Search the dblp DataBase
Xun Yi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xun Yi , Kwok-Yan Lam A New Hash Function Based on Block Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:139-146 [Conf ] Xun Yi , Kwok-Yan Lam , Yongfei Han Differential Cryptanalysis of a Block Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:58-67 [Conf ] Chik How Tan , Xun Yi , Chee Kheong Siew Signature Schemes Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:445-459 [Conf ] Chik How Tan , Xun Yi , Chee Kheong Siew A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:428-442 [Conf ] Yu Liu , Chee Kheong Siew , Xun Yi , Yuan Miao Improving Object Oriented Analysis by Explicit Change Analysis. [Citation Graph (0, 0)][DBLP ] APSEC, 1999, pp:384-387 [Conf ] Xun Yi On Design and Analysis of a New Block Cipher. [Citation Graph (0, 0)][DBLP ] ASIAN, 1996, pp:213-222 [Conf ] Yiming Ye , Stephen J. Boies , Jiming Liu , Xun Yi Collective perception in massive, open, and heterogeneous multi-agent environment. [Citation Graph (0, 0)][DBLP ] AAMAS, 2002, pp:1175-1182 [Conf ] Xiao Feng Wang , Kwok-Yan Lam , Xun Yi , C. Q. Zhang , Eiji Okamoto Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. [Citation Graph (0, 0)][DBLP ] CIA, 1999, pp:291-302 [Conf ] Xun Yi Directed Transitive Signature Scheme. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:129-144 [Conf ] Xiao Feng Wang , Xun Yi , Kwok-Yan Lam , Eiji Okamoto Secure Information Gathering Agent for Internet Trading. [Citation Graph (0, 0)][DBLP ] DAI, 1998, pp:183-193 [Conf ] Xun Yi , Chee Kheong Siew , Yuan Miao Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases. [Citation Graph (0, 0)][DBLP ] E-Commerce Agents, 2001, pp:221-246 [Conf ] Xun Yi , Chee Kheong Siew Software Agent-Mediated Confidential Information Gathering System. [Citation Graph (0, 0)][DBLP ] ICPADS, 2000, pp:523-528 [Conf ] Shigeki Kitazawa , Xun Yi , Eiji Okamoto , Masahiro Mambo Improvement of Secure Access Control Agent for Distributed Files. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:185-0 [Conf ] Xun Yi , Xiao Feng Wang , Kwok-Yan Lam A Secure Intelligent Trade Agent System. [Citation Graph (0, 0)][DBLP ] Trends in Distributed Systems for Electronic Commerce, 1998, pp:218-228 [Conf ] Xun Yi , Kwok-Yan Lam , Shi Xin Cheng , Xiao Hu You A New Byte-Oriented Block Cipher. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:209-220 [Conf ] Xiao Feng Wang , Kwok-Yan Lam , Xun Yi Secure Agent-Mediated Mobile Payment. [Citation Graph (0, 0)][DBLP ] PRIMA, 1998, pp:162-173 [Conf ] Xun Yi , Xiao Feng Wang , Kwok-Yan Lam , Eiji Okamoto , D. Frank Hsu A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1998, pp:197-203 [Conf ] David Siew , Xun Yi Agent-Mediated Internet Advertising. [Citation Graph (0, 0)][DBLP ] WECWIS, 2000, pp:102-108 [Conf ] Liu Yu , Chee Kheong Siew , Xun Yi , Yuan Miao Improving Object Oriented Analysis by Explicit Change Analysis. [Citation Graph (0, 0)][DBLP ] TOOLS (36), 2000, pp:2-7 [Conf ] Xun Yi , Chee Kheong Siew , Xiao Feng Wang , Eiji Okamoto A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2000, v:8, n:1, pp:85-117 [Journal ] Xun Yi Authenticated key agreement in dynamic peer groups. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2004, v:326, n:1-3, pp:363-382 [Journal ] Xun Yi Identity-Based Fault-Tolerant Conference Key Agreement. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:170-178 [Journal ] Xun Yi Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:9, pp:1298-1299 [Journal ] Xun Yi , Yiming Ye Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2003, v:15, n:4, pp:1054-1055 [Journal ] Yiming Ye , Xun Yi , Juhnyoung Lee Performance and attention in multiagent object search team. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:2, pp:257-264 [Journal ] Secure Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Efficient and Short Certificateless Signature. [Citation Graph (, )][DBLP ] Modelling User Behaviour for Web Recommendation Using LDA Model. [Citation Graph (, )][DBLP ] ID-Based Group Password-Authenticated Key Exchange. [Citation Graph (, )][DBLP ] Secure Electronic Voting for Mobile Communications. [Citation Graph (, )][DBLP ] ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments. [Citation Graph (, )][DBLP ] Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [Citation Graph (, )][DBLP ] Privacy-preserving distributed association rule mining via semi-trusted mixer. [Citation Graph (, )][DBLP ] Search in 0.019secs, Finished in 0.020secs