Follow
Xinyi Huang(黄欣沂)
Xinyi Huang(黄欣沂)
Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and Technology
Verified email at ust.hk
Title
Cited by
Cited by
Year
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
D He, S Zeadally, B Xu, X Huang
IEEE Transactions on Information Forensics and Security 10 (12), 2681-2691, 2015
6312015
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
4512013
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
International Conference on Cryptology and Network Security, 13-25, 2005
4212005
An overview of fog computing and its security issues
I Stojmenovic, S Wen, X Huang, H Luan
Concurrency and Computation: Practice and Experience 28 (10), 2991-3005, 2016
4182016
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
3962016
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3812007
Targeted online password guessing: An underestimated threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3222016
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
3172017
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
2922014
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010
2642010
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
2492014
Security and privacy for the internet of drones: Challenges and solutions
C Lin, D He, N Kumar, KKR Choo, A Vinel, X Huang
IEEE Communications Magazine 56 (1), 64-69, 2018
2412018
Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption
J Liu, X Huang, JK Liu
Future Generation Computer Systems 52, 67-76, 2015
2412015
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
2252014
Secure distributed deduplication systems with improved reliability
J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi
IEEE Transactions on Computers 64 (12), 3569-3579, 2015
1622015
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and security: From theory to applications, 442-464, 2012
1572012
Verifiable auditing for outsourced database in cloud computing
J Wang, X Chen, X Huang, I You, Y Xiang
IEEE transactions on computers 64 (11), 3293-3303, 2015
1522015
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1522014
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
European Public Key Infrastructure Workshop, 110-125, 2007
1512007
On emerging family of elliptic curves to secure internet of things: ECC comes of age
Z Liu, X Huang, Z Hu, MK Khan, H Seo, L Zhou
IEEE Transactions on Dependable and Secure Computing 14 (3), 237-248, 2016
1472016
The system can't perform the operation now. Try again later.
Articles 1–20