Xun Yi

From MaRDI portal
(Redirected from Person:407495)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On design and analysis of a new block cipher2024-06-21Paper
Committed private information retrieval2024-06-05Paper
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments2023-03-21Paper
Parallel Private Retrieval of Merkle Proofs via Tree Colorings2022-05-10Paper
A distributed networked system for secure publicly verifiable self-tallying online voting
Information Sciences
2021-11-30Paper
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
Information Processing Letters
2021-10-19Paper
Using blockchain to control access to cloud data2019-10-31Paper
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller
Journal of Discrete Algorithms
2019-01-18Paper
Fuzzy public-key encryption based on biometric data2018-11-07Paper
Combinatorial algorithms and methods for security of statistical databases related to the work of Mirka Miller2018-06-15Paper
Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
Journal of Computer and System Sciences
2017-09-15Paper
A new block cipher based on chaotic tent maps
IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications
2017-08-25Paper
ID2S Password-Authenticated Key Exchange Protocols
IEEE Transactions on Computers
2017-05-16Paper
CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps
Information Security and Privacy
2016-08-31Paper
A graph isomorphism algorithm using signatures computed via quantum walk search model
Journal of Physics A: Mathematical and Theoretical
2015-04-14Paper
Homomorphic encryption and applications
SpringerBriefs in Computer Science
2015-02-03Paper
Certificateless message recovery signatures providing Girault's level-3 security
Journal of Shanghai Jiaotong University (Science)
2014-09-02Paper
Private information retrieval
Synthesis Lectures on Information Security, Privacy, and Trust
2013-10-23Paper
Efficient and Short Certificateless Signature
Cryptology and Network Security
2009-01-09Paper
Directed Transitive Signature Scheme
Lecture Notes in Computer Science
2008-04-17Paper
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
2005-01-11Paper
scientific article; zbMATH DE number 2043341 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1808279 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1500485 (Why is no real title available?)2002-07-28Paper
scientific article; zbMATH DE number 1700372 (Why is no real title available?)2002-02-10Paper
scientific article; zbMATH DE number 1189369 (Why is no real title available?)1998-10-08Paper


Research outcomes over time


This page was built for person: Xun Yi