| New algorithms for secure outsourcing of modular exponentiations X Chen, J Li, J Ma, Q Tang, W Lou IEEE Transactions on Parallel and Distributed Systems 25 (9), 2386-2396, 2014 | 257 | 2014 |
| Type-based proxy re-encryption and its construction Q Tang International Conference on Cryptology in India, 130-144, 2008 | 135 | 2008 |
| An application of the Goldwasser-Micali cryptosystem to biometric authentication J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer Australasian Conference on Information Security and Privacy, 96-106, 2007 | 134 | 2007 |
| Efficient and provable secure ciphertext-policy attribute-based encryption schemes L Ibraimi, Q Tang, P Hartel, W Jonker International Conference on Information Security Practice and Experience, 1-12, 2009 | 107 | 2009 |
| Efficient conditional proxy re-encryption with chosen-ciphertext security J Weng, Y Yang, Q Tang, RH Deng, F Bao International Conference on Information Security, 151-166, 2009 | 84 | 2009 |
| Efficient verifiable fuzzy keyword search over encrypted data in cloud computing J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen Computer Science and Information Systems 10 (2), 667-684, 2013 | 75 | 2013 |
| Extended private information retrieval and its application in biometrics authentications J Bringer, H Chabanne, D Pointcheval, Q Tang International Conference on Cryptology and Network Security, 175-193, 2007 | 55 | 2007 |
| Privacy in recommender systems AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang Social media retrieval, 263-281, 2013 | 50 | 2013 |
| Public-key encryption with registered keyword search Q Tang, L Chen European Public Key Infrastructure Workshop, 163-178, 2009 | 50 | 2009 |
| Efficient algorithms for secure outsourcing of bilinear pairings X Chen, W Susilo, J Li, DS Wong, J Ma, S Tang, Q Tang Theoretical Computer Science 562, 112-121, 2015 | 47 | 2015 |
| Public key encryption schemes supporting equality test with authorisation of different granularity Q Tang International journal of applied cryptography 2 (4), 304-321, 2012 | 47 | 2012 |
| A formal study of the privacy concerns in biometric-based remote authentication schemes Q Tang, J Bringer, H Chabanne, D Pointcheval International Conference on Information Security Practice and Experience, 56-70, 2008 | 46 | 2008 |
| Revisiting the security model for timed-release encryption with pre-open capability AW Dent, Q Tang International Conference on Information Security, 158-174, 2007 | 46 | 2007 |
| Public key encryption supporting plaintext equality test and user‐specified authorization Q Tang Security and Communication Networks 5 (12), 1351-1362, 2012 | 44 | 2012 |
| A type-and-identity-based proxy re-encryption scheme and its application in healthcare L Ibraimi, Q Tang, P Hartel, W Jonker Workshop on Secure Data Management, 185-198, 2008 | 44 | 2008 |
| Towards public key encryption scheme supporting equality test with fine-grained authorization Q Tang Australasian Conference on Information Security and Privacy, 389-406, 2011 | 41 | 2011 |
| A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search. Y Zhao, X Chen, H Ma, Q Tang, H Zhu JoWUA 3 (1/2), 72-81, 2012 | 40 | 2012 |
| Inter-domain identity-based proxy re-encryption Q Tang, P Hartel, W Jonker International Conference on Information Security and Cryptology, 332-347, 2008 | 38 | 2008 |
| On using encryption techniques to enhance sticky policies enforcement Q Tang DIES, Faculty of EEMCS, University of Twente, The Netherlands, 2008 | 33 | 2008 |
| Search in encrypted data: Theoretical models and practical applications Q Tang Theory and Practice of Cryptography Solutions for Secure Information Systems …, 2013 | 29 | 2013 |