Xinyi Huang focuses on Computer security, Computer network, Authentication, Computer security model and Distributed computing. His Computer security research includes elements of Cloud computing security and Digital signature. Xinyi Huang interconnects Elliptic curve and Cryptography in the investigation of issues within Computer network.
His Authentication research incorporates themes from Data modeling, Data mining, Password, Authorization and Vehicular ad hoc network. His Computer security model research integrates issues from Cloud storage, Data integrity and Certificateless cryptography. His studies in Distributed computing integrate themes in fields like Security analysis, Computation, Server and Chip Authentication Program.
Xinyi Huang mostly deals with Computer security, Computer network, Encryption, Authentication and Signature. His research is interdisciplinary, bridging the disciplines of Digital signature and Computer security. His Digital signature study combines topics from a wide range of disciplines, such as Data integrity and Public key infrastructure.
His research integrates issues of Wireless mesh network, Key, Distributed computing and Physical layer in his study of Computer network. The concepts of his Distributed computing study are interwoven with issues in Security analysis and Server. His research integrates issues of Password and Anonymity in his study of Authentication.
His scientific interests lie mostly in Computer security, Authentication, Encryption, Computer network and Cryptography. In the subject of general Computer security, his work in Information privacy, Anonymity and Blockchain is often linked to Redaction and Service provider, thereby combining diverse domains of study. His research in the fields of Session key and Transport Layer Security overlaps with other disciplines such as Tree structured data.
His Encryption study incorporates themes from Database, Access control, Construct, Verifiable secret sharing and Key. His study in the fields of Secure communication, Handshake and Session under the domain of Computer network overlaps with other disciplines such as Permission. His Cryptography research is multidisciplinary, relying on both Security analysis, Homomorphic encryption, Server and Image content.
His primary areas of study are Computer security, Encryption, Digital signature, Access control and Cryptography. His study in Information privacy, Smart contract, Anonymity, Blockchain and IEEE P1363 falls under the purview of Computer security. His Information privacy research includes themes of Attribute-based encryption and Key.
His research investigates the connection between Encryption and topics such as Construct that intersect with issues in Database, Index, Verifiable secret sharing and Bloom filter. His study focuses on the intersection of Digital signature and fields such as Authentication with connections in the field of Public-key cryptography. His research in Cryptography focuses on subjects like Security analysis, which are connected to Cryptographic primitive, Distributed computing, Server and Data Protection Act 1998.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Debiao He;Sherali Zeadally;Baowen Xu;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2015)
Securely Outsourcing Attribute-Based Encryption with Checkability
Jin Li;Xinyi Huang;Jingwei Li;Xiaofeng Chen.
IEEE Transactions on Parallel and Distributed Systems (2014)
On the security of certificateless signature schemes from asiacrypt 2003
Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)
An overview of Fog computing and its security issues
Ivan Stojmenovic;Sheng Wen;Xinyi Huang;Hao Luan.
Concurrency and Computation: Practice and Experience (2016)
Certificateless signature revisited
Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
Jian Shen;Jun Shen;Xiaofeng Chen;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)
Zipf’s Law in Passwords
Ding Wang;Haibo Cheng;Ping Wang;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)
Targeted Online Password Guessing: An Underestimated Threat
Ding Wang;Zijian Zhang;Ping Wang;Jeff Yan.
computer and communications security (2016)
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
Chao Lin;Debiao He;Xinyi Huang;Kim-Kwang Raymond Choo.
Journal of Network and Computer Applications (2018)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Fujian Normal University
University of Wollongong
Swinburne University of Technology
Xidian University
Monash University
Wuhan University
Wuhan University
Singapore University of Technology and Design
The University of Texas at San Antonio
Chinese Academy of Sciences
Harvard University
University of Oxford
University of Sheffield
University of Virginia
University of Manitoba
University of Birmingham
University of Queensland
University of the Basque Country
United States Geological Survey
Imperial College London
University of Pisa
University of Wisconsin–Madison
University of California, Los Angeles
Cornell University
University of Massachusetts Amherst
University of Adelaide