


default search action
Shaohua Tang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j78]Lu Peng
, Zecheng Zhang, Xianyi Wang, Weiyi Qiu, Liqian Zhou, Hui Xiao, Chunxiuzi Liu, Shaohua Tang, Zhiwei Qin, Jiakun Jiang, Zengru Di, Yu Liu:
Theoretical perspective on synthetic man-made life: Learning from the origin of life. Quant. Biol. 11(4): 376-394 (2023) - 2022
- [j77]Bowen Zhao, Shaohua Tang, Ximeng Liu, Yiming Wu:
Return just your search: privacy-preserving homoglyph search for arbitrary languages. Frontiers Comput. Sci. 16(2): 162801 (2022) - 2021
- [j76]Yun Jiang
, Bowen Zhao, Shaohua Tang, Hao-Tian Wu
:
A verifiable and privacy-preserving multidimensional data aggregation scheme in mobile crowdsensing. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j75]Yaobo Xia
, Bowen Zhao, Shaohua Tang, Hao-Tian Wu:
Repot: Real-time and privacy-preserving online task assignment for mobile crowdsensing. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j74]Lingling Xu
, Xiaofeng Chen
, Fangguo Zhang
, Wanhua Li
, Hao-Tian Wu
, Shaohua Tang, Yang Xiang
:
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records. IEEE Trans. Dependable Secur. Comput. 18(6): 2941-2952 (2021) - [j73]Bowen Zhao
, Shaohua Tang
, Ximeng Liu
, Xinglin Zhang
:
PACE: Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowdsensing. IEEE Trans. Mob. Comput. 20(5): 1924-1939 (2021) - [j72]Bowen Zhao
, Shaohua Tang
, Ximeng Liu
, Xinglin Zhang
, Wei-Neng Chen
:
iTAM: Bilateral Privacy-Preserving Task Assignment for Mobile Crowdsensing. IEEE Trans. Mob. Comput. 20(12): 3351-3366 (2021) - [j71]Peiming Xu, Shaohua Tang, Peng Xu, Qianhong Wu, Honggang Hu, Willy Susilo:
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server. IEEE Trans. Serv. Comput. 14(6): 1877-1889 (2021) - 2020
- [j70]Hao-Tian Wu
, Qi Huang, Yiu-ming Cheung
, Lingling Xu, Shaohua Tang:
Reversible contrast enhancement for medical images with background segmentation. IET Image Process. 14(2): 327-336 (2020) - [j69]Bowen Zhao
, Shaohua Tang
, Ximeng Liu
, Xinglin Zhang
, Wei-Neng Chen
:
IronM: Privacy-Preserving Reliability Estimation of Heterogeneous Data for Mobile Crowdsensing. IEEE Internet Things J. 7(6): 5159-5170 (2020) - [j68]Junhui He
, Xinlu Pan, Hao-Tian Wu
, Shaohua Tang:
Improved block ordering and frequency selection for reversible data hiding in JPEG images. Signal Process. 175: 107647 (2020) - [j67]Junhui He
, Yuzhang Xu, Weiqi Luo, Shaohua Tang, Jiwu Huang:
A novel selective encryption scheme for H.264/AVC video with improved visual security. Signal Process. Image Commun. 89: 115994 (2020) - [j66]Lingling Xu
, Wanhua Li
, Fangguo Zhang
, Rong Cheng, Shaohua Tang:
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy. IEEE Trans. Inf. Forensics Secur. 15: 2096-2109 (2020) - [j65]Junhui He
, Junxi Chen, Shaohua Tang
:
Reversible Data Hiding in JPEG Images Based on Negative Influence Models. IEEE Trans. Inf. Forensics Secur. 15: 2121-2133 (2020) - [j64]Weitao Ren, Shaohua Tang:
EGeoIndis: An effective and efficient location privacy protection framework in traffic density detection. Veh. Commun. 21 (2020)
2010 – 2019
- 2019
- [j63]Yiming Wu, Shaohua Tang
, Bowen Zhao, Zhiniang Peng:
BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing. IEEE Access 7: 45605-45617 (2019) - [j62]Hao-Tian Wu
, Zhiyuan Yang, Yiu-Ming Cheung
, Lingling Xu, Shaohua Tang:
High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction. IEEE Access 7: 62361-62371 (2019) - [j61]Ke Zhao, Shaohua Tang
, Bowen Zhao, Yiming Wu:
Dynamic and Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing. IEEE Access 7: 74694-74710 (2019) - [j60]Jinbo Xiong
, Yuanyuan Zhang
, Shaohua Tang
, Ximeng Liu, Zhiqiang Yao:
Secure Encrypted Data With Authorized Deduplication in Cloud. IEEE Access 7: 75090-75104 (2019) - [j59]Hao-Tian Wu
, Weiqi Mai, Shuyi Meng, Yiu-Ming Cheung
, Shaohua Tang:
Reversible Data Hiding With Image Contrast Enhancement Based on Two-Dimensional Histogram Modification. IEEE Access 7: 83332-83342 (2019) - [j58]Yuxian Liu
, Shaohua Tang, Hao-Tian Wu
, Xinglin Zhang:
RTPT: A framework for real-time privacy-preserving truth discovery on crowdsensed data streams. Comput. Networks 148: 349-360 (2019) - [j57]Lingling Xu, Jin Li, Xiaofeng Chen, Wanhua Li, Shaohua Tang, Hao-Tian Wu:
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J. Netw. Comput. Appl. 128: 11-20 (2019) - [j56]Shumei Yang, Shaohua Tang, Xiao Zhang:
Privacy-preserving k nearest neighbor query with authentication on road networks. J. Parallel Distributed Comput. 134: 25-36 (2019) - [j55]Hao-Tian Wu
, Yiu-ming Cheung
, Zhiyuan Yang, Shaohua Tang:
A high-capacity reversible data hiding method for homomorphic encrypted images. J. Vis. Commun. Image Represent. 62: 87-96 (2019) - [j54]Junhui He
, Junxi Chen, Weiqi Luo, Shaohua Tang
, Jiwu Huang
:
A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(12): 3501-3515 (2019) - [j53]Xinglin Zhang
, Zheng Yang, Yunhao Liu, Shaohua Tang
:
On Reliable Task Assignment for Spatial Crowdsourcing. IEEE Trans. Emerg. Top. Comput. 7(1): 174-186 (2019) - [c37]Fan Peng, Shaohua Tang, Bowen Zhao, Yuxian Liu:
A privacy-preserving data aggregation of mobile crowdsensing based on local differential privacy. ACM TUR-C 2019: 40:1-40:5 - [c36]Hao-Tian Wu
, Yiu-ming Cheung
, Zhenwei Zhuang, Shaohua Tang:
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing. WISA 2019: 141-154 - 2018
- [j52]Bo Lv, Zhiniang Peng, Shaohua Tang
:
Precomputation Methods for UOV Signature on Energy-Harvesting Sensors. IEEE Access 6: 56924-56933 (2018) - [j51]Changlu Lin
, Huidan Hu, Chin-Chen Chang, Shaohua Tang
:
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction. IEEE Access 6: 70666-70673 (2018) - [j50]Zhiniang Peng, Shaohua Tang:
Circulant UOV: a new UOV variant with shorter private key and faster signature generation. KSII Trans. Internet Inf. Syst. 12(3): 1376-1395 (2018) - [j49]Junhui He
, Junxi Chen, Shichang Xiao, Xiaoyu Huang
, Shaohua Tang:
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition. Secur. Commun. Networks 2018: 7080673:1-7080673:11 (2018) - [j48]Hao-Tian Wu, Shaohua Tang, Jiwu Huang, Yun-Qing Shi:
A novel reversible data hiding method with image contrast enhancement. Signal Process. Image Commun. 62: 64-73 (2018) - [j47]Honggang Hu
, Xiaolong Yang
, Shaohua Tang:
New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions. IEEE Trans. Inf. Theory 64(6): 4653-4663 (2018) - [j46]Junhui He
, Shuhao Huang, Shaohua Tang, Jiwu Huang
:
JPEG Image Encryption With Improved Format Compatibility and File Size Preservation. IEEE Trans. Multim. 20(10): 2645-2658 (2018) - [c35]Caiqin Nong, Shaohua Tang, Yuanyuan Zhang:
A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing. DSC 2018: 1-8 - [c34]Chen Wu, Shaohua Tang, Xingfu Yan:
A Homomorphic LWE-Based Verifiable Electronic Voting System. DSC 2018: 1-8 - [c33]Hao-Tian Wu, Shaohua Tang, Jean-Luc Dugelay:
Image reversible visual transformation based on MSB replacement and histogram bin mapping. ICACI 2018: 813-818 - 2017
- [j45]Xiaoyu Li
, Shaohua Tang
, Lingling Xu, Huaqun Wang, Jie Chen:
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems. IEEE Access 5: 393-405 (2017) - [j44]Zhiniang Peng, Shaohua Tang
:
Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation. IEEE Access 5: 11877-11886 (2017) - [j43]Jiahui Chen
, Shaohua Tang, Xinglin Zhang:
HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere. KSII Trans. Internet Inf. Syst. 11(6): 3166-3187 (2017) - [j42]Junhui He
, Weiqiang Lan, Shaohua Tang:
A secure image sharing scheme with high quality stego-images based on steganography. Multim. Tools Appl. 76(6): 7677-7698 (2017) - [j41]Yujue Wang, Qianhong Wu, Bo Qin
, Shaohua Tang, Willy Susilo
:
Online/Offline Provable Data Possession. IEEE Trans. Inf. Forensics Secur. 12(5): 1182-1194 (2017) - [j40]Xinglin Zhang, Zheng Yang, Yue-Jiao Gong, Yunhao Liu, Shaohua Tang:
SpatialRecruiter: Maximizing Sensing Coverage in Selecting Workers for Spatial Crowdsourcing. IEEE Trans. Veh. Technol. 66(6): 5229-5240 (2017) - [j39]Jiahui Chen
, Shaohua Tang, Daojing He
, Yang Tan
:
Online/offline signature based on UOV in wireless sensor networks. Wirel. Networks 23(6): 1719-1730 (2017) - [c32]Zhiniang Peng, Shaohua Tang, Linzhi Jiang:
A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security. ICCCS (2) 2017: 86-99 - [c31]Bo Lv, Zhiniang Peng, Shaohua Tang:
A Secure Variant of the SRP Encryption Scheme with Shorter Private Key. ISPEC 2017: 156-167 - [c30]Hao-Tian Wu, Shaohua Tang, Yun-Qing Shi:
Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement. IWDW 2017: 290-302 - [i12]Honggang Hu, Xiaolong Yang, Shaohua Tang:
New Classes of Ternary Bent Functions from the Coulter-Matthews Bent Functions. CoRR abs/1707.04783 (2017) - 2016
- [j38]Chong Chen, Yi Jiang, Chenyang Xu, Xinting Liu
, Lin Hu, Yanbao Xiang, Qingshuang Chen, Denghui Chen, Huanzheng Li, Xueqin Xu, Shaohua Tang:
Skeleton Genetics: a comprehensive database for genes and mutations related to genetic skeletal disorders. Database J. Biol. Databases Curation 2016 (2016) - [j37]Wuqiang Shen, Shaohua Tang:
RGB, a Mixed Multivariate Signature Scheme. Comput. J. 59(4): 439-451 (2016) - [j36]Haibo Yi, Shaohua Tang:
Very Small FPGA Processor for Multivariate Signatures. Comput. J. 59(7): 1091-1101 (2016) - [j35]Haibo Yi, Shaohua Tang, Ranga Vemuri
:
Fast Inversions in Small Finite Fields by Using Binary Trees. Comput. J. 59(7): 1102-1112 (2016) - [j34]Xinglin Zhang, Zheng Yang, Wei Sun, Yunhao Liu, Shaohua Tang, Kai Xing, XuFei Mao:
Incentives for Mobile Crowd Sensing: A Survey. IEEE Commun. Surv. Tutorials 18(1): 54-67 (2016) - [j33]Junqing Gong, Zhenfu Cao
, Shaohua Tang, Jie Chen:
Extended dual system group and shorter unbounded hierarchical identity based encryption. Des. Codes Cryptogr. 80(3): 525-559 (2016) - [j32]Yang Tan
, Shaohua Tang, Jie Chen, Yong Yu, Xiangxue Li:
Building a new secure variant of Rainbow signature scheme. IET Inf. Secur. 10(2): 53-59 (2016) - [j31]Houzhen Wang, Huanguo Zhang, Shaohua Tang:
Key recovery on several matrix public-key encryption schemes. IET Inf. Secur. 10(3): 152-155 (2016) - [j30]Xinxin Liu, Shaohua Tang, Shiqian Chen:
A description logic-based policy compliance checker for trust negotiation. Peer-to-Peer Netw. Appl. 9(2): 372-383 (2016) - [j29]Shaohua Tang, Weijian Li, Jianhao Wu, Zheng Gong, Ming Tang:
Power analysis attacks against FPGA implementation of KLEIN. Secur. Commun. Networks 9(18): 5849-5857 (2016) - [j28]Shaohua Tang, Xiaoyu Li
, Xinyi Huang, Yang Xiang, Lingling Xu:
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing. IEEE Trans. Computers 65(7): 2325-2331 (2016) - [j27]Huaqun Wang, Debiao He
, Shaohua Tang:
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud. IEEE Trans. Inf. Forensics Secur. 11(6): 1165-1176 (2016) - [c29]Shaohua Tang, Bo Lv, Wuqiang Shen:
Hybrid MQ Signature for Embedded Device. ACISP (1) 2016: 281-290 - [c28]Kai Zhang
, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao:
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. AsiaCCS 2016: 269-279 - [c27]Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang:
Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU. ISPEC 2016: 151-166 - [c26]Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao
, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. Public Key Cryptography (1) 2016: 133-163 - 2015
- [j26]Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng, Adama Diene, Xiaofeng Chen:
Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing. Future Gener. Comput. Syst. 52: 116-124 (2015) - [j25]Yong Yu
, Man Ho Au
, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo
, Liju Dong:
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Sec. 14(4): 307-318 (2015) - [j24]Yamin Wen, Fengxia Li, Zheng Gong, Shaohua Tang:
一种AVR环境下KLEIN分组密码抗计时和缓存边信道攻击的快速保护方法 (Fast Implementation of KLEIN for Resisting Timing and Cache Side-channel Attacks on AVR). 计算机科学 42(3): 148-152 (2015) - [j23]Lingling Xu, Jin Li, Shaohua Tang, Joonsang Baek
:
Server-Aided Verification Signature with Privacy for Mobile Computing. Mob. Inf. Syst. 2015: 626415:1-626415:11 (2015) - [j22]Niu Liu, Shaohua Tang, Lingling Xu, Daojing He
:
Analyses of several recently proposed group key management schemes. Secur. Commun. Networks 8(2): 136-148 (2015) - [j21]Xinyi Huang, Joseph K. Liu
, Shaohua Tang, Yang Xiang
, Kaitai Liang
, Li Xu, Jianying Zhou
:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015) - [j20]Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang
, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Distributed Deduplication Systems with Improved Reliability. IEEE Trans. Computers 64(12): 3569-3579 (2015) - [j19]Xiaofeng Chen, Willy Susilo
, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang
:
Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015) - [c25]Yang Tan
, Shaohua Tang:
Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature Generation. Inscrypt 2015: 57-74 - [i11]Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. IACR Cryptol. ePrint Arch. 2015: 820 (2015) - 2014
- [j18]Shaohua Tang, Lingling Xu:
Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials. Future Gener. Comput. Syst. 30: 91-97 (2014) - [j17]Zheng Gong, Pieter H. Hartel
, Svetla Nikova
, Shaohua Tang, Bo Zhu:
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks. J. Comput. Sci. Technol. 29(1): 53-68 (2014) - [j16]Niu Liu, Shaohua Tang, Lingling Xu:
Yet another attack on the chinese remainder theorem-based hierarchical access control scheme. Secur. Commun. Networks 7(7): 1079-1095 (2014) - [j15]Lingling Xu, Fangguo Zhang
, Shaohua Tang:
Timed-release oblivious transfer. Secur. Commun. Networks 7(7): 1138-1149 (2014) - [j14]Yang Tan
, Shaohua Tang, Ting Wang:
Adding variables variation to Rainbow-like scheme to enhance its security level against MinRank attack. Secur. Commun. Networks 7(12): 2326-2334 (2014) - [j13]Daojing He
, Sammy Chan
, Shaohua Tang:
A Novel and Lightweight System to Secure Wireless Medical Sensor Networks. IEEE J. Biomed. Health Informatics 18(1): 316-326 (2014) - [j12]Hong Shen, Shaohua Tang:
Preface. J. Supercomput. 69(2): 509-511 (2014) - [j11]Lingling Xu, Shaohua Tang:
Verifiable computation with access control in cloud computing. J. Supercomput. 69(2): 528-546 (2014) - [j10]Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang:
Provably Secure Group Key Management Approach Based upon Hyper-Sphere. IEEE Trans. Parallel Distributed Syst. 25(12): 3253-3263 (2014) - [c24]Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng:
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. ISPEC 2014: 187-201 - 2013
- [j9]Xinxin Liu, Shaohua Tang, Qiong Huang, Zhiwen Yu:
An ontology-based approach to automated trust negotiation. Comput. Stand. Interfaces 36(1): 219-230 (2013) - [j8]Chunhua Chen, Chris J. Mitchell
, Shaohua Tang:
Ubiquitous One-Time Password Service Using the Generic Authentication Architecture. Mob. Networks Appl. 18(5): 738-747 (2013) - [j7]Daojing He
, Sammy Chan
, Shaohua Tang, Mohsen Guizani:
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(9): 4638-4646 (2013) - [c23]Wuqiang Shen, Shaohua Tang, Lingling Xu:
IBUOV, A Provably Secure Identity-Based UOV Signature Scheme. CSE 2013: 388-395 - [c22]Yulin Zheng, Shaohua Tang, Chaowen Guan, Min-Rong Chen:
Cryptanalysis of a Certificateless Proxy Re-encryption Scheme. EIDWT 2013: 307-312 - [c21]Lingling Xu, Shaohua Tang:
Server-Aided Verification Signatures with Privacy. EIDWT 2013: 414-421 - [c20]Siyang Yu, Kenli Li, Yunchuan Qin, Shaohua Tang:
An Anti-power Attacks Implementation of AES Algorithm in ASIC. HPCC/EUC 2013: 1640-1646 - [c19]Hongyan Cui, Shaohua Tang, Xu Huang, Jianya Chen, Yunjie Liu:
A novel method of virtual network embedding based on topology convergence-degree. ICC Workshops 2013: 246-250 - [c18]Shaohua Tang, Lingling Xu:
Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards. NSS 2013: 549-562 - [c17]Chengdong Tao, Adama Diene, Shaohua Tang, Jintai Ding:
Simple Matrix Scheme for Encryption. PQCrypto 2013: 231-242 - [c16]Weijian Li, Shaohua Tang, Daojing He
:
A Survey of Side Channel Attacks on MPKCs potential for RFID. RFIDSec Asia 2013: 123-131 - [i10]Niu Liu, Shaohua Tang, Lingling Xu:
Attacks and Comments on Several Recently Proposed Key Management Schemes. IACR Cryptol. ePrint Arch. 2013: 100 (2013) - [i9]Niu Liu, Shaohua Tang, Lingling Xu:
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme. IACR Cryptol. ePrint Arch. 2013: 132 (2013) - [i8]Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong:
Power Analysis Attacks against FPGA Implementations of KLEIN. IACR Cryptol. ePrint Arch. 2013: 190 (2013) - [i7]Wuqiang Shen, Shaohua Tang:
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor. IACR Cryptol. ePrint Arch. 2013: 771 (2013) - [i6]Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li:
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature. IACR Cryptol. ePrint Arch. 2013: 877 (2013) - [i5]Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng:
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. IACR Cryptol. ePrint Arch. 2013: 878 (2013) - 2012
- [c15]Shaohua Tang, Lingling Xu:
Proxy Signature Scheme Based on Isomorphisms of Polynomials. NSS 2012: 113-125 - [c14]Chunhua Chen, Shaohua Tang, Chris J. Mitchell
:
Building General-Purpose Security Services on EMV Payment Cards. SecureComm 2012: 29-44 - [i4]Haibo Yi, Shaohua Tang:
A Versatile Multi-Input Multiplier over Finite Fields. IACR Cryptol. ePrint Arch. 2012: 545 (2012) - 2011
- [c13]Chunhua Chen, Chris J. Mitchell
, Shaohua Tang:
Building General Purpose Security Services on Trusted Computing. INTRUST 2011: 16-31 - [c12]Guangdong Yang, Shaohua Tang, Li Yang:
A Novel Group Signature Scheme Based on MPKC. ISPEC 2011: 181-195 - [c11]Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen:
High-Speed Hardware Implementation of Rainbow Signature on FPGAs. PQCrypto 2011: 228-243 - [c10]Chunhua Chen, Chris J. Mitchell
, Shaohua Tang:
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key. WISTP 2011: 54-68 - [i3]Guangdong Yang, Shaohua Tang, Li Yang:
A Novel Group Signature Scheme Based on MPKC. IACR Cryptol. ePrint Arch. 2011: 100 (2011) - [i2]Shaohua Tang, Jintai Ding, Zhiming Yang:
Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere. IACR Cryptol. ePrint Arch. 2011: 216 (2011) - [i1]Shaohua Tang, Jintai Ding, Yujun Liang:
A Simple and Efficient New Group Key Management Approach Based on Linear Geometry. IACR Cryptol. ePrint Arch. 2011: 225 (2011) - 2010
- [c9]Xinxin Liu, Shaohua Tang, Kai Wei:
Formal security analysis of automated trust negotiation. ICMLC 2010: 861-866
2000 – 2009
- 2009
- [c8]Zhiyuan Xie, Junhui He
, Shaohua Tang:
A CPK-Based Security Scheme at Network Layer. CIS (2) 2009: 406-410 - [c7]Kai Wei, Shaohua Tang:
A Multi-level Trust Evaluation Model Based on D-S Theory for Grid. CIS (2) 2009: 411-415 - 2008
- [c6]Xinxin Liu, Shaohua Tang:
Formal Privacy Analysis of an Electronic Voting Scheme. CIS (2) 2008: 283-287 - [c5]Lina Ge, Shaohua Tang:
Sharing Multi-Secret Based on Circle Properties. CIS (1) 2008: 340-344 - [c4]Sunan Shen, Shaohua Tang:
Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation. CIS (1) 2008: 399-404 - [c3]Yongkai Cai, Shaohua Tang:
Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism. CIS (1) 2008: 453-457 - 2006
- [c2]Lina Ge, Shaohua Tang, Qiao Kuang:
Dual-Role Based Access Control Framework for Grid Services. APSCC 2006: 427-432 - 2005
- [j6]Dongxi Zheng, Shaohua Tang, Shaofa Li:
Web Services Single Sign-on Protocol and Formal Analysis on It. J. Circuits Syst. Comput. 14(5): 923-930 (2005) - [c1]Shaohua Tang:
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. CIS (2) 2005: 186-191 - 2002
- [j5]Shaohua Tang:
Correlative Message Group Digital Signature and Its Application to E-Commerce. J. Circuits Syst. Comput. 11(1): 73-80 (2002) - 2000
- [j4]Shaohua Tang:
Directed One-Time Password Authentication Scheme Based upon Discrete Logarithm. J. Circuits Syst. Comput. 10(3-4): 173-180 (2000)
1990 – 1999
- 1999
- [j3]Shaohua Tang, Gang Wei:
ID-Based Digital Multisignature Scheme. J. Circuits Syst. Comput. 9(3-4): 223-227 (1999) - [j2]Shaohua Tang, Weihua Ma:
Directed User Authentication Scheme Based on Discrete Logarithm. J. Circuits Syst. Comput. 9(5-6): 299-306 (1999) - 1997
- [j1]Anthony S. Maida, Shaohua Tang:
Description-based communication for autonomous agents under ideal conditions. J. Exp. Theor. Artif. Intell. 9(1): 103-135 (1997)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint