Rui Xu

Affiliations:
  • KDDI Research, Inc., Japan
  • Kyushu University, Graduate School of Mathematics, Japan (former)


According to our database1, Rui Xu authored at least 17 papers between 2013 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Secret Sharing with Cheaters Using Multi-Receiver Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Comput. Secur., 2017

Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Proceedings of the Advances in Information and Computer Security, 2017

VIGraph - A Framework for Verifiable Information.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Hypercubes and Private Information Retrieval.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

An Experimental Study of the BDD Approach for the Search LWE Problem.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
User-in-a-context: A blueprint for context-aware identification.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Note on Some Recent Cheater Identifiable Secret Sharing Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters.
IACR Cryptol. ePrint Arch., 2015

2014
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014

An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication.
Proceedings of the Advances in Information and Computer Security, 2014

2013
Secure k-NN query on encrypted cloud database without key-sharing.
Int. J. Electron. Secur. Digit. Forensics, 2013

On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.
Proceedings of the Advances in Information and Computer Security, 2013

Secure k-NN computation on encrypted cloud data without sharing key with query users.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013


  Loading...