关注
Xun Yi
Xun Yi
Professor of Cybersecurity, School of Computing Technologies, RMIT University
在 rmit.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Public and private blockchain in construction business process and information integration
R Yang, R Wakefield, S Lyu, S Jayasuriya, F Han, X Yi, X Yang, ...
Automation in construction 118, 103276, 2020
5532020
Homomorphic encryption
X Yi, R Paulet, E Bertino, X Yi, R Paulet, E Bertino
Homomorphic encryption and applications, 27-46, 2014
4752014
Privacy-preserving and content-protecting location based queries
R Paulet, MG Kaosar, X Yi, E Bertino
IEEE transactions on knowledge and data engineering 26 (5), 1200-1210, 2013
2122013
An identity-based signature scheme from the Weil pairing
X Yi
IEEE communications letters 7 (2), 76-78, 2003
1762003
Hash function based on chaotic tent maps
X Yi
IEEE Transactions on Circuits and Systems II: Express Briefs 52 (6), 354-357, 2005
1722005
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
PP Jayaraman, X Yang, A Yavari, D Georgakopoulos, X Yi
Future Generation Computer Systems 76, 540-549, 2017
1642017
Practical approximate k nearest neighbor queries with location and query privacy
X Yi, R Paulet, E Bertino, V Varadharajan
IEEE Transactions on Knowledge and Data Engineering 28 (6), 1546-1559, 2016
1442016
Privacy protection for wireless medical sensor data
X Yi, A Bouguettaya, D Georgakopoulos, A Song, J Willemson
IEEE transactions on dependable and secure computing 13 (3), 369-380, 2015
1342015
Single-database private information retrieval from fully homomorphic encryption
X Yi, MG Kaosar, R Paulet, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (5), 1125-1134, 2012
1312012
Secure edge of things for smart healthcare surveillance framework
A Alabdulatif, I Khalil, X Yi, M Guizani
IEEE access 7, 31010-31021, 2019
1302019
Aggregation service for federated learning: An efficient, secure, and more resilient realization
Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 988-1001, 2022
1182022
Security and privacy in cloud computing: vision, trends, and challenges
Z Tari, X Yi, US Premarathne, P Bertok, I Khalil
IEEE Cloud Computing 2 (2), 30-38, 2015
1182015
A practical privacy-preserving recommender system
S Badsha, X Yi, I Khalil
Data Science and Engineering 1, 161-177, 2016
1132016
Privacy of outsourced k-means clustering
D Liu, E Bertino, X Yi
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1112014
Practical k nearest neighbor queries with location privacy
X Yi, R Paulet, E Bertino, V Varadharajan
2014 IEEE 30th international conference on data engineering, 640-651, 2014
1102014
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
X Yi, Y Ye
IEEE Transactions on Knowledge and Data Engineering 15 (4), 1054-1055, 2003
1072003
Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption
A Alabdulatif, I Khalil, X Yi
Journal of Parallel and Distributed Computing 137, 192-204, 2020
992020
Fast encryption for multimedia
X Yi, CH Tan, CK Slew, MR Syed
IEEE Transactions on Consumer Electronics 47 (1), 101-107, 2001
982001
A method for obtaining cryptographically strong 8/spl times/8 S-boxes
X Yi, SX Cheng, XH You, KY Lam
GLOBECOM 97. IEEE global telecommunications conference. conference record 2 …, 1997
971997
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities
X Yang, X Yi, S Nepal, A Kelarev, F Han
Future Generation Computer Systems 112, 859-874, 2020
942020
系统目前无法执行此操作,请稍后再试。
文章 1–20