Follow
Xinyi Huang(黄欣沂)
Xinyi Huang(黄欣沂)
Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and Technology
Verified email at ust.hk
Title
Cited by
Cited by
Year
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
D He, S Zeadally, B Xu, X Huang
IEEE Transactions on Information Forensics and Security 10 (12), 2681-2691, 2015
6992015
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
4692013
An overview of fog computing and its security issues
I Stojmenovic, S Wen, X Huang, H Luan
Concurrency and Computation: Practice and Experience 28 (10), 2991-3005, 2016
4452016
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
4272016
On the security of certificateless signature schemes from Asiacrypt 2003
X Huang, W Susilo, Y Mu, F Zhang
Cryptology and Network Security: 4th International Conference, CANS 2005 …, 2005
4212005
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
3892007
Targeted online password guessing: An underestimated threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3682016
An efficient public auditing protocol with novel dynamic structure for cloud data
J Shen, J Shen, X Chen, X Huang, W Susilo
IEEE Transactions on Information Forensics and Security 12 (10), 2402-2415, 2017
3492017
A secure cloud computing based framework for big data information management of smart grid
J Baek, QH Vu, JK Liu, X Huang, Y Xiang
IEEE transactions on cloud computing 3 (2), 233-244, 2014
2942014
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
X Huang, Y Xiang, A Chonka, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010
2772010
Security and privacy for the internet of drones: Challenges and solutions
C Lin, D He, N Kumar, KKR Choo, A Vinel, X Huang
IEEE Communications Magazine 56 (1), 64-69, 2018
2642018
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
2632014
Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption
J Liu, X Huang, JK Liu
Future Generation Computer Systems 52, 67-76, 2015
2542015
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
2372014
Secure distributed deduplication systems with improved reliability
J Li, X Chen, X Huang, S Tang, Y Xiang, MM Hassan, A Alelaiwi
IEEE Transactions on Computers 64 (12), 3569-3579, 2015
1712015
Verifiable auditing for outsourced database in cloud computing
J Wang, X Chen, X Huang, I You, Y Xiang
IEEE transactions on computers 64 (11), 3293-3303, 2015
1632015
Cost-effective authentic and anonymous data sharing with forward security
X Huang, JK Liu, S Tang, Y Xiang, K Liang, L Xu, J Zhou
IEEE Transactions on computers 64 (4), 971-983, 2014
1562014
Certificate-based signature: security model and efficient construction
J Li, X Huang, Y Mu, W Susilo, Q Wu
Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007
1552007
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012
1532012
On emerging family of elliptic curves to secure internet of things: ECC comes of age
Z Liu, X Huang, Z Hu, MK Khan, H Seo, L Zhou
IEEE Transactions on Dependable and Secure Computing 14 (3), 237-248, 2016
1512016
The system can't perform the operation now. Try again later.
Articles 1–20