Xun Yi

Orcid: 0000-0001-7351-5724

According to our database1, Xun Yi authored at least 259 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Robust and Secure Data Access Scheme for Satellite-Assisted Internet of Things With Content Adaptive Addressing.
IEEE Internet Things J., April, 2024

Fast and private multi-dimensional range search over encrypted data.
Inf. Sci., January, 2024

QARMA-FL: Quality-Aware Robust Model Aggregation for Mobile Crowdsourcing.
IEEE Internet Things J., January, 2024

Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation.
IEEE Internet Things J., January, 2024

Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System.
IEEE Trans. Sustain. Comput., 2024

Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems.
IEEE Trans. Emerg. Top. Comput., 2024

SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2024

Online Anomaly Detection over Live Social Video Streaming.
CoRR, 2024

2023
Privacy-preserving recommendation system based on user classification.
J. Inf. Secur. Appl., December, 2023

A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., October, 2023

A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data.
World Wide Web (WWW), September, 2023

A non-invasive method for the cataloguing and authentication of surveillance video using on-camera blockchain participation, machine learning and signal analysis.
Forensic Sci. Int. Digit. Investig., September, 2023

Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition.
IEEE Trans. Knowl. Data Eng., July, 2023

Trustworthy Privacy-Preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 With Blockchain.
IEEE Trans. Ind. Informatics, July, 2023

Password-authenticated proofs of retrievability for multiple devices checking cloud data.
J. Inf. Secur. Appl., June, 2023

Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023

Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2023

Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things.
IEEE Trans. Ind. Informatics, 2023

Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization.
IEEE Trans. Dependable Secur. Comput., 2023

Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques.
IEEE Trans. Dependable Secur. Comput., 2023

Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat.
IEEE Internet Things J., 2023

A Multi-Client Searchable Encryption Scheme for IoT Environment.
CoRR, 2023

TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted Data.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

TimeClave: Oblivious In-Enclave Time Series Processing System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Committed Private Information Retrieval.
Proceedings of the Computer Security - ESORICS 2023, 2023

Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

A Comparative Study on Design and Usability of Cryptographic Libraries.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022

A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living.
ACM Trans. Internet Techn., 2022

PeGraph: A System for Privacy-Preserving and Efficient Search Over Encrypted Social Graphs.
IEEE Trans. Inf. Forensics Secur., 2022

Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-Preserving Collaborative Analytics on Medical Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022

SMPC-Based Federated Learning for 6G-Enabled Internet of Medical Things.
IEEE Netw., 2022

Range search on encrypted spatial data with dynamic updates.
J. Comput. Secur., 2022

Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments.
Inf. Process. Lett., 2022

Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022

Blockchain-Based Secure and Lightweight Authentication for Internet of Things.
IEEE Internet Things J., 2022

ANT-Centric IoT Security Reference Architecture - Security-by-Design for Satellite-Enabled Smart Cities.
IEEE Internet Things J., 2022

Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs.
IEEE Internet Things J., 2022

Protecting Private Information for Two Classes of Aggregated Database Queries.
Informatics, 2022

Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions.
IACR Cryptol. ePrint Arch., 2022

Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home.
IACR Cryptol. ePrint Arch., 2022

Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization.
IACR Cryptol. ePrint Arch., 2022

Social Media Identity Deception Detection: A Survey.
ACM Comput. Surv., 2022

Ancestral Colorings of Perfect Binary Trees With Applications in Private Retrieval of Merkle Proofs.
CoRR, 2022

Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures.
CoRR, 2022

Forward-Secure Edge Authentication for Graphs.
Comput. J., 2022

An Efficient Clustering-Based Privacy-Preserving Recommender System.
Proceedings of the Network and System Security - 16th International Conference, 2022

Efficient Hash-Based Redactable Signature for Smart Grid Applications.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Privacy Preserving Location-Aware Personalized Web Service Recommendations.
IEEE Trans. Serv. Comput., 2021

Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code.
IEEE J. Biomed. Health Informatics, 2021

A distributed networked system for secure publicly verifiable self-tallying online voting.
Inf. Sci., 2021

Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT.
IEEE Internet Things J., 2021

Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability.
IACR Cryptol. ePrint Arch., 2021

Collusion-resistant protocols for private processing of aggregated queries in distributed databases.
Distributed Parallel Databases, 2021

Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System.
IEEE Commun. Mag., 2021

Two-Factor Decryption: A Better Way to Protect Data Security and Privacy.
Comput. J., 2021

Secure Ranked Choice Online Voting System via Intel SGX and Blockchain.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

A Usability Study of Cryptographic API Design.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

OblivSketch: Oblivious Network Measurement as a Cloud Service.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

NPS-AntiClone: Identity Cloning Detection based on Non-Privacy-Sensitive User Profile Data.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

Privacy-Aware Identity Cloning Detection Based on Deep Forest.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

[inline-graphic not available: see fulltext] : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service.
Proceedings of the Computer Security - ESORICS 2021, 2021

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

Efficient Privacy-Preserving User Matching with Intel SGX.
Proceedings of the Broadband Communications, Networks, and Systems, 2021

2020
Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud.
IEEE Trans. Parallel Distributed Syst., 2020

Privacy-Preserving User Profile Matching in Social Networks.
IEEE Trans. Knowl. Data Eng., 2020

Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2020

A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
Secur. Commun. Networks, 2020

Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption.
J. Parallel Distributed Comput., 2020

Lightweight privacy preservation for secondary users in cognitive radio networks.
J. Netw. Comput. Appl., 2020

Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities.
Future Gener. Comput. Syst., 2020

Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption.
Eng. Appl. Artif. Intell., 2020

A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds.
IEEE Access, 2020

Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

Practical Anonymous Subscription with Revocation Based on Broadcast Encryption.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Online Community Identification over Heterogeneous Attributed Directed Graphs.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

BACC: Blockchain-Based Access Control For Cloud Data.
Proceedings of the Australasian Computer Science Week, 2020

SGX-based Users Matching with Privacy Protection.
Proceedings of the Australasian Computer Science Week, 2020

2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Veh. Commun., 2019

Context-Driven Granular Disclosure Control for Internet of Things Applications.
IEEE Trans. Big Data, 2019

Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification.
Secur. Commun. Networks, 2019

Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform.
Knowl. Based Syst., 2019

面向云环境的多关键词密文排序检索研究综述 (Research on Multi-keyword Ranked Search over Encrypted Cloud Data).
计算机科学, 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019

Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities.
J. Parallel Distributed Comput., 2019

Privacy-preserving aggregation for cooperative spectrum sensing.
J. Netw. Comput. Appl., 2019

Semantic-aware multi-keyword ranked search scheme over encrypted cloud data.
J. Netw. Comput. Appl., 2019

A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems.
Int. J. Inf. Manag., 2019

A multistage protocol for aggregated queries in distributed cloud databases with privacy protection.
Future Gener. Comput. Syst., 2019

Off-line digital cash schemes providing untraceability, anonymity and change.
Electron. Commer. Res., 2019

A new privacy-preserving authentication protocol for anonymous web browsing.
Concurr. Comput. Pract. Exp., 2019

An efficient privacy-preserving protocol for database-driven cognitive radio networks.
Ad Hoc Networks, 2019

An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Access, 2019

Secure Edge of Things for Smart Healthcare Surveillance Framework.
IEEE Access, 2019

A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data.
Proceedings of the Network and Parallel Computing, 2019

Privacy-Preserving MAX/MIN Query Processing for WSN -as-a -Service.
Proceedings of the 2019 IFIP Networking Conference, 2019

ADS4all: Democratizing Authenticated Data Structures.
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019

A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.
Proceedings of the Computer Security - ESORICS 2019, 2019

Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping.
Proceedings of the Computer Security - ESORICS 2019, 2019

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
Private Information Retrieval.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Computing Hierarchical Summary from Two-Dimensional Big Data Streams.
IEEE Trans. Parallel Distributed Syst., 2018

Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018

Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds.
Secur. Commun. Networks, 2018

面向云环境的一致性可验证单关键词检索方法 (Integrity-verifying Single Keyword Search Method in Clouds).
计算机科学, 2018

Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller.
J. Discrete Algorithms, 2018

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
IACR Cryptol. ePrint Arch., 2018

A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018

Minimal ensemble based on subset selection using ECG to diagnose categories of CAN.
Comput. Methods Programs Biomed., 2018

A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption.
IEEE Access, 2018

A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security.
IEEE Access, 2018

Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks.
IEEE Access, 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking.
IEEE Access, 2018

An Improved Lightweight RFID Authentication Protocol for Internet of Things.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018

An Online Estimation Algorithm of State-of-Charge of Lithium-Ion Batteries.
Proceedings of the IECON 2018, 2018

Using Blockchain to Control Access to Cloud Data.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data.
Secur. Commun. Networks, 2017

Efficient and privacy-aware multi-party classification protocol for human activity recognition.
J. Netw. Comput. Appl., 2017

Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.
J. Comput. Syst. Sci., 2017

Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure.
IET Wirel. Sens. Syst., 2017

Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change.
IACR Cryptol. ePrint Arch., 2017

Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation.
Future Gener. Comput. Syst., 2017

Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks.
IEEE Access, 2017

A Verifiable Ranked Choice Internet Voting System.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Fuzzy Public-Key Encryption Based on Biometric Data.
Proceedings of the Provable Security, 2017

Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Private Recommendations Generation for Vertically Partitioned Datasets.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller.
Proceedings of the Combinatorial Algorithms - 28th International Workshop, 2017

A Practical Authentication Protocol for Anonymous Web Browsing.
Proceedings of the Information Security Practice and Experience, 2017

Privacy Preserving User-Based Recommender System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy.
IEEE Trans. Knowl. Data Eng., 2016

Private Cell Retrieval From Data Warehouses.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy Protection for Wireless Medical Sensor Data.
IEEE Trans. Dependable Secur. Comput., 2016

ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

Editorial of special issue on security and privacy in cloud computing.
J. Inf. Secur. Appl., 2016

VP<sup>2</sup>RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks.
Int. J. Distributed Sens. Networks, 2016

A Practical Privacy-Preserving Recommender System.
Data Sci. Eng., 2016

Protecting outsourced data in cloud computing through access management.
Concurr. Comput. Pract. Exp., 2016

Secure Data Analytics for Cloud-Integrated Internet of Things Applications.
IEEE Cloud Comput., 2016

Securing Body Sensor Network with ECG.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

Practical privacy-preserving user profile matching in social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
IACR Cryptol. ePrint Arch., 2015

Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.
IEEE Cloud Comput., 2015

Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Memetic Algorithm for Dynamic Shortest Path Routing on Mobile Ad-hoc Networks.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Optical quantum computing.
Proceedings of the 11th International Conference on Natural Computation, 2015

Quantum Boson-Sampling Machine.
Proceedings of the 11th International Conference on Natural Computation, 2015

Practical Threshold Password-Authenticated Secret Sharing Protocol.
Proceedings of the Computer Security - ESORICS 2015, 2015

Privacy-Preserving and Outsourced Multi-user K-Means Clustering.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Privacy-Preserving Association Rule Mining in Cloud Computing.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Homomorphic Encryption and Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12229-8, 2014

Privacy-Preserving and Content-Protecting Location Based Queries.
IEEE Trans. Knowl. Data Eng., 2014

Private Searching on Streaming Data Based on Keyword Frequency.
IEEE Trans. Dependable Secur. Comput., 2014

An Enhanced Quantum PageRank Algorithm Integrated with Quantum Search.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Practical k nearest neighbor queries with location privacy.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

ID-Based Two-Server Password-Authenticated Key Exchange.
Proceedings of the Computer Security - ESORICS 2014, 2014

Positive Influence Dominating Set Games.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

Privacy of outsourced k-means clustering.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Private Information Retrieval
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02337-8, 2013

Efficient Two-Server Password-Only Authenticated Key Exchange.
IEEE Trans. Parallel Distributed Syst., 2013

Single-Database Private Information Retrieval from Fully Homomorphic Encryption.
IEEE Trans. Knowl. Data Eng., 2013

Performing Stateful Logic on Memristor Memory.
IEEE Trans. Circuits Syst. II Express Briefs, 2013

Practical Internet voting system.
J. Netw. Comput. Appl., 2013

Equally contributory privacy-preserving k-means clustering over vertically partitioned data.
Inf. Syst., 2013

Hamming network circuits based on CMOS/memristor hybrid design.
IEICE Electron. Express, 2013

Multi-level programming of memristor in nanocrossbar.
IEICE Electron. Express, 2013

Privacy-Preserving Wireless Medical Sensor Network.
Proceedings of the 12th IEEE International Conference on Trust, 2013

(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Private data warehouse queries.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Multiparty privacy protection for electronic health records.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting.
IEEE Trans. Dependable Secur. Comput., 2012

Executing SQL queries over encrypted character strings in the Database-As-Service model.
Knowl. Based Syst., 2012

Fully homomorphic encryption based two-party association rule mining.
Data Knowl. Eng., 2012

Private (t, n) Threshold Searching on Streaming Data.
Proceedings of the 2012 International Conference on Privacy, 2012

Identity-based Password-Authenticated Key Exchange for Client/Server Model.
Proceedings of the SECRYPT 2012, 2012

A projective clustering algorithm based on significant local dense areas.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

2011
Modeling user hidden navigational behavior for Web recommendation.
Web Intell. Agent Syst., 2011

Efficient and short certificateless signatures secure against realistic adversaries.
J. Supercomput., 2011

Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree.
Int. J. Inf. Secur. Priv., 2011

Private searching for single and conjunctive keywords on streaming data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Three-party Password-authenticated Key Exchange without Random Oracles.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Classification of Privacy-preserving Distributed Data Mining protocols.
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011

Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Practical Remote End-to-End Voting Scheme.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

Secure Two-Party Association Rule Mining.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
Wireless broadcast encryption based on smart cards.
Wirel. Networks, 2010

Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices
CoRR, 2010

Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Certificateless Proxy Signature and Its Extension to Blind Signature.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Design and Analysis of "Flexible" <i>k</i>-out-of-<i>n</i> Signatures.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers.
Inf. Syst., 2009

Distributed Association Rule Mining with Minimum Communication Overhead.
Proceedings of the Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, 2009

2008
Efficient broadcast key distribution with dynamic revocation.
Secur. Commun. Networks, 2008

Efficient convertible Limited Verifier Signatures.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Modelling User Behaviour for Web Recommendation Using LDA Model.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

Efficient and Short Certificateless Signature.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Secure Wireless Sensor Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
ID-Based Group Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2007

Privacy-preserving distributed association rule mining via semi-trusted mixer.
Data Knowl. Eng., 2007

Directed Transitive Signature Scheme.
Proceedings of the Topics in Cryptology, 2007

ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Secure Electronic Voting for Mobile Communications.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

2005
Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme.
IEEE Trans. Knowl. Data Eng., 2005

Hash function based on chaotic tent maps.
IEEE Trans. Circuits Syst. II Express Briefs, 2005

2004
Identity-Based Fault-Tolerant Conference Key Agreement.
IEEE Trans. Dependable Secur. Comput., 2004

Authenticated key agreement in dynamic peer groups.
Theor. Comput. Sci., 2004

2003
A secure conference scheme for mobile communications.
IEEE Trans. Wirel. Commun., 2003

A secure and efficient conference scheme for mobile communications.
IEEE Trans. Veh. Technol., 2003

Security of Park-Lim key agreement schemes for VSAT satellite communications.
IEEE Trans. Veh. Technol., 2003

Performance and attention in multiagent object search team.
IEEE Trans. Syst. Man Cybern. Part A, 2003

Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy.
IEEE Trans. Knowl. Data Eng., 2003

A New Provably Secure Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

On the <i>n</i>-th Order Shift Register Based Discrete Logarithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

An identity-based signature scheme from the Weil pairing.
IEEE Commun. Lett., 2003

A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Veh. Technol., 2002

ID-based key agreement for multimedia encryption.
IEEE Trans. Consumer Electron., 2002

New Signature Schemes Based on 3rd Order Shift Registers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Collective perception in massive, open, and heterogeneous multi-agent environment.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
Fast encryption for multimedia.
IEEE Trans. Consumer Electron., 2001

Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases.
Proceedings of the E-Commerce Agents, 2001

Signature Schemes Based on 3rd Order Shift Registers.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments.
Distributed Parallel Databases, 2000

Agent-Mediated Internet Advertising.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

Improving Object Oriented Analysis by Explicit Change Analysis.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000

Software Agent-Mediated Confidential Information Gathering System.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000

1999
Author's reply to "comments on an optimized protocol for mobile network authentication and security".
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999

Agent-based copyright protection architecture for online electronic publishing.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Improvement of Secure Access Control Agent for Distributed Files.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

An agent-based architecture for securing mobile IP.
Proceedings of the Mobile Networks and Computing, 1999

Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce.
Proceedings of the Cooperative Information Agents III, Third International Workshop, 1999

Improving Object Oriented Analysis by Explicit Change Analysis.
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999

1998
An optimized protocol for mobile network authentication and security.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998

A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Secure Agent-Mediated Mobile Payment.
Proceedings of the Multiagent Platforms, 1998

A Secure Intelligent Trade Agent System.
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998

Secure Information Gathering Agent for Internet Trading.
Proceedings of the Multi-Agent Systems: Theories, 1998

Differential Cryptanalysis of a Block Cipher.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Design, Analysis and Implementation of a New Hash Function Based on Block Cipher.
Proceedings of the 16th International Conference on Computer Safety, 1997

A New Byte-Oriented Block Cipher.
Proceedings of the Information Security, First International Workshop, 1997

A New Hash Function Based on Block Cipher.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
On Design and Analysis of a New Block Cipher.
Proceedings of the Concurrency and Parallelism, 1996


  Loading...