The following pages link to Xin-Yi Huang (Q744323):
Displaying 50 items.
- (Q314804) (redirect page) (← links)
- A new universal designated verifier transitive signature scheme for big graph data (Q314806) (← links)
- Certificate-based signcryption with enhanced security features (Q356006) (← links)
- Certificateless threshold signature scheme from bilinear maps (Q621600) (← links)
- Provably secure server-aided verification signatures (Q636553) (← links)
- Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism (Q744326) (← links)
- Revocable threshold attribute-based signature against signing key exposure (Q1631930) (← links)
- Self-adaptive trust management based on game theory in fuzzy large-scale networks (Q1701607) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Secure publicly verifiable computation with polynomial commitment in cloud computing (Q1784473) (← links)
- An efficient blind signature scheme based on SM2 signature algorithm (Q2057164) (← links)
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved (Q2139637) (← links)
- Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography (Q2143125) (← links)
- Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases (Q2167748) (← links)
- Equilibrium competition binding assay: inhibition mechanism from a single dose response (Q2177443) (← links)
- A code-based signature scheme from the Lyubashevsky framework (Q2192378) (← links)
- Functional broadcast encryption with applications to data sharing for cloud storage (Q2224865) (← links)
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme (Q2293022) (← links)
- Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud (Q2399951) (← links)
- A general framework for secure sharing of personal health records in cloud system (Q2403233) (← links)
- Blockchain-based system for secure outsourcing of bilinear pairings (Q2663527) (← links)
- Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments (Q2692316) (← links)
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption (Q2692378) (← links)
- Accelerating Oblivious Transfer with Batch Multi-exponentiation (Q2817471) (← links)
- Dynamic Secure Cloud Storage with Provenance (Q2889794) (← links)
- <inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for C (Q2982110) (← links)
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security (Q2982309) (← links)
- Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing (Q2985410) (← links)
- Secure Distributed Deduplication Systems with Improved Reliability (Q2985743) (← links)
- Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control (Q3389899) (← links)
- Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting (Q3562892) (← links)
- Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility (Q3600318) (← links)
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures (Q3605390) (← links)
- Certificateless Signature Revisited (Q3608927) (← links)
- Further Observations on Certificateless Public Key Encryption (Q3624278) (← links)
- (Q3639071) (← links)
- (Q4558030) (← links)
- Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security (Q4639922) (← links)
- Linearly Homomorphic Signatures with Designated Entities (Q5056030) (← links)
- Ring Trapdoor Redactable Signatures from Lattice (Q5095930) (← links)
- Efficient Escrow-Free Identity-Based Signature (Q5200580) (← links)
- Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length (Q5429251) (← links)
- Formal Definition and Construction of Nominative Signature (Q5452280) (← links)
- A Generic Construction for Universally-Convertible Undeniable Signatures (Q5458491) (← links)
- Efficient and Short Certificateless Signature (Q5502752) (← links)
- Server-Aided Verification Signatures: Definitions and New Constructions (Q5505465) (← links)
- Cryptology and Network Security (Q5898104) (← links)
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts (Q6205019) (← links)
- Complicated dynamical behaviors of a geometrical oscillator with a mass parameter (Q6538857) (← links)
- Grey-prediction-based double model predictive control strategy for the speed and current control of permanent magnet synchronous motor (Q6579066) (← links)