The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xun Yi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xun Yi, Kwok-Yan Lam
    A New Hash Function Based on Block Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:139-146 [Conf]
  2. Xun Yi, Kwok-Yan Lam, Yongfei Han
    Differential Cryptanalysis of a Block Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:58-67 [Conf]
  3. Chik How Tan, Xun Yi, Chee Kheong Siew
    Signature Schemes Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:445-459 [Conf]
  4. Chik How Tan, Xun Yi, Chee Kheong Siew
    A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:428-442 [Conf]
  5. Yu Liu, Chee Kheong Siew, Xun Yi, Yuan Miao
    Improving Object Oriented Analysis by Explicit Change Analysis. [Citation Graph (0, 0)][DBLP]
    APSEC, 1999, pp:384-387 [Conf]
  6. Xun Yi
    On Design and Analysis of a New Block Cipher. [Citation Graph (0, 0)][DBLP]
    ASIAN, 1996, pp:213-222 [Conf]
  7. Yiming Ye, Stephen J. Boies, Jiming Liu, Xun Yi
    Collective perception in massive, open, and heterogeneous multi-agent environment. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2002, pp:1175-1182 [Conf]
  8. Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto
    Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. [Citation Graph (0, 0)][DBLP]
    CIA, 1999, pp:291-302 [Conf]
  9. Xun Yi
    Directed Transitive Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:129-144 [Conf]
  10. Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto
    Secure Information Gathering Agent for Internet Trading. [Citation Graph (0, 0)][DBLP]
    DAI, 1998, pp:183-193 [Conf]
  11. Xun Yi, Chee Kheong Siew, Yuan Miao
    Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases. [Citation Graph (0, 0)][DBLP]
    E-Commerce Agents, 2001, pp:221-246 [Conf]
  12. Xun Yi, Chee Kheong Siew
    Software Agent-Mediated Confidential Information Gathering System. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2000, pp:523-528 [Conf]
  13. Shigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo
    Improvement of Secure Access Control Agent for Distributed Files. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:185-0 [Conf]
  14. Xun Yi, Xiao Feng Wang, Kwok-Yan Lam
    A Secure Intelligent Trade Agent System. [Citation Graph (0, 0)][DBLP]
    Trends in Distributed Systems for Electronic Commerce, 1998, pp:218-228 [Conf]
  15. Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You
    A New Byte-Oriented Block Cipher. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:209-220 [Conf]
  16. Xiao Feng Wang, Kwok-Yan Lam, Xun Yi
    Secure Agent-Mediated Mobile Payment. [Citation Graph (0, 0)][DBLP]
    PRIMA, 1998, pp:162-173 [Conf]
  17. Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu
    A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:197-203 [Conf]
  18. David Siew, Xun Yi
    Agent-Mediated Internet Advertising. [Citation Graph (0, 0)][DBLP]
    WECWIS, 2000, pp:102-108 [Conf]
  19. Liu Yu, Chee Kheong Siew, Xun Yi, Yuan Miao
    Improving Object Oriented Analysis by Explicit Change Analysis. [Citation Graph (0, 0)][DBLP]
    TOOLS (36), 2000, pp:2-7 [Conf]
  20. Xun Yi, Chee Kheong Siew, Xiao Feng Wang, Eiji Okamoto
    A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:1, pp:85-117 [Journal]
  21. Xun Yi
    Authenticated key agreement in dynamic peer groups. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:326, n:1-3, pp:363-382 [Journal]
  22. Xun Yi
    Identity-Based Fault-Tolerant Conference Key Agreement. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:170-178 [Journal]
  23. Xun Yi
    Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:9, pp:1298-1299 [Journal]
  24. Xun Yi, Yiming Ye
    Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:4, pp:1054-1055 [Journal]
  25. Yiming Ye, Xun Yi, Juhnyoung Lee
    Performance and attention in multiagent object search team. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:2, pp:257-264 [Journal]

  26. Secure Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  27. Efficient and Short Certificateless Signature. [Citation Graph (, )][DBLP]


  28. Modelling User Behaviour for Web Recommendation Using LDA Model. [Citation Graph (, )][DBLP]


  29. ID-Based Group Password-Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  30. Secure Electronic Voting for Mobile Communications. [Citation Graph (, )][DBLP]


  31. ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments. [Citation Graph (, )][DBLP]


  32. Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [Citation Graph (, )][DBLP]


  33. Privacy-preserving distributed association rule mining via semi-trusted mixer. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002