Xun Yi

According to our database1, Xun Yi authored at least 160 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Vehicular Communications, 2019

Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification.
Security and Communication Networks, 2019

Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform.
Knowl.-Based Syst., 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distrib. Comput., 2019

Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities.
J. Parallel Distrib. Comput., 2019

Privacy-preserving aggregation for cooperative spectrum sensing.
J. Network and Computer Applications, 2019

A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems.
Int J. Information Management, 2019

A multistage protocol for aggregated queries in distributed cloud databases with privacy protection.
Future Generation Comp. Syst., 2019

Off-line digital cash schemes providing untraceability, anonymity and change.
Electronic Commerce Research, 2019

An efficient privacy-preserving protocol for database-driven cognitive radio networks.
Ad Hoc Networks, 2019

Secure Edge of Things for Smart Healthcare Surveillance Framework.
IEEE Access, 2019

A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Private Information Retrieval.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Computing Hierarchical Summary from Two-Dimensional Big Data Streams.
IEEE Trans. Parallel Distrib. Syst., 2018

Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Industrial Informatics, 2018

Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds.
Security and Communication Networks, 2018

Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller.
J. Discrete Algorithms, 2018

A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
IACR Cryptology ePrint Archive, 2018

A foggy research future: Advances and future opportunities in fog computing research.
Future Generation Comp. Syst., 2018

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Computer Networks, 2018

Minimal ensemble based on subset selection using ECG to diagnose categories of CAN.
Computer Methods and Programs in Biomedicine, 2018

A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption.
IEEE Access, 2018

A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security.
IEEE Access, 2018

Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks.
IEEE Access, 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking.
IEEE Access, 2018

An Improved Lightweight RFID Authentication Protocol for Internet of Things.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials.
Proceedings of the 19th IEEE International Conference on Mobile Data Management, 2018

An Online Estimation Algorithm of State-of-Charge of Lithium-Ion Batteries.
Proceedings of the IECON 2018, 2018

Using Blockchain to Control Access to Cloud Data.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data.
Security and Communication Networks, 2017

Efficient and privacy-aware multi-party classification protocol for human activity recognition.
J. Network and Computer Applications, 2017

Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.
J. Comput. Syst. Sci., 2017

Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure.
IET Wireless Sensor Systems, 2017

Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change.
IACR Cryptology ePrint Archive, 2017

Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation.
Future Generation Comp. Syst., 2017

Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks.
IEEE Access, 2017

A Verifiable Ranked Choice Internet Voting System.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Fuzzy Public-Key Encryption Based on Biometric Data.
Proceedings of the Provable Security, 2017

Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Private Recommendations Generation for Vertically Partitioned Datasets.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller.
Proceedings of the Combinatorial Algorithms - 28th International Workshop, 2017

A Practical Authentication Protocol for Anonymous Web Browsing.
Proceedings of the Information Security Practice and Experience, 2017

Privacy Preserving User-Based Recommender System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy.
IEEE Trans. Knowl. Data Eng., 2016

Private Cell Retrieval From Data Warehouses.
IEEE Trans. Information Forensics and Security, 2016

Privacy Protection for Wireless Medical Sensor Data.
IEEE Trans. Dependable Sec. Comput., 2016

ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

Editorial of special issue on security and privacy in cloud computing.
J. Inf. Sec. Appl., 2016

VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks.
IJDSN, 2016

A Practical Privacy-Preserving Recommender System.
Data Science and Engineering, 2016

Protecting outsourced data in cloud computing through access management.
Concurrency and Computation: Practice and Experience, 2016

Secure Data Analytics for Cloud-Integrated Internet of Things Applications.
IEEE Cloud Computing, 2016

Securing Body Sensor Network with ECG.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

Practical privacy-preserving user profile matching in social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.
IEEE Cloud Computing, 2015

Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Memetic Algorithm for Dynamic Shortest Path Routing on Mobile Ad-hoc Networks.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Optical quantum computing.
Proceedings of the 11th International Conference on Natural Computation, 2015

Quantum Boson-Sampling Machine.
Proceedings of the 11th International Conference on Natural Computation, 2015

Practical Threshold Password-Authenticated Secret Sharing Protocol.
Proceedings of the Computer Security - ESORICS 2015, 2015

Privacy-Preserving and Outsourced Multi-user K-Means Clustering.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Privacy-Preserving Association Rule Mining in Cloud Computing.
Proceedings of the 10th ACM Symposium on Information, 2015

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

2014
Homomorphic Encryption and Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12229-8, 2014

Private Searching on Streaming Data Based on Keyword Frequency.
IEEE Trans. Dependable Sec. Comput., 2014

An Enhanced Quantum PageRank Algorithm Integrated with Quantum Search.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Practical k nearest neighbor queries with location privacy.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

ID-Based Two-Server Password-Authenticated Key Exchange.
Proceedings of the Computer Security - ESORICS 2014, 2014

Positive Influence Dominating Set Games.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

Privacy of outsourced k-means clustering.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Private Information Retrieval
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 9781627051545, 2013

Efficient Two-Server Password-Only Authenticated Key Exchange.
IEEE Trans. Parallel Distrib. Syst., 2013

Single-Database Private Information Retrieval from Fully Homomorphic Encryption.
IEEE Trans. Knowl. Data Eng., 2013

Performing Stateful Logic on Memristor Memory.
IEEE Trans. on Circuits and Systems, 2013

Practical Internet voting system.
J. Network and Computer Applications, 2013

Equally contributory privacy-preserving k-means clustering over vertically partitioned data.
Inf. Syst., 2013

Hamming network circuits based on CMOS/memristor hybrid design.
IEICE Electronic Express, 2013

Multi-level programming of memristor in nanocrossbar.
IEICE Electronic Express, 2013

Privacy-Preserving Wireless Medical Sensor Network.
Proceedings of the 12th IEEE International Conference on Trust, 2013

(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Private data warehouse queries.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Multiparty privacy protection for electronic health records.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting.
IEEE Trans. Dependable Sec. Comput., 2012

Executing SQL queries over encrypted character strings in the Database-As-Service model.
Knowl.-Based Syst., 2012

Fully homomorphic encryption based two-party association rule mining.
Data Knowl. Eng., 2012

Private (t, n) Threshold Searching on Streaming Data.
Proceedings of the 2012 International Conference on Privacy, 2012

Identity-based Password-Authenticated Key Exchange for Client/Server Model.
Proceedings of the SECRYPT 2012, 2012

A projective clustering algorithm based on significant local dense areas.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Privacy-Preserving and Content-Protecting Location Based Queries.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

2011
Modeling user hidden navigational behavior for Web recommendation.
Web Intelligence and Agent Systems, 2011

Efficient and short certificateless signatures secure against realistic adversaries.
The Journal of Supercomputing, 2011

Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree.
IJISP, 2011

Private searching for single and conjunctive keywords on streaming data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Three-party Password-authenticated Key Exchange without Random Oracles.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Classification of Privacy-preserving Distributed Data Mining protocols.
Proceedings of the Sixth IEEE International Conference on Digital Information Management, 2011

Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Practical Remote End-to-End Voting Scheme.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

Secure Two-Party Association Rule Mining.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
Wireless broadcast encryption based on smart cards.
Wireless Networks, 2010

Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Certificateless Proxy Signature and Its Extension to Blind Signature.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Design and Analysis of "Flexible" k-out-of-n Signatures.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers.
Inf. Syst., 2009

ID-Based Group Password-Authenticated Key Exchange.
Proceedings of the Advances in Information and Computer Security, 2009

Distributed Association Rule Mining with Minimum Communication Overhead.
Proceedings of the Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, 2009

2008
Efficient broadcast key distribution with dynamic revocation.
Security and Communication Networks, 2008

Efficient convertible Limited Verifier Signatures.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Modelling User Behaviour for Web Recommendation Using LDA Model.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

Efficient and Short Certificateless Signature.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Secure Wireless Sensor Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
Privacy-preserving distributed association rule mining via semi-trusted mixer.
Data Knowl. Eng., 2007

Directed Transitive Signature Scheme.
Proceedings of the Topics in Cryptology, 2007

ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Secure Electronic Voting for Mobile Communications.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

2005
Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme.
IEEE Trans. Knowl. Data Eng., 2005

Hash function based on chaotic tent maps.
IEEE Trans. on Circuits and Systems, 2005

2004
Identity-Based Fault-Tolerant Conference Key Agreement.
IEEE Trans. Dependable Sec. Comput., 2004

Authenticated key agreement in dynamic peer groups.
Theor. Comput. Sci., 2004

2003
A secure conference scheme for mobile communications.
IEEE Trans. Wireless Communications, 2003

A secure and efficient conference scheme for mobile communications.
IEEE Trans. Vehicular Technology, 2003

Security of Park-Lim key agreement schemes for VSAT satellite communications.
IEEE Trans. Vehicular Technology, 2003

Performance and attention in multiagent object search team.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2003

Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy.
IEEE Trans. Knowl. Data Eng., 2003

An identity-based signature scheme from the Weil pairing.
IEEE Communications Letters, 2003

A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems.
IEEE Trans. Vehicular Technology, 2002

ID-based key agreement for multimedia encryption.
IEEE Trans. Consumer Electronics, 2002

Collective perception in massive, open, and heterogeneous multi-agent environment.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
Fast encryption for multimedia.
IEEE Trans. Consumer Electronics, 2001

Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases.
Proceedings of the E-Commerce Agents, 2001

Signature Schemes Based on 3rd Order Shift Registers.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments.
Distributed and Parallel Databases, 2000

Agent-Mediated Internet Advertising.
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000

Improving Object Oriented Analysis by Explicit Change Analysis.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000

Software Agent-Mediated Confidential Information Gathering System.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems, 2000

1999
Author's reply to "comments on an optimized protocol for mobile network authentication and security".
Mobile Computing and Communications Review, 1999

Agent-based copyright protection architecture for online electronic publishing.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Improvement of Secure Access Control Agent for Distributed Files.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

An agent-based architecture for securing mobile IP.
Proceedings of the Mobile Networks and Computing, 1999

Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce.
Proceedings of the Cooperative Information Agents III, Third International Workshop, 1999

Improving Object Oriented Analysis by Explicit Change Analysis.
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999

1998
An optimized protocol for mobile network authentication and security.
Mobile Computing and Communications Review, 1998

A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Secure Agent-Mediated Mobile Payment.
Proceedings of the Multiagent Platforms, 1998

A Secure Intelligent Trade Agent System.
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998

Secure Information Gathering Agent for Internet Trading.
Proceedings of the Multi-Agent Systems: Theories, 1998

Differential Cryptanalysis of a Block Cipher.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Design, Analysis and Implementation of a New Hash Function Based on Block Cipher.
Proceedings of the 16th International Conference on Computer Safety, 1997

A New Byte-Oriented Block Cipher.
Proceedings of the Information Security, First International Workshop, 1997

A New Hash Function Based on Block Cipher.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
On Design and Analysis of a New Block Cipher.
Proceedings of the Concurrency and Parallelism, 1996


  Loading...