Shiyuan Xu

Orcid: 0000-0001-9076-1695

According to our database1, Shiyuan Xu authored at least 21 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A blockchain-based log storage model with efficient query.
Soft Comput., October, 2023

AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain.
Comput. Networks, April, 2023

AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios.
IACR Cryptol. ePrint Arch., 2023

Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications.
IACR Cryptol. ePrint Arch., 2023

Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications.
IACR Cryptol. ePrint Arch., 2023

An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET.
Peer-to-Peer Netw. Appl., 2022

A Novel Post-Quantum Blind Signature for Log System in Blockchain.
Comput. Syst. Sci. Eng., 2022

Securer and Faster Privacy-Preserving Distributed Machine Learning.
CoRR, 2022

A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios.
Comput. Networks, 2022

AQ-ABS: Anti-Quantum Attribute-based Signature for EMRs Sharing with Blockchain.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

CA-Free Real-Time Fuzzy Digital Signature Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

LFS-AS: Lightweight Forward Secure Aggregate Signature for e-Health Scenarios.
Proceedings of the IEEE International Conference on Communications, 2022

ShoeMaster: A Benchmark for Sketch2Image Translation of Shoes.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2022

2021
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

LPPA: A Lightweight Privacy-Preserving Authentication Scheme for the Internet of Drones.
Proceedings of the 21st International Conference on Communication Technology, 2021

2013
The risk scenario analysis of typhoon gale in eastern coastal area of China.
Proceedings of the 21st International Conference on Geoinformatics, 2013

2010
Vulnerability assessment of combined impacts of sea level rise and coastal flooding for China's coastal region using remote sensing and GIS.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010


  Loading...