مرور بر اساس تاریخ انتشار Xinyi Huang

Showing results 1 to 13 of 13
PreviewIssue DateTitleContributor(s)
7271008.pdf.jpg2016Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud ComputingShaohua Tang; Xiaoyu Li; Xinyi Huang; Yang Xiang; Lingling Xu
7492252.pdf.jpg2016Cryptographic Hierarchical Access Control for Dynamic StructuresArcangelo Castiglione; Alfredo De Santis; Barbara Masucci; Francesco Palmieri; Aniello Castiglione; Xinyi Huang
2017An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud DataJian Shen; Jun Shen; Xiaofeng Chen; Xinyi Huang; Willy Susilo
7305762.pdf.jpg2016Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing ServicesJoseph K. Liu; Man Ho Au; Xinyi Huang; Rongxing Lu; Jin Li
2017A Generic Table Recomputation-Based Higher-Order MaskingMing Tang; Zhenlong Qiu; Zhipeng Guo; Yi Mu; Xinyi Huang; Jean-Luc Danger
7366590.pdf.jpg2016Hierarchical and Shared Access ControlArcangelo Castiglione; Alfredo De Santis; Barbara Masucci; Francesco Palmieri; Aniello Castiglione; Jin Li; Xinyi Huang
2017Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud StorageYong Yu; Man Ho Au; Giuseppe Ateniese; Xinyi Huang; Willy Susilo; Yuanshun Dai; Geyong Min
2017Location-Sharing Systems With Enhanced Privacy in Mobile Online Social NetworksJin Li; Hongyang Yan; Zheli Liu; Xiaofeng Chen; Xinyi Huang; Duncan S. Wong
2017On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of AgeZhe Liu; Xinyi Huang; Zhi Hu; Muhammad Khurram Khan; Hwajeong Seo; Lu Zhou
7492188.pdf.jpg2016Privacy-Preserving and Regular Language Search Over Encrypted Cloud DataKaitai Liang; Xinyi Huang; Fuchun Guo; Joseph K. Liu
2017Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage DevicesSteven Gordon; Xinyi Huang; Atsuko Miyaji; Chunhua Su; Karin Sumongkayothin; Komwut Wipusitwarakun
2017Universally Composable RFID Mutual AuthenticationChunhua Su; Bagus Santoso; Yingjiu Li; Robert H. Deng; Xinyi Huang
2017Zipf&x2019;s Law in PasswordsDing Wang; Haibo Cheng; Ping Wang; Xinyi Huang; Gaopeng Jian