Xun Yi

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On design and analysis of a new block cipher
 
2024-06-21Paper
Committed private information retrieval
 
2024-06-05Paper
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments
 
2023-03-21Paper
Parallel Private Retrieval of Merkle Proofs via Tree Colorings
 
2022-05-10Paper
A distributed networked system for secure publicly verifiable self-tallying online voting
Information Sciences
2021-11-30Paper
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
Information Processing Letters
2021-10-19Paper
Using blockchain to control access to cloud data
 
2019-10-31Paper
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller
Journal of Discrete Algorithms
2019-01-18Paper
Fuzzy public-key encryption based on biometric data
 
2018-11-07Paper
Combinatorial algorithms and methods for security of statistical databases related to the work of Mirka Miller
 
2018-06-15Paper
Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
Journal of Computer and System Sciences
2017-09-15Paper
A new block cipher based on chaotic tent maps
IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications
2017-08-25Paper
ID2S Password-Authenticated Key Exchange Protocols
IEEE Transactions on Computers
2017-05-16Paper
CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps
Information Security and Privacy
2016-08-31Paper
A graph isomorphism algorithm using signatures computed via quantum walk search model
Journal of Physics A: Mathematical and Theoretical
2015-04-14Paper
Homomorphic encryption and applications
SpringerBriefs in Computer Science
2015-02-03Paper
Certificateless message recovery signatures providing Girault's level-3 security
Journal of Shanghai Jiaotong University (Science)
2014-09-02Paper
Private information retrieval
Synthesis Lectures on Information Security, Privacy, and Trust
2013-10-23Paper
Efficient and Short Certificateless Signature
Cryptology and Network Security
2009-01-09Paper
Directed Transitive Signature Scheme
Lecture Notes in Computer Science
2008-04-17Paper
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
2005-01-11Paper
scientific article; zbMATH DE number 2043341 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 1808279 (Why is no real title available?)
 
2002-09-26Paper
scientific article; zbMATH DE number 1500485 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1700372 (Why is no real title available?)
 
2002-02-10Paper
scientific article; zbMATH DE number 1189369 (Why is no real title available?)
 
1998-10-08Paper


Research outcomes over time


This page was built for person: Xun Yi