Xinyi Huang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [b1]Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang:
Security and Privacy for Next-Generation Wireless Networks. Wireless Networks, Springer 2019, ISBN 978-3-030-01149-9, pp. 1-180 - [j103]Xu Yang, Xun Yi, Ibrahim Khalil, Yali Zeng, Xinyi Huang, Surya Nepal, Xuechao Yang, Hui Cui:
A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Vehicular Communications 15: 16-27 (2019) - [i7]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
A New Code-based Signature Scheme with Shorter Public Key. IACR Cryptology ePrint Archive 2019: 53 (2019) - 2018
- [j102]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6: 28203-28212 (2018) - [j101]Shan-Shan Tu, Xinyi Huang, Yao Huang, Muhammad Waqas, Sadaqat ur Rehman:
SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network. IEEE Access 6: 66153-66164 (2018) - [j100]Biao Wang, Xueqing Wang, Rui Xue, Xinyi Huang:
Matrix FHE and Its Application in Optimizing Bootstrapping. Comput. J. 61(12): 1845-1861 (2018) - [j99]Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey V. Vinel, Xinyi Huang:
Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Communications Magazine 56(1): 64-69 (2018) - [j98]Cristina Alcaraz, Xinyi Huang, Erich Rome:
Security and privacy in cloud-assisted cyber-physical systems. Computer Networks 138: 13-14 (2018) - [j97]Hui Huang, Xiaofeng Chen, Qianhong Wu, Xinyi Huang, Jian Shen:
Bitcoin-based fair payments for outsourcing computations of fog devices. Future Generation Comp. Syst. 78: 850-858 (2018) - [j96]Shao-Jun Yang, Xinyi Huang:
Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT. Future Generation Comp. Syst. 86: 582-590 (2018) - [j95]Yuexin Zhang, Yang Xiang, Xinyi Huang, Xiaofeng Chen, Abdulhameed Alelaiwi:
A matrix-based cross-layer key establishment protocol for smart homes. Inf. Sci. 429: 390-405 (2018) - [j94]Jian Shen, Chen Wang, Tong Li, Xiaofeng Chen, Xinyi Huang, Zhi-Hui Zhan:
Secure data uploading scheme for a smart home system. Inf. Sci. 453: 186-197 (2018) - [j93]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos:
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Network and Computer Applications 116: 42-52 (2018) - [j92]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Jungang Lou:
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures. Peer-to-Peer Networking and Applications 11(2): 235-251 (2018) - [j91]Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. IEEE Trans. Information Forensics and Security 13(2): 511-520 (2018) - [j90]Qian Wang, Minxin Du, Xiuying Chen, Yanjiao Chen, Pan Zhou, Xiaofeng Chen, Xinyi Huang:
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training. IEEE Trans. Knowl. Data Eng. 30(12): 2381-2393 (2018) - [c57]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. ACISP 2018: 417-430 - [c56]Jianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang, Xinyi Huang:
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases. ESORICS (2) 2018: 167-186 - [c55]Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang:
A New Design of Online/Offline Signatures Based on Lattice. ISPEC 2018: 198-212 - [c54]Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang:
A Security Analysis of Honeywords. NDSS 2018 - [c53]Xu Yang, Xun Yi, Yali Zeng, Ibrahim Khalil, Xinyi Huang, Surya Nepal:
An Improved Lightweight RFID Authentication Protocol for Internet of Things. WISE (1) 2018: 111-126 - [i6]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IACR Cryptology ePrint Archive 2018: 814 (2018) - 2017
- [j89]Xinyi Huang, Joseph K. Liu, Javier López:
Editorial: Special issue on security data science and cyber threat management. Computers & Security 69: 1-2 (2017) - [j88]Zechao Liu, Zoe L. Jiang, Xuan Wang, Xinyi Huang, Siu-Ming Yiu, Kunihiko Sadakane:
Offline/online attribute-based encryption with verifiable outsourced decryption. Concurrency and Computation: Practice and Experience 29(7) (2017) - [j87]Vanga Odelu, Ashok Kumar Das, Saru Kumari, Xinyi Huang, Mohammad Wazid:
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Generation Comp. Syst. 68: 74-88 (2017) - [j86]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security. Int. J. Found. Comput. Sci. 28(7): 843-868 (2017) - [j85]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Xinyi Huang, Aniello Castiglione:
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. Inf. Sci. 387: 56-74 (2017) - [j84]Chao Lin, Wei Wu, Xinyi Huang, Li Xu:
A new universal designated verifier transitive signature scheme for big graph data. J. Comput. Syst. Sci. 83(1): 73-83 (2017) - [j83]Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe L. Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j82]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Special issue on security and privacy for smart cities. Personal and Ubiquitous Computing 21(5): 775 (2017) - [j81]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Erratum to: Special issue on security and privacy for smart cities. Personal and Ubiquitous Computing 21(5): 777 (2017) - [j80]Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Security and Communication Networks 2017: 3596205:1-3596205:11 (2017) - [j79]Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang, Duncan S. Wong:
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. IEEE Systems Journal 11(2): 439-448 (2017) - [j78]He Fang, Li Xu, Xinyi Huang:
Self-adaptive trust management based on game theory in fuzzy large-scale networks. Soft Comput. 21(4): 907-921 (2017) - [j77]Jianan Liu, Junzuo Lai, Xinyi Huang:
Dual trapdoor identity-based encryption with keyword search. Soft Comput. 21(10): 2599-2607 (2017) - [j76]Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang, Jean-Luc Danger:
A Generic Table Recomputation-Based Higher-Order Masking. IEEE Trans. on CAD of Integrated Circuits and Systems 36(11): 1779-1789 (2017) - [j75]Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang:
Universally Composable RFID Mutual Authentication. IEEE Trans. Dependable Sec. Comput. 14(1): 83-94 (2017) - [j74]Zhe Liu, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou:
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age. IEEE Trans. Dependable Sec. Comput. 14(3): 237-248 (2017) - [j73]Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang, Li Xu:
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design. ACM Trans. Embedded Comput. Syst. 16(2): 57:1-57:20 (2017) - [j72]Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Information Forensics and Security 12(4): 767-778 (2017) - [j71]Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, Willy Susilo:
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data. IEEE Trans. Information Forensics and Security 12(10): 2402-2415 (2017) - [j70]Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian:
Zipf's Law in Passwords. IEEE Trans. Information Forensics and Security 12(11): 2776-2791 (2017) - [j69]Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun:
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices. IEEE Trans. Information Forensics and Security 12(12): 3024-3038 (2017) - [j68]Li Xu, Jing Zhang, Yang Xiang, Xinyi Huang:
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks. Wireless Personal Communications 96(4): 4947-4972 (2017) - [c52]Yanjiang Yang, Joseph K. Liu, Zhuo Wei, Xinyi Huang:
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud. ACISP (1) 2017: 127-144 - [c51]Yuexin Zhang, Yang Xiang, Xinyi Huang:
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems. CPSS@AsiaCCS 2017: 43-53 - [c50]Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang:
Understanding Human-Chosen PINs: Characteristics, Distribution and Security. AsiaCCS 2017: 372-385 - [c49]Zhiqiang Xu, Debiao He, Xinyi Huang:
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. ICICS 2017: 595-605 - [c48]Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang:
Linearly Homomorphic Signatures with Designated Entities. ISPEC 2017: 375-390 - [c47]Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, YaLi Zeng:
A Practical Authentication Protocol for Anonymous Web Browsing. ISPEC 2017: 468-482 - 2016
- [j67]Jiguo Li, Na Qian, Yichen Zhang, Xinyi Huang:
An Efficient Certificate-Based Designated Verifier Signature Scheme. Computing and Informatics 35(5): 1210-1230 (2016) - [j66]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Practical Attribute-based Signature: Traceability and Revocability. Comput. J. 59(11): 1714-1734 (2016) - [j65]Xu Yang, Xinyi Huang, Jinguang Han, Chunhua Su:
Improved handover authentication and key pre-distribution for wireless mesh networks. Concurrency and Computation: Practice and Experience 28(10): 2978-2990 (2016) - [j64]Ivan Stojmenovic, Sheng Wen, Xinyi Huang, Hao Luan:
An overview of Fog computing and its security issues. Concurrency and Computation: Practice and Experience 28(10): 2991-3005 (2016) - [j63]Xu Yang, Xinyi Huang, Joseph K. Liu:
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. Future Generation Comp. Syst. 62: 190-195 (2016) - [j62]Jinguang Han, Ye Yang, Xinyi Huang, Tsz Hon Yuen, Jiguo Li, Jie Cao:
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption. Inf. Sci. 345: 143-155 (2016) - [j61]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-based encryption resilient to key leakage. Journal of Systems and Software 116: 101-112 (2016) - [j60]Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang:
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity. Security and Communication Networks 9(12): 1737-1747 (2016) - [j59]Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang:
Provably secure user authentication and key agreement scheme for wireless sensor networks. Security and Communication Networks 9(16): 3670-3687 (2016) - [j58]Shaohua Tang, Xiaoyu Li, Xinyi Huang, Yang Xiang, Lingling Xu:
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing. IEEE Trans. Computers 65(7): 2325-2331 (2016) - [j57]Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, Jin Li:
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. IEEE Trans. Information Forensics and Security 11(3): 484-497 (2016) - [j56]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Jin Li, Xinyi Huang:
Hierarchical and Shared Access Control. IEEE Trans. Information Forensics and Security 11(4): 850-865 (2016) - [j55]Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Xinyi Huang:
Cryptographic Hierarchical Access Control for Dynamic Structures. IEEE Trans. Information Forensics and Security 11(10): 2349-2364 (2016) - [j54]Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Information Forensics and Security 11(10): 2365-2376 (2016) - [j53]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang:
Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Information Forensics and Security 11(12): 2833-2842 (2016) - [j52]Yuexin Zhang, Yang Xiang, Xinyi Huang:
Password-Authenticated Group Key Exchange: A Cross-Layer Design. ACM Trans. Internet Techn. 16(4): 24:1-24:20 (2016) - [c46]Yang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, Wei Hu:
Accelerating Oblivious Transfer with Batch Multi-exponentiation. ACISP (1) 2016: 310-326 - [c45]Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang:
Targeted Online Password Guessing: An Underestimated Threat. ACM Conference on Computer and Communications Security 2016: 1242-1254 - [c44]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang:
Anonymizing Bitcoin Transaction. ISPEC 2016: 271-283 - [c43]Xu Yang, Ting-Ting Lee, Joseph K. Liu, Xinyi Huang:
Trust Enhancement over Range Search for Encrypted Data. Trustcom/BigDataSE/ISPA 2016: 66-73 - [c42]Xiuwen Zhou, Qianhong Wu, Bo Qin, Xinyi Huang, Jianwei Liu:
Distributed Bitcoin Account Management. Trustcom/BigDataSE/ISPA 2016: 105-112 - [e4]Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang:
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4233-9 [contents] - [e3]Xinyi Huang, Yang Xiang, Kuan-Ching Li:
Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9663, Springer 2016, ISBN 978-3-319-39076-5 [contents] - 2015
- [j51]Hui Lin, Li Xu, Xinyi Huang, Wei Wu, Yijie Huang:
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Networks 35: 51-64 (2015) - [j50]Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou:
A Forward-Secure Certificate-Based Signature Scheme. Comput. J. 58(4): 853-866 (2015) - [j49]Jianghua Liu, Xinyi Huang, Joseph K. Liu:
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption. Future Generation Comp. Syst. 52: 67-76 (2015) - [j48]Yuexin Zhang, Li Xu, Xinyi Huang, Jie Li:
Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge. IJAHUC 20(4): 262-273 (2015) - [j47]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu:
Cooperative attribute-based access control for enterprise computing system. IJES 7(3/4): 191-202 (2015) - [j46]Chuan Yao, Li Xu, Xinyi Huang:
Batch public auditing for distributed mobile cloud computing. IJHPCN 8(2): 102-109 (2015) - [j45]Elisa Bertino, Robert H. Deng, Xinyi Huang, Jianying Zhou:
Security and privacy of electronic health information systems. Int. J. Inf. Sec. 14(6): 485-486 (2015) - [j44]Jin Li, Xiaofeng Chen, Xinyi Huang:
New attribute-based authentication and its application in anonymous cloud access service. IJWGS 11(1): 125-141 (2015) - [j43]Shuquan Hou, Xinyi Huang, Joseph K. Liu, Jin Li, Li Xu:
Universal designated verifier transitive signatures for graph-based big data. Inf. Sci. 318: 144-156 (2015) - [j42]Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015) - [j41]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou:
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Trans. Computers 64(9): 2595-2608 (2015) - [j40]Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, Yang Xiang:
Verifiable Auditing for Outsourced Database in Cloud Computing. IEEE Trans. Computers 64(11): 3293-3303 (2015) - [j39]Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Distributed Deduplication Systems with Improved Reliability. IEEE Trans. Computers 64(12): 3569-3579 (2015) - [j38]Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, Yang Xiang:
A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid. IEEE Trans. Cloud Computing 3(2): 233-244 (2015) - [j37]Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:
New Publicly Verifiable Databases with Efficient Updates. IEEE Trans. Dependable Sec. Comput. 12(5): 546-556 (2015) - [j36]Li Xu, Xinyu Chen, Jie Li, Xinyi Huang, Jianying Zhou:
Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis. Telecommunication Systems 60(1): 149-158 (2015) - [j35]Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong:
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations. IEEE Trans. Information Forensics and Security 10(1): 69-78 (2015) - [j34]Joseph K. Liu, Cheng-Kang Chu, Sherman S. M. Chow, Xinyi Huang, Man Ho Au, Jianying Zhou:
Time-Bound Anonymous Authentication for Roaming Networks. IEEE Trans. Information Forensics and Security 10(1): 178-189 (2015) - [j33]Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Information Forensics and Security 10(12): 2681-2691 (2015) - [c41]Shumei Miao, Xiaoping Zhou, Xin Zhang, Hongwei Shan, Xinyi Huang, Yixin Zhu, Kai Leng, Zhongmin Wang, Jianqiu Kou, Yun Liu:
The Analysis of Relationship between Diabetes and Cancer from 2006-2013 Hospital Inpatients. HEALTHINF 2015: 483-488 - [c40]Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou:
Group-oriented Proofs of Storage. AsiaCCS 2015: 73-84 - [c39]Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang, Johann Großschädl:
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. AsiaCCS 2015: 145-153 - [c38]Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu:
Revocable Threshold Attribute-Based Signature against Signing Key Exposure. ISPEC 2015: 316-330 - [i5]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. IACR Cryptology ePrint Archive 2015: 314 (2015) - 2014
- [j32]Li Xu, Yuan He, Xiaofeng Chen, Xinyi Huang:
Ticket-based handoff authentication for wireless mesh networks. Computer Networks 73: 185-194 (2014) - [j31]Fatos Xhafa, Xiaofeng Chen, Xinyi Huang, Vladi Kolici:
Advances in secure and intelligent data processing. Concurrency and Computation: Practice and Experience 26(5): 1021-1022 (2014) - [j30]Yanling Lian, Xinyi Huang, Yi Mu:
SA3: Self-adaptive anonymous authentication for dynamic authentication policies. Future Generation Comp. Syst. 30: 133-139 (2014) - [j29]Chuan Yao, Li Xu, Xinyi Huang, Joseph K. Liu:
A secure remote data integrity checking cloud storage system from threshold encryption. J. Ambient Intelligence and Humanized Computing 5(6): 857-865 (2014) - [j28]Peter Mueller, Der-Chyuan Lou, Xinyi Huang:
Special issue on applied cryptography for information and communication networks. Security and Communication Networks 7(2): 397-398 (2014) - [j27]Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, Li Xu:
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parallel Distrib. Syst. 25(7): 1767-1775 (2014) - [j26]Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang:
Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distrib. Syst. 25(8): 2201-2210 (2014) - [j25]Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang:
Provably Secure Group Key Management Approach Based upon Hyper-Sphere. IEEE Trans. Parallel Distrib. Syst. 25(12): 3253-3263 (2014) - [j24]Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan S. Wong:
Secure Outsourced Attribute-Based Signatures. IEEE Trans. Parallel Distrib. Syst. 25(12): 3285-3294 (2014) - [c37]Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, Yong Yu:
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. ESORICS (2) 2014: 182-199 - [c36]Yuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu:
A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks. ESORICS (1) 2014: 526-541 - [c35]
- [c34]Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu:
GO-ABE: Group-Oriented Attribute-Based Encryption. NSS 2014: 260-270 - [e2]Xinyi Huang, Jianying Zhou:
Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Lecture Notes in Computer Science 8434, Springer 2014, ISBN 978-3-319-06319-5 [contents] - 2013
- [j23]Lanxiang Chen, Shuming Zhou, Xinyi Huang, Li Xu:
Data dynamics for remote data possession checking in cloud storage. Computers & Electrical Engineering 39(7): 2413-2424 (2013) - [j22]Yuexin Zhang, Li Xu, Yang Xiang, Xinyi Huang:
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge. IEEE Trans. Emerging Topics Comput. 1(2): 331-340 (2013) - [c33]Yuexin Zhang, Li Xu, Yang Xiang, Xinyi Huang:
Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge. ICC 2013: 1604-1608 - [c32]Yuexin Zhang, Li Xu, Xinyi Huang, Jie Li:
Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks. IMIS 2013: 153-158 - [c31]Chuan Yao, Li Xu, Xinyi Huang:
A Secure Cloud Storage System from Threshold Encryption. INCoS 2013: 541-545 - [c30]Yanling Lian, Li Xu, Xinyi Huang:
Attribute-Based Signatures with Efficient Revocation. INCoS 2013: 573-577 - [e1]Javier López, Xinyi Huang, Ravi Sandhu:
Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lecture Notes in Computer Science 7873, Springer 2013, ISBN 978-3-642-38630-5 [contents] - [i4]Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng:
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes. IACR Cryptology ePrint Archive 2013: 193 (2013) - 2012
- [j21]Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signatures: New Schemes and Security Models. Comput. J. 55(4): 457-474 (2012) - [j20]Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu:
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption. Comput. J. 55(10): 1157-1168 (2012) - [j19]Jiguo Li, Xinyi Huang, Meixue Hong, Yichen Zhang:
Certificate-based signcryption with enhanced security features. Computers & Mathematics with Applications 64(6): 1587-1601 (2012) - [j18]Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:
An efficient short certificate-based signature scheme. Journal of Systems and Software 85(2): 314-322 (2012) - [j17]