H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 47 Citations 8,824 183 World Ranking 3324 National Ranking 306

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Cryptography
  • Computer security

Xinyi Huang focuses on Computer security, Computer network, Authentication, Computer security model and Distributed computing. His Computer security research includes elements of Cloud computing security and Digital signature. Xinyi Huang interconnects Elliptic curve and Cryptography in the investigation of issues within Computer network.

His Authentication research incorporates themes from Data modeling, Data mining, Password, Authorization and Vehicular ad hoc network. His Computer security model research integrates issues from Cloud storage, Data integrity and Certificateless cryptography. His studies in Distributed computing integrate themes in fields like Security analysis, Computation, Server and Chip Authentication Program.

His most cited work include:

  • An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks (315 citations)
  • Securely Outsourcing Attribute-Based Encryption with Checkability (314 citations)
  • An overview of Fog computing and its security issues (225 citations)

What are the main themes of his work throughout his whole career to date?

Xinyi Huang mostly deals with Computer security, Computer network, Encryption, Authentication and Signature. His research is interdisciplinary, bridging the disciplines of Digital signature and Computer security. His Digital signature study combines topics from a wide range of disciplines, such as Data integrity and Public key infrastructure.

His research integrates issues of Wireless mesh network, Key, Distributed computing and Physical layer in his study of Computer network. The concepts of his Distributed computing study are interwoven with issues in Security analysis and Server. His research integrates issues of Password and Anonymity in his study of Authentication.

He most often published in these fields:

  • Computer security (62.74%)
  • Computer network (22.64%)
  • Encryption (20.75%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (62.74%)
  • Authentication (19.34%)
  • Encryption (20.75%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Authentication, Encryption, Computer network and Cryptography. In the subject of general Computer security, his work in Information privacy, Anonymity and Blockchain is often linked to Redaction and Service provider, thereby combining diverse domains of study. His research in the fields of Session key and Transport Layer Security overlaps with other disciplines such as Tree structured data.

His Encryption study incorporates themes from Database, Access control, Construct, Verifiable secret sharing and Key. His study in the fields of Secure communication, Handshake and Session under the domain of Computer network overlaps with other disciplines such as Permission. His Cryptography research is multidisciplinary, relying on both Security analysis, Homomorphic encryption, Server and Image content.

Between 2019 and 2021, his most popular works were:

  • HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes (25 citations)
  • Blockchain-based system for secure outsourcing of bilinear pairings (23 citations)
  • Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT (14 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Cryptography
  • Computer security

His primary areas of study are Computer security, Encryption, Digital signature, Access control and Cryptography. His study in Information privacy, Smart contract, Anonymity, Blockchain and IEEE P1363 falls under the purview of Computer security. His Information privacy research includes themes of Attribute-based encryption and Key.

His research investigates the connection between Encryption and topics such as Construct that intersect with issues in Database, Index, Verifiable secret sharing and Bloom filter. His study focuses on the intersection of Digital signature and fields such as Authentication with connections in the field of Public-key cryptography. His research in Cryptography focuses on subjects like Security analysis, which are connected to Cryptographic primitive, Distributed computing, Server and Data Protection Act 1998.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Securely Outsourcing Attribute-Based Encryption with Checkability

Jin Li;Xinyi Huang;Jingwei Li;Xiaofeng Chen.
IEEE Transactions on Parallel and Distributed Systems (2014)

432 Citations

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He;Sherali Zeadally;Baowen Xu;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2015)

413 Citations

On the security of certificateless signature schemes from asiacrypt 2003

Xinyi Huang;Willy Susilo;Yi Mu;Futai Zhang.
cryptology and network security (2005)

412 Citations

Certificateless signature revisited

Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)

365 Citations

An overview of Fog computing and its security issues

Ivan Stojmenovic;Sheng Wen;Xinyi Huang;Hao Luan.
Concurrency and Computation: Practice and Experience (2016)

292 Citations

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

259 Citations

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid

Joonsang Baek;Quang Hieu Vu;Joseph K. Liu;Xinyi Huang.
ieee international conference on cloud computing technology and science (2015)

248 Citations

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen;Jun Shen;Xiaofeng Chen;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

242 Citations

A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems

Xinyi Huang;Yang Xiang;A. Chonka;Jianying Zhou.
IEEE Transactions on Parallel and Distributed Systems (2011)

239 Citations

New Publicly Verifiable Databases with Efficient Updates

Xiaofeng Chen;Jin Li;Xinyi Huang;Jianfeng Ma.
IEEE Transactions on Dependable and Secure Computing (2015)

223 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Xinyi Huang

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 73

Debiao He

Debiao He

Wuhan University

Publications: 70

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 67

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 66

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 58

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 58

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 52

Yi Mu

Yi Mu

Fujian Normal University

Publications: 52

Jin Li

Jin Li

Guangzhou University

Publications: 51

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 45

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 36

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 30

Guomin Yang

Guomin Yang

University of Wollongong

Publications: 28

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 27

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 27

Something went wrong. Please try again later.