Zebralancer: Private and anonymous crowdsourcing system atop open blockchain Y Lu, Q Tang, G Wang 2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018 | 308 | 2018 |
Dumbo: Faster asynchronous bft protocols B Guo, Z Lu, Q Tang, J Xu, Z Zhang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 204 | 2020 |
Dumbo-mvba: Optimal multi-valued validated asynchronous byzantine agreement, revisited Y Lu, Z Lu, Q Tang, G Wang Proceedings of the 39th symposium on principles of distributed computing …, 2020 | 121 | 2020 |
Cliptography: Clipping the power of kleptographic attacks A Russell, Q Tang, M Yung, HS Zhou Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 111 | 2016 |
Efficient encrypted keyword search for multi-user data sharing A Kiayias, O Oksuz, A Russell, Q Tang, B Wang Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 102 | 2016 |
Generic semantic security against a kleptographic adversary A Russell, Q Tang, M Yung, HS Zhou Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 73 | 2017 |
Optimal rate private information retrieval from homomorphic encryption A Kiayias, N Leonardos, H Lipmaa, K Pavlyk, Q Tang Water Treatment Technology 2015 (2), 2015 | 58 | 2015 |
Speeding dumbo: Pushing asynchronous bft closer to practice B Guo, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang The Network and Distributed System Security Symposium (NDSS), 2022, 2022 | 48 | 2022 |
Dumbo-ng: Fast asynchronous bft consensus with throughput-oblivious latency Y Gao, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 46 | 2022 |
Bolt-dumbo transformer: Asynchronous consensus as fast as the pipelined bft Y Lu, Z Lu, Q Tang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 43 | 2022 |
On the security of key extraction from measuring physical quantities M Edman, A Kiayias, Q Tang, B Yener IEEE Transactions on Information Forensics and Security 11 (8), 1796-1806, 2016 | 43 | 2016 |
Decentralizing IoT management systems using blockchain for censorship resistance S He, Q Tang, CQ Wu, X Shen IEEE Transactions on Industrial Informatics 16 (1), 715-727, 2019 | 38* | 2019 |
Correcting subverted random oracles A Russell, Q Tang, M Yung, HS Zhou Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 35 | 2018 |
Honey encryption beyond message recovery security J Jaeger, T Ristenpart, Q Tang Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 34 | 2016 |
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog SSM Chow, A Russell, Q Tang, M Yung, Y Zhao, HS Zhou IACR International Workshop on Public Key Cryptography, 221-251, 2019 | 33 | 2019 |
Traitor deterring schemes: Using bitcoin as collateral for digital content A Kiayias, Q Tang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 33 | 2015 |
Efficient asynchronous byzantine agreement without private setups Y Gao, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang 2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022 | 32 | 2022 |
A security-enhanced certificateless aggregate signature authentication protocol for InVANETs G Xu, W Zhou, AK Sangaiah, Y Zhang, X Zheng, Q Tang, N Xiong, ... IEEE network 34 (2), 22-29, 2020 | 31 | 2020 |
On enabling machine learning tasks atop public blockchains: A crowdsourcing approach Y Lu, Q Tang, G Wang 2018 IEEE international conference on data mining workshops (ICDMW), 81-88, 2018 | 30 | 2018 |
How to keep a secret: leakage deterring public-key cryptosystems A Kiayias, Q Tang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 29 | 2013 |