Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tang, Chunming
add a person with the name Tang, Chunming
 

Other publications of authors with the same name

The optimal linear secret sharing scheme for any given access structure., , and . J. Systems Science & Complexity, 26 (4): 634-649 (2013)A Method to Enlarge the Design Distance of BCH Codes and Some Classes of Infinite Optimal Cyclic Codes., , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 518-528. Springer, (2017)Design of Secret Reconstruction With Optimal Communication Efficiency., , , and . IEEE Communications Letters, 22 (8): 1556-1559 (2018)Securely verifiable outsourcing schemes of matrix calculation., and . IJHPCN, 8 (2): 93-101 (2015)An Attribute-Based Encryption Scheme with Constant-Size Ciphertexts., , , , and . GreenCom/iThings/CPScom, page 1086-1088. IEEE, (2013)Securely Outsourced Face Recognition under Federated Cloud Environment., and . ISPDC, page 269-276. IEEE Computer Society, (2016)Highly Efficient Proxy Re-encryption Schemes for User-End Encrypted Cloud Data Sharing., , and . ISPDC, page 261-268. IEEE Computer Society, (2016)Efficient Explicit Constructions of Multipartite Secret Sharing Schemes., , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 505-536. Springer, (2019)Vibration Boundary Control for a One-Dimensional Flexible Beam System With Restricted Input., , , , and . IEEE Access, (2018)Accountable mobile E-commerce scheme in intelligent cloud system transactions., , , , and . J. Ambient Intelligence and Humanized Computing, 9 (6): 1889-1899 (2018)