J. Commun. 7(6): 458-463 (2012) - [c26]Xiaoqiong Pang, Bo Yang, Qiong Huang:
Privacy-Preserving Noisy Keyword Search in Cloud Computing. ICICS 2012: 154-166 - [c25]Qiong Huang, Pengfei Yin, Qian-Bin Chen
:
A bio-inspired adaptive end-to-end network multi-path routing to achieve load-balance. ICNC 2012: 976-980 - [c24]