Follow
Xinyi Huang(黄欣沂)
Xinyi Huang(黄欣沂)
Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and Technology
Verified email at ust.hk
Title
Cited by
Cited by
Year
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
D He, S Zeadally, B Xu, X Huang
IEEE Transactions on Information Forensics and Security 10 (12), 2681-2691, 2015
6742015
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
4572013
An overview of fog computing and its security issues
I Stojmenovic, S Wen, X Huang, H Luan
Concurrency and Computation: Practice and Experience 28 (10), 2991-3005, 2016
4362016
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
Cryptology and Network Security: 4th International Conference, CANS 2005 …, 2005
4192005
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
4132016
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
3852007
Targeted online password guessing: An underestimated threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3552016
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
3342017
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
2912014
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010
2762010
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
2572014
Security and privacy for the internet of drones: Challenges and solutions
C Lin, D He, N Kumar, KKR Choo, A Vinel, X Huang
IEEE Communications Magazine 56 (1), 64-69, 2018
2532018
Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption
J Liu, X Huang, JK Liu
Future Generation Computer Systems 52, 67-76, 2015
2492015
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
2332014
Secure distributed deduplication systems with improved reliability
J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi
IEEE Transactions on Computers 64 (12), 3569-3579, 2015
1692015
Verifiable auditing for outsourced database in cloud computing
J Wang, X Chen, X Huang, I You, Y Xiang
IEEE transactions on computers 64 (11), 3293-3303, 2015
1612015
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1562014
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007
1542007
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012
1522012
On emerging family of elliptic curves to secure internet of things: ECC comes of age
Z Liu, X Huang, Z Hu, MK Khan, H Seo, L Zhou
IEEE Transactions on Dependable and Secure Computing 14 (3), 237-248, 2016
1472016
The system can't perform the operation now. Try again later.
Articles 1–20