Cha Min Tang - Publications

Affiliations: 
University of Mayland 

119 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Qi Y, Tang C, Huang D. Binary linear codes with few weights Ieee Communications Letters. 20: 208-211. DOI: 10.1109/LCOMM.2015.2506576  0.92
2016 Tang C, Qi Y, Huang D. Two-weight and three-weight linear codes from square functions Ieee Communications Letters. 20: 29-32. DOI: 10.1109/LCOMM.2015.2497344  0.92
2016 Li P, Li T, Yao ZA, Tang CM, Li J. Privacy-preserving outsourcing of image feature extraction in cloud computing Soft Computing. 1-11. DOI: 10.1007/s00500-016-2066-5  0.92
2015 Yang S, Tang CM, Yang S. The Shaping of Two Distinct Dendritic Spikes by A-Type Voltage-Gated K(+) Channels. Frontiers in Cellular Neuroscience. 9: 469. PMID 26696828 DOI: 10.3389/fncel.2015.00469  0.56
2015 Yao YY, Liu J, Wu YQ, Zheng MM, Tang CM. Process of salicylic acid-type composite for rare earth ions Materials Science Forum. 814: 333-337. DOI: 10.4028/www.scientific.net/MSF.569-573.333  0.36
2015 Ren Y, Tang C, Wang G, Wong DS. Attribute-based signature schemes with accountability International Journal of Information and Communication Technology. 7: 141-158. DOI: 10.1504/IJICT.2015.068377  0.92
2015 Xiang C, Tang C. Securely verifiable outsourcing schemes of matrix calculation International Journal of High Performance Computing and Networking. 8: 93-101. DOI: 10.1504/IJHPCN.2015.070009  0.92
2015 Lou Y, Han H, Tang C, Wu Z, Xu M. Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition International Journal of Computer Mathematics. 92: 451-462. DOI: 10.1080/00207160.2014.910304  0.92
2015 Jian JB, Guo CH, Tang CM, Bai YQ. A new superlinearly convergent algorithm of combining QP subproblem with system of linear equations for nonlinear optimization Journal of Computational and Applied Mathematics. 273: 88-102. DOI: 10.1016/j.cam.2014.06.009  0.92
2015 Jian JB, Pan HQ, Tang CM, Li JL. A strongly sub-feasible primal-dual quasi interior-point algorithm for nonlinear inequality constrained optimization Applied Mathematics and Computation. 266: 560-578. DOI: 10.1016/j.amc.2015.05.091  0.92
2015 Xiang C, Tang C. Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server Journal of Ambient Intelligence and Humanized Computing. 6: 131-139. DOI: 10.1007/s12652-014-0254-7  0.92
2015 Elsherif AK, Tang C, Zhang L. Fuzzy hypotheses testing using fuzzy data and confidence interval in radar decision criteria Evolving Systems. 6: 67-74. DOI: 10.1007/s12530-014-9115-z  0.92
2015 Teng JK, Wu CK, Tang CM, Tian YL. A strongly secure identity-based authenticated group key exchange protocol Science China Information Sciences. 58. DOI: 10.1007/s11432-014-5271-9  0.92
2015 Tang Cm, Zhang Xj. A new publicly verifiable data possession on remote storage Journal of Supercomputing. 1-15. DOI: 10.1007/s11227-015-1556-z  0.92
2015 Xiang C, Tang C, Cai Y, Xu Q. Privacy-preserving face recognition with outsourced computation Soft Computing. DOI: 10.1007/s00500-015-1759-5  0.92
2014 Yang S, Yang S, Moreira T, Hoffman G, Carlson GC, Bender KJ, Alger BE, Tang CM. Interlamellar CA1 network in the hippocampus. Proceedings of the National Academy of Sciences of the United States of America. 111: 12919-24. PMID 25139992 DOI: 10.1073/pnas.1405468111  0.56
2014 Yang S, Emiliani V, Tang CM. The kinetics of multibranch integration on the dendritic arbor of CA1 pyramidal neurons. Frontiers in Cellular Neuroscience. 8: 127. PMID 24860429 DOI: 10.3389/fncel.2014.00127  0.56
2014 Shin RK, Qureshi RA, Harris NR, Bakar D, Li TP, Jafri MS, Tang CM. Wilbrand knee. Neurology. 82: 459-60. PMID 24491972 DOI: 10.1212/WNL.0000000000000084  0.56
2014 Zhou Q, Wu D, Tang C, Rong C. STSHC: Secure and trusted scheme for Hadoop cluster International Journal of High Performance Systems Architecture. 5: 63-69. DOI: 10.1504/IJHPSA.2014.059874  0.92
2014 Xiang C, Tang CM. Improved fully homomorphic encryption over the integers with shorter public keys International Journal of Security and Its Applications. 8: 365-374. DOI: 10.14257/ijsia.2014.8.6.31  0.92
2014 Chen Y, Tang C. Construction of multiplicative monotone span program Journal of Computational Information Systems. 10: 8703-8713. DOI: 10.12733/jcis11896  0.92
2014 Qi Y, Xu M, Tang C. A class of elliptic curves in edwards form 2013 Ieee Conference Anthology, Anthology 2013. DOI: 10.1109/ANTHOLOGY.2013.6784872  0.92
2014 Qi Y, Tang C, Xu M, Guo B. An identity-based mutual authentication with key agreement scheme for mobile client-server environment Iet Conference Publications. 2014. DOI: 10.1049/cp.2014.0754  0.92
2014 Qi Y, Tang C, Xu M, Guo B. A note on certificate-based encryption Iet Conference Publications. 2014. DOI: 10.1049/cp.2014.0747  0.92
2014 Tang C, Qi Y, Xu M, Wang B, Yang Y. A note on weight distributions of irreducible cyclic codes Iet Conference Publications. 2014. DOI: 10.1049/cp.2014.0606  0.92
2014 Liang K, Chu CK, Tan X, Wong DS, Tang C, Zhou J. Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Theoretical Computer Science. 539: 87-105. DOI: 10.1016/j.tcs.2014.04.027  0.92
2014 Tang CM, Xu MZ, Qi YF. Cryptography on twisted Edwards curves over local fields Science China Information Sciences. 58: 1-15. DOI: 10.1007/s11432-014-5155-z  0.92
2014 Tang CM, Ni DM, Xu MZ, Guo BA, Qi YF. Implementing optimized pairings with elliptic nets Science China Information Sciences. 57: 1-10. DOI: 10.1007/s11432-013-4840-7  0.92
2014 Tang Cm, Liu S, Jian Jb, Li Jl. A feasible SQP-GS algorithm for nonconvex, nonsmooth constrained optimization Numerical Algorithms. 65: 1-22. DOI: 10.1007/s11075-012-9692-5  0.92
2014 Jian Jb, Hu Qj, Tang Cm. Superlinearly Convergent Norm-Relaxed SQP Method Based on Active Set Identification and New Line Search for Constrained Minimax Problems Journal of Optimization Theory and Applications. 163: 859-883. DOI: 10.1007/s10957-013-0503-5  0.92
2014 Tang Cm, Dai Sg. The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures Acta Mathematicae Applicatae Sinica. 30: 1073-1084. DOI: 10.1007/s10255-014-0431-7  0.92
2014 Tang C, Qi Y, Xu M. A note on cyclic codes from APN functions Applicable Algebra in Engineering, Communications and Computing. 25: 21-37. DOI: 10.1007/s00200-014-0217-4  0.92
2014 Tang C, Lou Y, Qi Y, Xu M, Guo B. A note on semi-bent and hyper-bent boolean functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8567: 3-21. DOI: 10.1007/978-3-319-12087-4_1  0.92
2013 Liang CP, Wu Y, Schmitt J, Bigeleisen PE, Slavin J, Jafri MS, Tang CM, Chen Y. Coherence-gated Doppler: a fiber sensor for precise localization of blood flow. Biomedical Optics Express. 4: 760-71. PMID 23667791 DOI: 10.1364/BOE.4.000760  0.56
2013 Tang CM, Shen YL, Sheng QC, Liu S, Li WT, Wang LF, Chen DP. Properties of luminescence and scintillation of Eu-doped high gadolinium glass Wuli Xuebao/Acta Physica Sinica. 62: 247804. DOI: 10.7498/aps.62.247804  0.52
2013 Shen YL, Tang CM, Sheng QC, Liu S, Li WT, Wang LF, Chen DP. Spectroscopic properties and energy transfer of Ce3+/Eu2+ codoped oxide glasses with high Gd2O3 concentration Wuli Xuebao/Acta Physica Sinica. 62. DOI: 10.7498/aps.62.117803  0.52
2013 Xu BJ, Tang CM, Chen H, Zhang WZ, Zhu FC. Improving the maximum transmission distance of coutinuous variable no-switching QKD protocol Wuli Xuebao/Acta Physica Sinica. 62. DOI: 10.7498/aps.62.070301  0.92
2013 Liu M, Hou G, Gao Y, Tang C, Xie D. An internet behavior management system based on android Journal of Software. 8: 1932-1942. DOI: 10.4304/jsw.8.8.1932-1942  0.92
2013 Hu DL, Chen QZ, Zhang CJ, Wang Y, Zhang BJ, Tang CM. Identification of cotton SKP1-like gene GhSKP1 and its function in seed germination and taproot growth in tobacco Canadian Journal of Plant Science. 93: 817-825. DOI: 10.4141/CJPS2012-312  0.4
2013 Qi Y, Tang C, Guo B, Xu M. Super-optimal pairings Applied Mechanics and Materials. 281: 127-133. DOI: 10.4028/www.scientific.net/AMM.281.127  0.92
2013 Lou Y, Tang C, Ma J, Zhang S, Xu M. A note on some special class of hyper-bent functions Journal of Computational Information Systems. 9: 9333-9340. DOI: 10.12733/jcis7554  0.92
2013 Qi Y, Tang C, Lou Y, Xu M, Guo B. An attribute-based encryption scheme with constant-size ciphertexts Proceedings - 2013 Ieee International Conference On Green Computing and Communications and Ieee Internet of Things and Ieee Cyber, Physical and Social Computing, Greencom-Ithings-Cpscom 2013. 1086-1088. DOI: 10.1109/GreenCom-iThings-CPSCom.2013.186  0.92
2013 Quan Z, Xiao D, Tang C, Rong C. TSHC: Trusted scheme for hadoop cluster Proceedings - 4th International Conference On Emerging Intelligent Data and Web Technologies, Eidwt 2013. 344-349. DOI: 10.1109/EIDWT.2013.66  0.92
2013 Quan Z, Wu D, Xiao D, Zhang Y, Tang C. An energy efficiency trusted dynamic routing protocol for wireless sensor networks Proceedings - 4th International Conference On Emerging Intelligent Data and Web Technologies, Eidwt 2013. 329-334. DOI: 10.1109/EIDWT.2013.63  0.92
2013 Zheng X, Ye H, Tang C, Rong C, Chen G. A survey on cloud accountability Proceedings - 2013 International Conference On Cloud Computing and Big Data, Cloudcom-Asia 2013. 627-632. DOI: 10.1109/CLOUDCOM-ASIA.2013.29  0.92
2013 Xu B, Tang C, Chen H, Zhang W, Zhu F. Improving the maximum transmission distance of four-state continuous-variable quantum key distribution by using a noiseless linear amplifier Physical Review a - Atomic, Molecular, and Optical Physics. 87. DOI: 10.1103/PhysRevA.87.062311  0.92
2013 Jian JB, Yang SM, Tang CM. A simply sequential quadratically constrained quadratic programming method of strongly sub-feasible directions for constrained optimization Optimization. 62: 463-482. DOI: 10.1080/02331934.2011.611514  0.92
2013 Fan XX, Xu ZG, Liu XY, Tang CM, Wang LW, Han Xl. Effects of light intensity on the growth and leaf development of young tomato plants grown under a combination of red and blue light Scientia Horticulturae. 153: 50-55. DOI: 10.1016/j.scienta.2013.01.017  0.4
2013 Chen Q, Pei D, Tang C, Yue Q, Ji T. A note on ramp secret sharing schemes from error-correcting codes Mathematical and Computer Modelling. 57: 2695-2702. DOI: 10.1016/j.mcm.2011.07.024  0.92
2013 Chen Q, Pei D, Tang C, Zhao G. Efficient integer span program for hierarchical threshold access structure Information Processing Letters. 113: 621-627. DOI: 10.1016/j.ipl.2013.05.009  0.92
2013 Tang C, Gao S, Zhang C. The optimal linear secret sharing scheme for any given access structure Journal of Systems Science and Complexity. 26: 634-649. DOI: 10.1007/s11424-013-2131-4  0.92
2013 Liang K, Huang Q, Schlegel R, Wong DS, Tang C. A conditional proxy broadcast re-encryption scheme supporting timed-release Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7863: 132-146. DOI: 10.1007/978-3-642-38033-4_10  0.92
2013 Liang K, Liu Z, Tan X, Wong DS, Tang C. A CCA-secure identity-based conditional proxy re-encryption without random oracles Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7839: 231-246. DOI: 10.1007/978-3-642-37682-5_17  0.92
2013 Liu X, Tang CM, Lu ZH, Lu X, Li M. Progress of Fe0-PRB in remediation of contaminated groundwater Research of Environmental Sciences. 26: 1309-1315.  0.32
2013 Chen Y, Liang CP, Desai J, Gullapalli R, Tang CM, Schmitt J. Development of needle-based optical coherence imaging and sensing probe for intervention guidance Bio-Optics: Design and Application, Boda 2013. BT3A.3.  0.56
2012 Santos MD, Mohammadi MH, Yang S, Liang CW, Kao JP, Alger BE, Thompson SM, Tang CM. Dendritic hold and read: a gated mechanism for short term information storage and retrieval. Plos One. 7: e37542. PMID 22629416 DOI: 10.1371/journal.pone.0037542  0.56
2012 Wang B, Tang C, Song C, Qi Y, Yang Y. The effective construction of the lattice basis and its cryptographic application Journal of Convergence Information Technology. 7: 273-280. DOI: 10.4156/jcit.vol7.issue5.33  0.92
2012 Wang B, Tang C, Yang Y. The construction of GLV-friendly elliptic curves with fast point multiplication International Journal of Advancements in Computing Technology. 4: 268-275. DOI: 10.4156/ijact.vol4.issue4.33  0.92
2012 Wang B, Tang C, Yang Y. An algorithm for constructing all the pairings on elliptic curves Advances in Information Sciences and Service Sciences. 4: 313-321. DOI: 10.4156/AISS.vol4.issue5.37  0.92
2012 Zeng Y, Jian J, Tang C. A new smoothing method based on nonsmooth FB function for second-order cone programming Advanced Materials Research. 532: 1000-1005. DOI: 10.4028/www.scientific.net/AMR.532-533.1000  0.92
2012 Wang B, Tang C, Qi Y, Yang Y, Xu M. The weight distributions of cyclic codes and elliptic curves Ieee Transactions On Information Theory. 58: 7253-7259. DOI: 10.1109/TIT.2012.2210386  0.92
2012 Tang C, Wong DS, Hu X, Pei D. An efficient key distribution scheme in cloud computing Cloudcom 2012 - Proceedings: 2012 4th Ieee International Conference On Cloud Computing Technology and Science. 557-561. DOI: 10.1109/CloudCom.2012.6427608  0.92
2012 Tang CM, Jian JB. Strongly sub-feasible direction method for constrained optimization problems with nonsmooth objective functions European Journal of Operational Research. 218: 28-37. DOI: 10.1016/j.ejor.2011.10.055  0.92
2012 Tang C, Gao S. Leakproof secret sharing protocols with applications to group identification scheme Science China Information Sciences. 55: 1172-1185. DOI: 10.1007/s11432-011-4480-8  0.92
2012 Teng JK, Wu CK, Tang CM. An ID-based authenticated dynamic group key agreement with optimal round Science China Information Sciences. 55: 2542-2554. DOI: 10.1007/s11432-011-4381-x  0.92
2012 Wu H, Tang C, Feng R. A new model of binary elliptic curves Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7668: 399-411. DOI: 10.1007/978-3-642-34931-7_23  0.92
2012 Song C, Xu M, Tang C. Pseudorandom generators based on subcovers for finite groups Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7537: 379-392. DOI: 10.1007/978-3-642-34704-7-26  0.92
2012 Wang B, Tang C, Yang Y. A new model of elliptic curves with effective and fast arithmetic Journal of Computational Information Systems. 8: 4061-4067.  0.92
2011 Liang CP, Wierwille J, Moreira T, Schwartzbauer G, Jafri MS, Tang CM, Chen Y. A forward-imaging needle-type OCT probe for image guided stereotactic procedures. Optics Express. 19: 26283-94. PMID 22274213  0.56
2011 Yang S, Papagiakoumou E, Guillon M, de Sars V, Tang CM, Emiliani V. Three-dimensional holographic photostimulation of the dendritic arbor. Journal of Neural Engineering. 8: 046002. PMID 21623008 DOI: 10.1088/1741-2560/8/4/046002  0.56
2011 Liang CW, Mohammadi M, Santos MD, Santos MD, Tang CM. Patterned photostimulation with digital micromirror devices to investigate dendritic integration across branch points. Journal of Visualized Experiments : Jove. PMID 21403635 DOI: 10.3791/2003  0.56
2011 Xie D, Tang C. Electronic protocols for voting and bidding based on secure multi-party proof Advanced Materials Research. 171: 305-310. DOI: 10.4028/www.scientific.net/AMR.171-172.305  0.92
2011 Dai SG, Tang CM, Chen YN. The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution) Acm International Conference Proceeding Series. 43-48. DOI: 10.1145/2070425.2070435  0.92
2011 Qi Y, Xu M, Tang C. An improved algorithm for computing 2P Q on elliptic curves 2011 Ieee International Conference On Cyber Technology in Automation, Control, and Intelligent Systems, Cyber 2011. 122-125. DOI: 10.1109/CYBER.2011.6011776  0.92
2011 Tang C, Xu M, Qi Y. Faster pairing computation on genus 2 hyperelliptic curves Information Processing Letters. 111: 494-499. DOI: 10.1016/j.ipl.2011.02.011  0.92
2011 Tang CM, Jian JB, Li GY. A working set SQCQP algorithm with simple nonmonotone penalty parameters Journal of Computational and Applied Mathematics. 236: 1382-1398. DOI: 10.1016/j.cam.2011.09.002  0.92
2011 Tang C, Shi G, Yao Z. Secure multi-party computation protocol for sequencing problem Science China Information Sciences. 54: 1654-1662. DOI: 10.1007/s11432-011-4272-1  0.92
2011 Zhang JZ, Jian JB, Tang CM. Inverse problems and solution methods for a class of nonlinear complementarity problems Computational Optimization and Applications. 49: 271-297. DOI: 10.1007/s10589-009-9294-x  0.92
2011 Zeng YF, Bai YQ, Jian JB, Tang CM. Two new predictor-corrector algorithms for second-order cone programming Applied Mathematics and Mechanics (English Edition). 32: 521-532. DOI: 10.1007/s10483-011-1435-x  0.92
2010 He J, Li X, Li L, Tang C. A new forward-secure proxy signature scheme Proceedings - 2010 International Forum On Information Technology and Applications, Ifita 2010. 2: 30-33. DOI: 10.1109/IFITA.2010.49  0.92
2010 He J, Li X, Li L, Tang C. A new secret sharing scheme based on commutative encrypted function Proceedings - 2010 International Forum On Information Technology and Applications, Ifita 2010. 2: 27-29. DOI: 10.1109/IFITA.2010.48  0.92
2010 Tang C, Xie D. The existence of linear code for any access structure 2010 2nd International Conference On Computer Engineering and Applications, Iccea 2010. 1: 113-116. DOI: 10.1109/ICCEA.2010.29  0.92
2010 He J, Li L, Li X, Tang C. Verifiable multi-secret sharing schemes from homogeneous linear recursion 2010 2nd International Conference On E-Business and Information System Security, Ebiss2010. 370-373. DOI: 10.1109/EBISS.2010.5473686  0.92
2010 Tang C, Hao Z. Perfect zero-knowledge argument of knowledge with negligible error probability in two-round for NP from any one-way permutation 2010 Wri International Conference On Communications and Mobile Computing, Cmc 2010. 1: 41-45. DOI: 10.1109/CMC.2010.281  0.92
2010 Tang Y, Tang C. Efficient round-optimal secure two-party computation from ∑-protocol 2010 Wri International Conference On Communications and Mobile Computing, Cmc 2010. 1: 26-30. DOI: 10.1109/CMC.2010.280  0.92
2010 Jian JB, Tang CM, Zheng HY. Sequential quadratically constrained quadratic programming norm-relaxed algorithm of strongly sub-feasible directions European Journal of Operational Research. 200: 645-657. DOI: 10.1016/j.ejor.2009.01.052  0.92
2010 Li G, Tang C, Wei Z. Error bound results for generalized D-gap functions of nonsmooth variational inequality problems Journal of Computational and Applied Mathematics. 233: 2795-2806. DOI: 10.1016/j.cam.2009.11.025  0.92
2010 Zheng HY, Jian JB, Tang CM, Quan R. A new norm-relaxed SQP algorithm with global convergence Applied Mathematics Letters. 23: 670-675. DOI: 10.1016/j.aml.2010.02.005  0.92
2010 Qi Y, Jia D, Tang C, Xu M. Optimal multiplication algorithm for the ηT pairing over F36m Beijing Daxue Xuebao (Ziran Kexue Ban)/Acta Scientiarum Naturalium Universitatis Pekinensis. 46: 749-755.  0.92
2010 Tang C, Qi Y, Xu M. Implementing optimal pairings over Brezing-Weng elliptic curves with k=18 Beijing Daxue Xuebao (Ziran Kexue Ban)/Acta Scientiarum Naturalium Universitatis Pekinensis. 46: 743-748.  0.92
2010 Xu M, Yu H, Tang C, Qi Y. The pairing computation on binary Edwards curves Beijing Daxue Xuebao (Ziran Kexue Ban)/Acta Scientiarum Naturalium Universitatis Pekinensis. 46: 736-742.  0.92
2009 Jafri MS, Tang R, Tang CM. Optical coherence tomography guided neurosurgical procedures in small rodents. Journal of Neuroscience Methods. 176: 85-95. PMID 18838087 DOI: 10.1016/j.jneumeth.2008.08.038  0.56
2009 Liu M, Xie D, Li P, Zhang X, Tang C. Semantic access control for web services Proceedings - International Conference On Networks Security, Wireless Communications and Trusted Computing, Nswctc 2009. 2: 55-58. DOI: 10.1109/NSWCTC.2009.389  0.92
2009 Gao CZ, Tang C, Yao ZA, Xie D. Adaptively secure on-line/off-line threshold signatures Proceedings - International Conference On Networks Security, Wireless Communications and Trusted Computing, Nswctc 2009. 2: 508-511. DOI: 10.1109/NSWCTC.2009.354  0.92
2009 Li P, Liu M, Zhang F, Tang C. An improved anti-spam method tomo based on challenge-response technology 2009 International Symposium On Intelligent Ubiquitous Computing and Education, Iuce 2009. 113-116. DOI: 10.1109/IUCE.2009.98  0.92
2009 Tang C, Yao ZA. Definition and construction of multi-prover zero-knowledge argument Proceedings - 2009 Wri International Conference On Communications and Mobile Computing, Cmc 2009. 3: 375-379. DOI: 10.1109/CMC.2009.264  0.92
2009 Jian Jb, Ke Xy, Zheng Hy, Tang Cm. A method combining norm-relaxed QP subproblems with systems of linear equations for constrained optimization Journal of Computational and Applied Mathematics. 223: 1013-1027. DOI: 10.1016/j.cam.2008.03.048  0.92
2009 Tang C, Yao ZA. Several cryptographic applications of ∑-protocol Journal of Systems Science and Complexity. 22: 260-279. DOI: 10.1007/s11424-009-9162-x  0.92
2009 Gao CZ, Wei B, Xie D, Tang C. Divisible on-line/Off-line signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5473: 148-163. DOI: 10.1007/978-3-642-00862-7_10  0.92
2009 Gao CZ, Wei B, Xie D, Tang C. How to construct efficient on-line/off-line threshold signature schemes through the simulation approach Concurrency Computation Practice and Experience. 21: 1351-1372. DOI: 10.1002/cpe.1438  0.92
2009 Tang CM, Pei DY, Zhao YM, Shi GH. Publicly verifiable secret sharing scheme with information-theoretic security Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering. 26: 121-126.  0.92
2008 Yang XZ, Tang CM, Liu ZL, Yao YY, Li RX, Wu DC. [Measurement and analysis of nanometer particles of silica and carbon black by diffuse reflection FTIR spectra]. Guang Pu Xue Yu Guang Pu Fen Xi = Guang Pu. 28: 291-4. PMID 18479006  0.36
2008 Tang C, Pei D, Yao ZA. 5-round computational zero-knowledge proof with negligible error probability for any NP from any one-way permutation Proceedings of the International Symposium On Electronic Commerce and Security, Isecs 2008. 407-411. DOI: 10.1109/ISECS.2008.88  0.92
2008 Tang C, Yao ZA. A new (t, n)-threshold secret sharing scheme Proceedings - 2008 International Conference On Advanced Computer Theory and Engineering, Icacte 2008. 920-924. DOI: 10.1109/ICACTE.2008.139  0.92
2008 Jian JB, Tang CM, Hu QJ, Zheng HY. A new superlinearly convergent strongly subfeasible sequential quadratic programming algorithm for inequality-constrained optimization Numerical Functional Analysis and Optimization. 29: 376-409. DOI: 10.1080/01630560802000918  0.92
2008 Tang CM, Jian JB. A sequential quadratically constrained quadratic programming method with an augmented Lagrangian line search function Journal of Computational and Applied Mathematics. 220: 525-547. DOI: 10.1016/j.cam.2007.09.024  0.92
2008 Tang C, Pei D, Wang X, Liu Z. Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs Science in China, Series F: Information Sciences. 51: 128-144. DOI: 10.1007/s11432-008-0003-7  0.92
2008 Li G, Tang C, Yu G, Wei Z. On a separation principle for nonconvex sets Set-Valued Analysis. 16: 851-860. DOI: 10.1007/s11228-008-0099-3  0.92
2007 Tang C, Pei D, Yao ZA. Efficient zaps and signatures of knowledge Proceedings - 2007 International Conference On Computational Intelligence and Security, Cis 2007. 637-641. DOI: 10.1109/CIS.2007.126  0.92
2007 Jian JB, Zeng YF, Tang CM. A generalized super-memory gradient projection method of strongly sub-feasible directions with strong convergence for nonlinear inequality constrained optimization Computers and Mathematics With Applications. 54: 507-524. DOI: 10.1016/j.camwa.2007.01.016  0.92
2007 Li G, Tang C, Wei Z. New conjugacy condition and related new conjugate gradient methods for unconstrained optimization Journal of Computational and Applied Mathematics. 202: 523-539. DOI: 10.1016/j.cam.2006.03.005  0.92
2007 Tang Cm, Wei Zx, Li Gy. A new version of the Liu-Storey conjugate gradient method Applied Mathematics and Computation. 189: 302-313. DOI: 10.1016/j.amc.2006.11.098  0.92
2007 Tang C. An improved identity-based society oriented signature scheme with anonymous signers Wuhan University Journal of Natural Sciences. 12: 121-125. DOI: 10.1007/s11859-006-0212-0  0.92
2007 Jian JB, Hu QJ, Tang CM, Zheng HY. A sequential quadratically constrained quadratic programming method of feasible directions Applied Mathematics and Optimization. 56: 343-363. DOI: 10.1007/s00245-007-9010-0  0.92
2007 Hu QJ, Jian JB, Zheng HV, Tang CM. Semilocal E-convexity and semilocal E-convex programming Bulletin of the Australian Mathematical Society. 75: 59-74.  0.92
2006 Tang CM. Photolysis of caged neurotransmitters: theory and procedures for light delivery. Current Protocols in Neuroscience / Editorial Board, Jacqueline N. Crawley ... [Et Al.]. Unit 6.21. PMID 18428643 DOI: 10.1002/0471142301.ns0621s37  0.56
2006 Jian JB, Zheng HY, Tang CM, Hu QJ. A new superlinearly convergent norm-relaxed method of strongly sub-feasible direction for inequality constrained optimization Applied Mathematics and Computation. 182: 955-976. DOI: 10.1016/j.amc.2006.04.050  0.92
2005 Jian J, Zheng H, Hu Q, Tang C. A new norm-relaxed method of strongly sub-feasible direction for inequality constrained optimization Applied Mathematics and Computation. 168: 1-28. DOI: 10.1016/j.amc.2004.08.009  0.92
2001 Tang CM. Rapid solution application methods. Current Protocols in Neuroscience / Editorial Board, Jacqueline N. Crawley ... [Et Al.]. Unit 6.9. PMID 18428519 DOI: 10.1002/0471142301.ns0100s05  0.56
Show low-probability matches.