Xinyi Huang

According to our database1, Xinyi Huang
  • authored at least 151 papers between 2005 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Information Forensics and Security, 2018

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Networking and Applications, 2018

A matrix-based cross-layer key establishment protocol for smart homes.
Inf. Sci., 2018

Bitcoin-based fair payments for outsourcing computations of fog devices.
Future Generation Comp. Syst., 2018

Security and Privacy for the Internet of Drones: Challenges and Solutions.
IEEE Communications Magazine, 2018

2017
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks.
Wireless Personal Communications, 2017

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

Zipf's Law in Passwords.
IEEE Trans. Information Forensics and Security, 2017

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
IEEE Trans. Information Forensics and Security, 2017

Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Information Forensics and Security, 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embedded Comput. Syst., 2017

Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Sec. Comput., 2017

On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Sec. Comput., 2017

A Generic Table Recomputation-Based Higher-Order Masking.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

Dual trapdoor identity-based encryption with keyword search.
Soft Comput., 2017

Self-adaptive trust management based on game theory in fuzzy large-scale networks.
Soft Comput., 2017

Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Systems Journal, 2017

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Security and Communication Networks, 2017

Erratum to: Special issue on security and privacy for smart cities.
Personal and Ubiquitous Computing, 2017

Special issue on security and privacy for smart cities.
Personal and Ubiquitous Computing, 2017

A new universal designated verifier transitive signature scheme for big graph data.
J. Comput. Syst. Sci., 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Generation Comp. Syst., 2017

Offline/online attribute-based encryption with verifiable outsourced decryption.
Concurrency and Computation: Practice and Experience, 2017

Editorial: Special issue on security data science and cyber threat management.
Computers & Security, 2017

A Practical Authentication Protocol for Anonymous Web Browsing.
Proceedings of the Information Security Practice and Experience, 2017

Linearly Homomorphic Signatures with Designated Entities.
Proceedings of the Information Security Practice and Experience, 2017

Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Password-Authenticated Group Key Exchange: A Cross-Layer Design.
ACM Trans. Internet Techn., 2016

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Information Forensics and Security, 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Information Forensics and Security, 2016

Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Information Forensics and Security, 2016

Hierarchical and Shared Access Control.
IEEE Trans. Information Forensics and Security, 2016

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Security and Communication Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Security and Communication Networks, 2016

Certificate-based encryption resilient to key leakage.
Journal of Systems and Software, 2016

Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016

Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing.
Future Generation Comp. Syst., 2016

Improved handover authentication and key pre-distribution for wireless mesh networks.
Concurrency and Computation: Practice and Experience, 2016

An overview of Fog computing and its security issues.
Concurrency and Computation: Practice and Experience, 2016

Practical Attribute-based Signature: Traceability and Revocability.
Comput. J., 2016

An Efficient Certificate-Based Designated Verifier Signature Scheme.
Computing and Informatics, 2016

Distributed Bitcoin Account Management.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Trust Enhancement over Range Search for Encrypted Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Anonymizing Bitcoin Transaction.
Proceedings of the Information Security Practice and Experience, 2016

Targeted Online Password Guessing: An Underestimated Threat.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Information Forensics and Security, 2015

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Information Forensics and Security, 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Information Forensics and Security, 2015

Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommunication Systems, 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Sec. Comput., 2015

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Computing, 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015

New attribute-based authentication and its application in anonymous cloud access service.
IJWGS, 2015

Security and privacy of electronic health information systems.
Int. J. Inf. Sec., 2015

Batch public auditing for distributed mobile cloud computing.
IJHPCN, 2015

Cooperative attribute-based access control for enterprise computing system.
IJES, 2015

Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.
IJAHUC, 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptology ePrint Archive, 2015

Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption.
Future Generation Comp. Syst., 2015

A Forward-Secure Certificate-Based Signature Scheme.
Comput. J., 2015

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015

Revocable Threshold Attribute-Based Signature against Signing Key Exposure.
Proceedings of the Information Security Practice and Experience, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015

The Analysis of Relationship between Diabetes and Cancer from 2006-2013 Hospital Inpatients.
Proceedings of the HEALTHINF 2015, 2015

2014
Provably Secure Group Key Management Approach Based upon Hyper-Sphere.
IEEE Trans. Parallel Distrib. Syst., 2014

Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distrib. Syst., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distrib. Syst., 2014

Special issue on applied cryptography for information and communication networks.
Security and Communication Networks, 2014

A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intelligence and Humanized Computing, 2014

SA3: Self-adaptive anonymous authentication for dynamic authentication policies.
Future Generation Comp. Syst., 2014

Advances in secure and intelligent data processing.
Concurrency and Computation: Practice and Experience, 2014

Ticket-based handoff authentication for wireless mesh networks.
Computer Networks, 2014

GO-ABE: Group-Oriented Attribute-Based Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

Identity-Based Transitive Signcryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerging Topics Comput., 2013

Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptology ePrint Archive, 2013

Data dynamics for remote data possession checking in cloud storage.
Computers & Electrical Engineering, 2013

A Secure Cloud Storage System from Threshold Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Attribute-Based Signatures with Efficient Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013

2012
Enhanced authentication for commercial video services.
Security and Communication Networks, 2012

Further observation on proxy re-encryption with keyword search.
Journal of Systems and Software, 2012

Strongly secure certificateless short signatures.
Journal of Systems and Software, 2012

An efficient short certificate-based signature scheme.
Journal of Systems and Software, 2012

Certificate-based signcryption with enhanced security features.
Computers & Mathematics with Applications, 2012

A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

Certificateless Signatures: New Schemes and Security Models.
Comput. J., 2012

Efficient Escrow-Free Identity-Based Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Verifier-local revocation group signatures with time-bound keys.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2011

Efficient and short certificateless signatures secure against realistic adversaries.
The Journal of Supercomputing, 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Information Forensics and Security, 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE Journal on Selected Areas in Communications, 2011

Provably secure server-aided verification signatures.
Computers & Mathematics with Applications, 2011

2010
Constructions of certificate-based signature secure against key replacement attacks.
Journal of Computer Security, 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks.
IJSN, 2010

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

2009
Certificate-based Signatures Revisited.
J. UCS, 2009

An efficient anonymous proxy signature scheme with provable security.
Computer Standards & Interfaces, 2009

2008
Cryptanalysis and improvement of an efficient certificateless signature scheme.
Journal of Communications and Networks, 2008

Short Designated Verifier Signature Scheme and Its Identity-based Variant.
I. J. Network Security, 2008

Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec., 2008

Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Server-Aided Verification Signatures: Definitions and New Constructions.
Proceedings of the Provable Security, Second International Conference, 2008

Identity-Based On-Line/Off-Line Signcryption.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Further Observations on Certificateless Public Key Encryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Efficient and Short Certificateless Signature.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.
J. Comput. Sci. Technol., 2007

Nominative Signature: Application, Security Model and Construction.
IACR Cryptology ePrint Archive, 2007

Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Generic Construction for Universally-Convertible Undeniable Signatures.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Identity-Based Proxy Signature from Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Certificateless Signature Revisited.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
IACR Cryptology ePrint Archive, 2006

Restricted Universal Designated Verifier Signature.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Proxy Signature Without Random Oracles.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Short (Identity-Based) Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2006

Universal Designated Verifier Signature Without Delegatability.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Certificateless Designated Verifier Signature Schemes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004.
IACR Cryptology ePrint Archive, 2005

Efficient Broadcast from Trapdoor Functions.
Proceedings of the Applied Public Key Infrastructure, 2005

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Short Designated Verifier Proxy Signature from Pairings.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...