Xun Yi


Ontology type: schema:Person     


Person Info

NAME

Xun

SURNAME

Yi

Publications in SciGraph latest 50 shown

  • 2019-03 Off-line digital cash schemes providing untraceability, anonymity and change in ELECTRONIC COMMERCE RESEARCH
  • 2018-10-20 Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain in WEB INFORMATION SYSTEMS ENGINEERING – WISE 2018
  • 2018-10-20 An Improved Lightweight RFID Authentication Protocol for Internet of Things in WEB INFORMATION SYSTEMS ENGINEERING – WISE 2018
  • 2018-04-17 Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller in COMBINATORIAL ALGORITHMS
  • 2017 Private Information Retrieval in ENCYCLOPEDIA OF DATABASE SYSTEMS
  • 2017 A Practical Authentication Protocol for Anonymous Web Browsing in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2017 Privacy Preserving Location Recommendations in WEB INFORMATION SYSTEMS ENGINEERING – WISE 2017
  • 2017 A Verifiable Ranked Choice Internet Voting System in WEB INFORMATION SYSTEMS ENGINEERING – WISE 2017
  • 2017 Fuzzy Public-Key Encryption Based on Biometric Data in PROVABLE SECURITY
  • 2016-09 A Practical Privacy-Preserving Recommender System in DATA SCIENCE AND ENGINEERING
  • 2016 CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps in INFORMATION SECURITY AND PRIVACY
  • 2015 Practical Threshold Password-Authenticated Secret Sharing Protocol in COMPUTER SECURITY -- ESORICS 2015
  • 2014 Homomorphic Encryption and Applications in NONE
  • 2014 ID-Based Two-Server Password-Authenticated Key Exchange in COMPUTER SECURITY - ESORICS 2014
  • 2013 (k − n) Oblivious Transfer Using Fully Homomorphic Encryption System in SECURITY AND PRIVACY IN COMMUNICATION NETWORKS
  • 2011-10 Certificateless message recovery signatures providing girault’s level-3 security in JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY (SCIENCE)
  • 2011-02 Efficient and short certificateless signatures secure against realistic adversaries in THE JOURNAL OF SUPERCOMPUTING
  • 2011 Practical Remote End-to-End Voting Scheme in ELECTRONIC GOVERNMENT AND THE INFORMATION SYSTEMS PERSPECTIVE
  • 2011 Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption in ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING
  • 2010-01 Wireless broadcast encryption based on smart cards in WIRELESS NETWORKS
  • 2010 Design and Analysis of “Flexible” k-out-of-n Signatures in AUTONOMIC AND TRUSTED COMPUTING
  • 2009 ID-Based Group Password-Authenticated Key Exchange in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2008 Efficient and Short Certificateless Signature in CRYPTOLOGY AND NETWORK SECURITY
  • 2006 Directed Transitive Signature Scheme in TOPICS IN CRYPTOLOGY – CT-RSA 2007
  • 2003-06-18 A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers in INFORMATION SECURITY AND PRIVACY
  • 2003 Privacy and Authentication for Agent Supported Cooperative Work in AGENT SUPPORTED COOPERATIVE WORK
  • 2002 Mobile Agent Based Auctionlike Negotiation in Internet Retail Commerce in E-COMMERCE AND INTELLIGENT METHODS
  • 2001-04-25 Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases in E-COMMERCE AGENTS
  • 2001 Signature Schemes Based on 3rd Order Shift Registers in INFORMATION SECURITY AND PRIVACY
  • 2000-10-27 Secure Agent-Mediated Mobile Payment in MULTIAGENT PLATFORMS
  • 2000 A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments in SECURITY OF DATA AND TRANSACTION PROCESSING
  • 2000-01 A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments in DISTRIBUTED AND PARALLEL DATABASES
  • 1999 Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce in COOPERATIVE INFORMATION AGENTS III
  • 1998 Differential cryptanalysis of a block cipher in INFORMATION SECURITY AND PRIVACY
  • 1998 A new byte-oriented block cipher in INFORMATION SECURITY
  • 1998 Secure Information Gathering Agent for Internet Trading in MULTI-AGENT SYSTEMS. THEORIES, LANGUAGES AND APPLICATIONS
  • 1997 A new hash function based on block cipher in INFORMATION SECURITY AND PRIVACY
  • 1997 Design, Analysis and Implementation of a New Hash Function Based on Block Cipher in SAFE COMP 97
  • 1996 On design and analysis of a new block cipher in CONCURRENCY AND PARALLELISM, PROGRAMMING, NETWORKING, AND SECURITY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.1017.7", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Yi", 
        "givenName": "Xun", 
        "id": "sg:person.014232773043.67", 
        "identifier": {
          "name": "orcid_id", 
          "type": "PropertyValue", 
          "value": [
            "0000-0001-7351-5724"
          ]
        }, 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014232773043.67", 
          "https://orcid.org/0000-0001-7351-5724"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:44", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1513.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.014232773043.67'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.014232773043.67'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.014232773043.67'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.014232773043.67'


     




    Preview window. Press ESC to close (or click here)


    ...