Xun Yi

Ontology type: schema:Person     

Person Info





Publications in SciGraph latest 50 shown

  • 2019-03 Off-line digital cash schemes providing untraceability, anonymity and change in ELECTRONIC COMMERCE RESEARCH
  • 2018-10-20 Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain in WEB INFORMATION SYSTEMS ENGINEERING – WISE 2018
  • 2018-10-20 An Improved Lightweight RFID Authentication Protocol for Internet of Things in WEB INFORMATION SYSTEMS ENGINEERING – WISE 2018
  • 2018-04-17 Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller in COMBINATORIAL ALGORITHMS
  • 2017 Private Information Retrieval in ENCYCLOPEDIA OF DATABASE SYSTEMS
  • 2017 A Practical Authentication Protocol for Anonymous Web Browsing in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2017 Privacy Preserving Location Recommendations in WEB INFORMATION SYSTEMS ENGINEERING – WISE 2017
  • 2017 A Verifiable Ranked Choice Internet Voting System in WEB INFORMATION SYSTEMS ENGINEERING – WISE 2017
  • 2017 Fuzzy Public-Key Encryption Based on Biometric Data in PROVABLE SECURITY
  • 2016-09 A Practical Privacy-Preserving Recommender System in DATA SCIENCE AND ENGINEERING
  • 2016 CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps in INFORMATION SECURITY AND PRIVACY
  • 2015 Practical Threshold Password-Authenticated Secret Sharing Protocol in COMPUTER SECURITY -- ESORICS 2015
  • 2014 Homomorphic Encryption and Applications in NONE
  • 2014 ID-Based Two-Server Password-Authenticated Key Exchange in COMPUTER SECURITY - ESORICS 2014
  • 2013 (k − n) Oblivious Transfer Using Fully Homomorphic Encryption System in SECURITY AND PRIVACY IN COMMUNICATION NETWORKS
  • 2011-10 Certificateless message recovery signatures providing girault’s level-3 security in JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY (SCIENCE)
  • 2011-02 Efficient and short certificateless signatures secure against realistic adversaries in THE JOURNAL OF SUPERCOMPUTING
  • 2011 Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption in ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING
  • 2010-01 Wireless broadcast encryption based on smart cards in WIRELESS NETWORKS
  • 2010 Design and Analysis of “Flexible” k-out-of-n Signatures in AUTONOMIC AND TRUSTED COMPUTING
  • 2009 ID-Based Group Password-Authenticated Key Exchange in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2008 Efficient and Short Certificateless Signature in CRYPTOLOGY AND NETWORK SECURITY
  • 2006 Directed Transitive Signature Scheme in TOPICS IN CRYPTOLOGY – CT-RSA 2007
  • 2003-06-18 A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers in INFORMATION SECURITY AND PRIVACY
  • 2003 Privacy and Authentication for Agent Supported Cooperative Work in AGENT SUPPORTED COOPERATIVE WORK
  • 2002 Mobile Agent Based Auctionlike Negotiation in Internet Retail Commerce in E-COMMERCE AND INTELLIGENT METHODS
  • 2001-04-25 Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases in E-COMMERCE AGENTS
  • 2001 Signature Schemes Based on 3rd Order Shift Registers in INFORMATION SECURITY AND PRIVACY
  • 2000-10-27 Secure Agent-Mediated Mobile Payment in MULTIAGENT PLATFORMS
  • 2000 A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments in SECURITY OF DATA AND TRANSACTION PROCESSING
  • 2000-01 A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments in DISTRIBUTED AND PARALLEL DATABASES
  • 1999 Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce in COOPERATIVE INFORMATION AGENTS III
  • 1998 Differential cryptanalysis of a block cipher in INFORMATION SECURITY AND PRIVACY
  • 1998 A new byte-oriented block cipher in INFORMATION SECURITY
  • 1998 Secure Information Gathering Agent for Internet Trading in MULTI-AGENT SYSTEMS. THEORIES, LANGUAGES AND APPLICATIONS
  • 1997 A new hash function based on block cipher in INFORMATION SECURITY AND PRIVACY
  • 1997 Design, Analysis and Implementation of a New Hash Function Based on Block Cipher in SAFE COMP 97
  • 1996 On design and analysis of a new block cipher in CONCURRENCY AND PARALLELISM, PROGRAMMING, NETWORKING, AND SECURITY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.1017.7", 
              "type": "Organization"
            "isCurrent": true, 
            "type": "OrganizationRole"
        "familyName": "Yi", 
        "givenName": "Xun", 
        "id": "sg:person.014232773043.67", 
        "identifier": {
          "name": "orcid_id", 
          "type": "PropertyValue", 
          "value": [
        "sameAs": [
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:44", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1513.json", 
        "type": "Person"

    Download the RDF metadata as:  json-ld nt turtle xml License info


    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.014232773043.67'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.014232773043.67'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.014232773043.67'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.014232773043.67'


    Preview window. Press ESC to close (or click here)