D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 54 Citations 10,656 248 World Ranking 3037 National Ranking 301

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Cryptography
  • Computer security

Xinyi Huang focuses on Computer security, Computer network, Authentication, Computer security model and Distributed computing. His Computer security research includes elements of Cloud computing security and Digital signature. Xinyi Huang interconnects Elliptic curve and Cryptography in the investigation of issues within Computer network.

His Authentication research incorporates themes from Data modeling, Data mining, Password, Authorization and Vehicular ad hoc network. His Computer security model research integrates issues from Cloud storage, Data integrity and Certificateless cryptography. His studies in Distributed computing integrate themes in fields like Security analysis, Computation, Server and Chip Authentication Program.

His most cited work include:

  • An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks (315 citations)
  • Securely Outsourcing Attribute-Based Encryption with Checkability (314 citations)
  • An overview of Fog computing and its security issues (225 citations)

What are the main themes of his work throughout his whole career to date?

Xinyi Huang mostly deals with Computer security, Computer network, Encryption, Authentication and Signature. His research is interdisciplinary, bridging the disciplines of Digital signature and Computer security. His Digital signature study combines topics from a wide range of disciplines, such as Data integrity and Public key infrastructure.

His research integrates issues of Wireless mesh network, Key, Distributed computing and Physical layer in his study of Computer network. The concepts of his Distributed computing study are interwoven with issues in Security analysis and Server. His research integrates issues of Password and Anonymity in his study of Authentication.

He most often published in these fields:

  • Computer security (62.74%)
  • Computer network (22.64%)
  • Encryption (20.75%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (62.74%)
  • Authentication (19.34%)
  • Encryption (20.75%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Authentication, Encryption, Computer network and Cryptography. In the subject of general Computer security, his work in Information privacy, Anonymity and Blockchain is often linked to Redaction and Service provider, thereby combining diverse domains of study. His research in the fields of Session key and Transport Layer Security overlaps with other disciplines such as Tree structured data.

His Encryption study incorporates themes from Database, Access control, Construct, Verifiable secret sharing and Key. His study in the fields of Secure communication, Handshake and Session under the domain of Computer network overlaps with other disciplines such as Permission. His Cryptography research is multidisciplinary, relying on both Security analysis, Homomorphic encryption, Server and Image content.

Between 2019 and 2021, his most popular works were:

  • HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes (25 citations)
  • Blockchain-based system for secure outsourcing of bilinear pairings (23 citations)
  • Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT (14 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • Computer security

His primary areas of study are Computer security, Encryption, Digital signature, Access control and Cryptography. His study in Information privacy, Smart contract, Anonymity, Blockchain and IEEE P1363 falls under the purview of Computer security. His Information privacy research includes themes of Attribute-based encryption and Key.

His research investigates the connection between Encryption and topics such as Construct that intersect with issues in Database, Index, Verifiable secret sharing and Bloom filter. His study focuses on the intersection of Digital signature and fields such as Authentication with connections in the field of Public-key cryptography. His research in Cryptography focuses on subjects like Security analysis, which are connected to Cryptographic primitive, Distributed computing, Server and Data Protection Act 1998.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He;Sherali Zeadally;Baowen Xu;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2015)

589 Citations

Securely Outsourcing Attribute-Based Encryption with Checkability

Jin Li;Xinyi Huang;Jingwei Li;Xiaofeng Chen.
IEEE Transactions on Parallel and Distributed Systems (2014)

456 Citations

On the security of certificateless signature schemes from asiacrypt 2003

Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)

429 Citations

An overview of Fog computing and its security issues

Ivan Stojmenovic;Sheng Wen;Xinyi Huang;Hao Luan.
Concurrency and Computation: Practice and Experience (2016)

392 Citations

Certificateless signature revisited

Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)

379 Citations

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

348 Citations

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen;Jun Shen;Xiaofeng Chen;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

314 Citations

Zipf’s Law in Passwords

Ding Wang;Haibo Cheng;Ping Wang;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

303 Citations

Targeted Online Password Guessing: An Underestimated Threat

Ding Wang;Zijian Zhang;Ping Wang;Jeff Yan.
computer and communications security (2016)

296 Citations

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

Chao Lin;Debiao He;Xinyi Huang;Kim-Kwang Raymond Choo.
Journal of Network and Computer Applications (2018)

290 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Xinyi Huang

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 73

Debiao He

Debiao He

Wuhan University

Publications: 70

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 67

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 66

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 58

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 58

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 52

Yi Mu

Yi Mu

Fujian Normal University

Publications: 52

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 51

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 45

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 36

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 30

Guomin Yang

Guomin Yang

Singapore Management University

Publications: 28

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 27

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 27

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 26

Trending Scientists

Eddie Kohler

Eddie Kohler

Harvard University

Tim Jenkinson

Tim Jenkinson

University of Oxford

David H. Owens

David H. Owens

University of Sheffield

Christopher L. Barrett

Christopher L. Barrett

University of Virginia

Werner Ens

Werner Ens

University of Manitoba

David K. Aspinwall

David K. Aspinwall

University of Birmingham

Salit Kark

Salit Kark

University of Queensland

Luz Boyero

Luz Boyero

University of the Basque Country

Karyn D. Rode

Karyn D. Rode

United States Geological Survey

M. K. Dougherty

M. K. Dougherty

Imperial College London

Massimo Pasqualetti

Massimo Pasqualetti

University of Pisa

Lawrence M. Berger

Lawrence M. Berger

University of Wisconsin–Madison

Mark Morris

Mark Morris

University of California, Los Angeles

Matthias Neubert

Matthias Neubert

Cornell University

Neal Katz

Neal Katz

University of Massachusetts Amherst

Gavin Rowell

Gavin Rowell

University of Adelaide

Something went wrong. Please try again later.