Xun Yi
Xun Yi
Professor of Cyber Security, RMIT University
Verified email at rmit.edu.au
TitleCited byYear
An identity-based signature scheme from the Weil pairing
X Yi
IEEE communications letters 7 (2), 76-78, 2003
1412003
Hash function based on chaotic tent maps
X Yi
IEEE Transactions on Circuits and Systems II: Express Briefs 52 (6), 354-357, 2005
1382005
Privacy-preserving and content-protecting location based queries
R Paulet, MG Kaosar, X Yi, E Bertino
IEEE transactions on knowledge and data engineering 26 (5), 1200-1210, 2013
1082013
Homomorphic encryption and applications
X Yi, R Paulet, E Bertino
Springer, 2014
102*2014
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
X Yi, Y Ye
IEEE Transactions on Knowledge and Data Engineering 15 (4), 1054-1055, 2003
842003
Fast encryption for multimedia
X Yi, CH Tan, CK Slew, MR Syed
IEEE Transactions on Consumer Electronics 47 (1), 101-107, 2001
812001
Single-database private information retrieval from fully homomorphic encryption
X Yi, MG Kaosar, R Paulet, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (5), 1125-1134, 2012
682012
Practical k nearest neighbor queries with location privacy
X Yi, R Paulet, E Bertino, V Varadharajan
2014 IEEE 30th International Conference on Data Engineering, 640-651, 2014
602014
Practical approximate k nearest neighbor queries with location and query privacy
X Yi, R Paulet, E Bertino, V Varadharajan
IEEE Transactions on Knowledge and Data Engineering 28 (6), 1546-1559, 2016
582016
A new block cipher based on chaotic tent maps
X Yi, CH Tan, CK Siew
IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 2002
582002
A method for obtaining cryptographically strong 8/spl times/8 S-boxes
X Yi, SX Cheng, XH You, KY Lam
GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record 2 …, 1997
581997
Efficient and short certificateless signature
R Tso, X Yi, X Huang
International Conference on Cryptology and Network Security, 64-79, 2008
572008
Efficient and short certificateless signatures secure against realistic adversaries
R Tso, X Yi, X Huang
the Journal of Supercomputing 55 (2), 173-191, 2011
562011
Privacy of outsourced k-means clustering
D Liu, E Bertino, X Yi
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
542014
Security of Chien's efficient time-bound hierarchical key assignment scheme
X Yi
IEEE Transactions on Knowledge and Data Engineering 17 (9), 1298-1299, 2005
512005
Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers
X Yi, Y Zhang
Information systems 34 (3), 371-380, 2009
502009
Privacy-preserving distributed association rule mining via semi-trusted mixer
X Yi, Y Zhang
Data & Knowledge Engineering 63 (2), 550-567, 2007
472007
Modelling user behaviour for web recommendation using lda model
G Xu, Y Zhang, X Yi
2008 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2008
452008
Identity-based fault-tolerant conference key agreement
X Yi
IEEE transactions on dependable and secure computing 1 (3), 170-178, 2004
432004
Security and privacy in cloud computing: vision, trends, and challenges
Z Tari, X Yi, US Premarathne, P Bertok, I Khalil
IEEE Cloud Computing 2 (2), 30-38, 2015
402015
The system can't perform the operation now. Try again later.
Articles 1–20