Search

Your search keyword '"Shaohua Tang"' showing total 24 results

Search Constraints

Start Over You searched for: Author "Shaohua Tang" Remove constraint Author: "Shaohua Tang" Publisher institute of electrical and electronics engineers (ieee) Remove constraint Publisher: institute of electrical and electronics engineers (ieee)
24 results on '"Shaohua Tang"'

Search Results

1. iTAM: Bilateral Privacy-Preserving Task Assignment for Mobile Crowdsensing

2. Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server

3. PACE: Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowdsensing

4. IronM: Privacy-Preserving Reliability Estimation of Heterogeneous Data for Mobile Crowdsensing

5. Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy

6. Reversible Data Hiding in JPEG Images Based on Negative Influence Models

7. A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams

8. On Reliable Task Assignment for Spatial Crowdsourcing

9. BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing

10. Dynamic and Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing

11. JPEG Image Encryption With Improved Format Compatibility and File Size Preservation

12. Precomputation Methods for UOV Signature on Energy-Harvesting Sensors

13. A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

14. SpatialRecruiter: Maximizing Sensing Coverage in Selecting Workers for Spatial Crowdsourcing

15. Online/Offline Provable Data Possession

16. Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation

17. Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing

18. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

19. Incentives for Mobile Crowd Sensing: A Survey

20. Secure Distributed Deduplication Systems with Improved Reliability

21. ASBKS: Towards attribute set based keyword search over encrypted personal health records

22. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

23. Provably Secure Group Key Management Approach Based upon Hyper-Sphere

24. Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks

Catalog

Books, media, physical & digital resources