Xuyun Nie

Orcid: 0000-0003-2868-0442

According to our database1, Xuyun Nie authored at least 38 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare.
IEEE Trans. Ind. Informatics, 2022

Traditional and Hybrid Access Control Models: A Detailed Survey.
Secur. Commun. Networks, 2022

Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT.
IEEE Internet Things J., 2022

Bid optimization using maximum entropy reinforcement learning.
Neurocomputing, 2022

Real-time Bidding Strategy in Display Advertising: An Empirical Analysis.
CoRR, 2022

2021
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

Secure and dynamic access control for the Internet of Things (IoT) based traffic system.
PeerJ Comput. Sci., 2021

A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT.
IEEE Internet Things J., 2021

2020
Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Efficient Ranked Multi-Keyword Retrieval With Privacy Protection for Multiple Data Owners in Cloud Computing.
IEEE Syst. J., 2020

Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020

Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks.
IEEE Internet Things J., 2020

A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising.
IEEE Access, 2020

2019
Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System.
IEEE Access, 2019

Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud.
IEEE Access, 2019

Role-Based ABAC Model for Implementing Least Privileges.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

2018
Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018

Cubic Medium Field Equation Public Key Cryptosystem.
Int. J. Netw. Secur., 2018

Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle.
Int. J. Netw. Secur., 2018

Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing.
IEEE Access, 2018

2017
Revocable ABE with Bounded Ciphertext in Cloud Computing.
Int. J. Netw. Secur., 2017

2016
Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem.
Int. J. Netw. Secur., 2016

2015
Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme.
Inf., 2015

Cubic Unbalance Oil and Vinegar Signature Scheme.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2013
Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Cryptanalysis of an improved MFE public key cryptosystem.
Int. J. Secur. Networks, 2012

2011
Security Analysis of an Improved MFE Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

Unattended Home Delivery System based on PKI Trust Model in Urban Areas.
Proceedings of the ICISO 2010, 2010

2009
The Trust Management Model of Trusted Software.
Proceedings of the International Forum on Information Technology and Applications, 2009

2008
Breaking Instance II of New TTM Cryptosystems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

2007
Cryptanalysis of Two New Instances of TTM Cryptosystem.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of the TRMC-4 Public Key Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006

Breaking a New Instance of TTM Cryptosystems.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006


  Loading...