default search action
Miaomiao Tian 0001
Person information
- affiliation: Anhui University, Hefei, China
- affiliation (PhD 2014): University of Science and Technology of China, Hefei, China
Other persons with the same name
- Miaomiao Tian — disambiguation page
- Miaomiao Tian 0002 — Nanchang University, Nanchang, China
- Miaomiao Tian 0003 — National High Performance Computing Center at Hefei, Hefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j27]Jie Cui, Yue Sun, Yan Xu, Miaomiao Tian, Hong Zhong:
Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci. China Inf. Sci. 65(5): 1-3 (2022) - 2021
- [j26]Zhili Chen, Wei Ding, Yan Xu, Miaomiao Tian, Hong Zhong:
Fair auctioning and trading framework for cloud virtual machines based on blockchain. Comput. Commun. 171: 89-98 (2021) - 2020
- [j25]Jing Zhang, Hong Zhong, Jie Cui, Miaomiao Tian, Yan Xu, Lu Liu:
Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks. IEEE Trans. Veh. Technol. 69(7): 7940-7954 (2020) - [c13]Miaomiao Tian, Zhen Xie, Hong Zhong, Zhili Chen:
Lightweight Proofs of Storage with Public Verifiability from Lattices. HPCC/DSS/SmartCity 2020: 551-558 - [i6]Zhili Chen, Wei Ding, Yan Xu, Miaomiao Tian, Hong Zhong:
Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain. CoRR abs/2001.00771 (2020)
2010 – 2019
- 2019
- [j24]Jing Chen, Miaomiao Tian, Chuang Gao, Zhili Chen:
A Lattice-Based Incremental Signature Scheme. IEEE Access 7: 21201-21210 (2019) - [j23]Miaomiao Tian, Shibei Ye, Hong Zhong, Fei Chen, Chuang Gao, Jie Chen:
Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem. IEEE Access 7: 129071-129081 (2019) - [j22]Zhili Chen, Ruihong Che, Hong Zhong, Miaomiao Tian, Jie Cui:
PATH: privacy-preserving auction for heterogeneous spectrum allocations. Wirel. Networks 25(4): 1763-1776 (2019) - 2018
- [j21]Xinyu Xiong, Fei Chen, Peizhi Huang, Miaomiao Tian, Xiaofang Hu, Badong Chen, Jing Qin:
Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data. IEEE Access 6: 28877-28889 (2018) - [j20]Miaomiao Tian, Lingyan Wang, Hong Zhong, Jie Chen:
Attribute-based Data Integrity Checking for Cloud Storage. Fundam. Informaticae 163(4): 395-411 (2018) - [j19]Jie Cui, Qinghe Lu, Hong Zhong, Miaomiao Tian, Lu Liu:
A Load-Balancing Mechanism for Distributed SDN Control Plane Using Response Time. IEEE Trans. Netw. Serv. Manag. 15(4): 1197-1206 (2018) - [c12]Jie Cui, Qinghe Lu, Hong Zhong, Miaomiao Tian, Lu Liu:
SMCLBRT: A Novel Load-Balancing Strategy of Multiple SDN Controllers Based on Response Time. HPCC/SmartCity/DSS 2018: 541-546 - [c11]Miaomiao Tian, Shibei Ye, Hong Zhong, Lingyan Wang, Fei Chen, Jie Cui:
Identity-Based Proofs of Storage with Enhanced Privacy. ICA3PP (4) 2018: 461-480 - [c10]Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian:
PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction. ICICS 2018: 248-267 - [c9]Gongming Zhao, Miaomiao Tian:
A Simpler Construction of Identity-Based Ring Signatures from Lattices. ProvSec 2018: 277-291 - [i5]Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian:
PP-MCSA: Privacy Preserving Multi-Channel Double Spectrum Auction. CoRR abs/1810.08451 (2018) - 2017
- [c8]Chenglin Miao, Lu Su, Wenjun Jiang, Yaliang Li, Miaomiao Tian:
A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems. INFOCOM 2017: 1-9 - 2016
- [j18]Miaomiao Tian, Liusheng Huang:
Identity-based Signatures from Lattices: Simpler, Faster, Shorter. Fundam. Informaticae 145(2): 171-187 (2016) - [j17]Yan Xu, Liusheng Huang, Miaomiao Tian, Hong Zhong:
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication. Int. J. Netw. Secur. 18(5): 993-996 (2016) - [c7]Yu-e Sun, He Huang, Xiang-Yang Li, Yang Du, Miaomiao Tian, Hongli Xu, Mingjun Xiao:
Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation in Wireless Communications. BigCom 2016: 13-26 - [c6]Zhuan Shi, He Huang, Yu-e Sun, Xiaocan Wu, Fanzhang Li, Miaomiao Tian:
An Efficient Task Assignment Mechanism for Crowdsensing Systems. ICCCS (2) 2016: 14-24 - 2015
- [j16]Miaomiao Tian:
Identity-based proxy re-signatures from lattices. Inf. Process. Lett. 115(4): 462-467 (2015) - [j15]Miaomiao Tian, Liusheng Huang:
Certificateless and certificate-based signatures from lattices. Secur. Commun. Networks 8(8): 1575-1586 (2015) - [c5]Shaowei Wang, Liusheng Huang, Miaomiao Tian, Wei Yang, Hongli Xu, Hansong Guo:
Personalized Privacy-Preserving Data Aggregation for Histogram Estimation. GLOBECOM 2015: 1-6 - [c4]Yu-e Sun, He Huang, Miaomiao Tian, Zehao Sun, Wei Yang, Hansong Guo, Liusheng Huang:
STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets. ICA3PP (4) 2015: 427-441 - 2014
- [j14]Miaomiao Tian, Wei Yang, Liusheng Huang:
Cryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme. Fundam. Informaticae 129(4): 365-375 (2014) - [j13]Miaomiao Tian, Liusheng Huang, Wei Yang:
Practical certificateless short signature scheme. Int. J. Electron. Secur. Digit. Forensics 6(3): 204-218 (2014) - [j12]Miaomiao Tian, Liusheng Huang, Wei Yang:
On the security of an enhanced signature scheme. Int. J. Inf. Commun. Technol. 6(1): 1-6 (2014) - [j11]Miaomiao Tian, Youwen Zhu, Zhili Chen:
Two Simple Attacks on a Blind Signature Scheme. Int. J. Netw. Secur. 16(6): 498-500 (2014) - [j10]Debiao He, Miaomiao Tian, Jianhua Chen:
Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 268: 458-462 (2014) - [j9]Miaomiao Tian, Liusheng Huang, Wei Yang:
Security Analysis of a fuzzy Identity-Based Encryption Scheme. J. Circuits Syst. Comput. 23(3) (2014) - [j8]Yan Xu, Miaomiao Tian, Liusheng Huang, Wei Yang:
Improvement of a Lattice-based Signature Scheme. J. Inf. Hiding Multim. Signal Process. 5(1): 41-46 (2014) - [j7]Fei Wang, Liusheng Huang, Haibo Miao, Miaomiao Tian:
A novel distributed covert channel in HTTP. Secur. Commun. Networks 7(6): 1031-1041 (2014) - [c3]Zhili Chen, Liusheng Huang, Lu Li, Wei Yang, Haibo Miao, Miaomiao Tian, Fei Wang:
PS-TRUST: Provably secure solution for truthful double spectrum auctions. INFOCOM 2014: 1249-1257 - [c2]Miaomiao Tian, Liusheng Huang:
Efficient Identity-Based Signature from Lattices. SEC 2014: 321-329 - 2013
- [j6]Miaomiao Tian, Liusheng Huang:
Cryptanalysis of a certificateless signature scheme without pairings. Int. J. Commun. Syst. 26(11): 1375-1381 (2013) - [j5]Miaomiao Tian, Liusheng Huang, Wei Yang:
Efficient hierarchical identity-based signatures from lattices. Int. J. Electron. Secur. Digit. Forensics 5(1): 1-10 (2013) - [j4]Miaomiao Tian, Liusheng Huang:
Lattice-based message recovery signature schemes. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 257-269 (2013) - [i4]Zhili Chen, Liusheng Huang, Lu Li, Wei Yang, Haibo Miao, Miaomiao Tian, Fei Wang:
PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions. CoRR abs/1307.7433 (2013) - 2012
- [j3]Miaomiao Tian, Liusheng Huang, Wei Yang:
A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model. Int. J. Netw. Secur. 14(6): 310-315 (2012) - [j2]Miaomiao Tian, Liusheng Huang:
Breaking A Proxy Signature Scheme From Lattices. Int. J. Netw. Secur. 14(6): 320-323 (2012) - [j1]Miaomiao Tian, Wei Yang, Liusheng Huang:
Security of a Biometric Identity-based Encryption Scheme. Int. J. Netw. Secur. 14(6): 362-365 (2012) - [i3]Miaomiao Tian, Liusheng Huang, Wei Yang:
On the Security of an identity-based short signature scheme. CoRR abs/1201.2504 (2012) - [i2]Debiao He, Miaomiao Tian:
A note on 'An efficient certificateless aggregate signature with constant pairing computations'. IACR Cryptol. ePrint Arch. 2012: 445 (2012) - 2011
- [c1]Yifei Yao, Miaomiao Tian, Shurong Ning, Wei Yang:
Protocol to Compute Polygon Intersection in STC Model. ICICA (LNCS) 2011: 641-648 - [i1]Miaomiao Tian, Wei Yang, Liusheng Huang:
Security of a biometric identity-based encryption scheme. CoRR abs/1110.2653 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint