Xun Yi mostly deals with Computer security, Encryption, Theoretical computer science, Information privacy and Cryptography. In the field of Computer security, his study on Data security overlaps with subjects such as Application layer. Encryption and Cloud computing are commonly linked in his work.
His studies deal with areas such as Association rule learning, Data mining, k-nearest neighbors algorithm, Service provider and Information sensitivity as well as Information privacy. His Cryptography research is multidisciplinary, incorporating perspectives in Digital signature, Key assignment and Public-key cryptography. His research in Homomorphic encryption focuses on subjects like Private information retrieval, which are connected to Database.
His primary scientific interests are in Computer security, Encryption, Computer network, Cloud computing and Cryptography. Xun Yi focuses mostly in the field of Computer security, narrowing it down to topics relating to Protocol and, in certain cases, Elliptic curve cryptography. His Encryption research integrates issues from Service provider, Information privacy, Server and Private information retrieval.
His Computer network study integrates concerns from other disciplines, such as Key and Teleconference. His Cloud computing research is multidisciplinary, incorporating elements of Scalability, Outsourcing, Distributed computing and Access control. The Cryptography study combines topics in areas such as Theoretical computer science and Digital signature.
His primary areas of investigation include Computer security, Cloud computing, Encryption, Authentication and Computer network. Xun Yi conducted interdisciplinary study in his works that combined Computer security and Data sharing. The study incorporates disciplines such as Ciphertext, Scalability, Data mining, Overhead and Outsourcing in addition to Cloud computing.
Xun Yi is studying Homomorphic encryption, which is a component of Encryption. His work carried out in the field of Homomorphic encryption brings together such families of science as Theoretical computer science and Verifiable secret sharing. The concepts of his Computer network study are interwoven with issues in Service provider, Service, Enhanced Data Rates for GSM Evolution and Network measurement.
Xun Yi focuses on Encryption, Cloud computing, Homomorphic encryption, Computer security and Computer network. His research integrates issues of Index, Feature vector, Information retrieval, Service provider and Information privacy in his study of Encryption. Xun Yi has included themes like Scalability, Database, Outsourcing, Protocol and Server in his Cloud computing study.
His Homomorphic encryption study combines topics in areas such as Distributed database, Cloud database, Aggregate, Verifiable secret sharing and Blockchain. His study on Computer security is mostly dedicated to connecting different topics, such as Anonymous web browsing. Xun Yi has researched Computer network in several fields, including Enhanced Data Rates for GSM Evolution and Edge computing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Privacy-Preserving and Content-Protecting Location Based Queries
Russell Paulet;Md. Golam Kaosar;Xun Yi;Elisa Bertino.
IEEE Transactions on Knowledge and Data Engineering (2014)
Privacy-Preserving and Content-Protecting Location Based Queries
Russell Paulet;Md. Golam Kaosar;Xun Yi;Elisa Bertino.
IEEE Transactions on Knowledge and Data Engineering (2014)
An identity-based signature scheme from the Weil pairing
Xun Yi.
IEEE Communications Letters (2003)
An identity-based signature scheme from the Weil pairing
Xun Yi.
IEEE Communications Letters (2003)
Hash function based on chaotic tent maps
Xun Yi.
IEEE Transactions on Circuits and Systems Ii-express Briefs (2005)
Hash function based on chaotic tent maps
Xun Yi.
IEEE Transactions on Circuits and Systems Ii-express Briefs (2005)
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
Xun Yi;Russell Paulet;Elisa Bertino;Vijay Varadharajan.
IEEE Transactions on Knowledge and Data Engineering (2016)
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
Xun Yi;Russell Paulet;Elisa Bertino;Vijay Varadharajan.
IEEE Transactions on Knowledge and Data Engineering (2016)
Public and private blockchain in construction business process and information integration
Rebecca Yang;Ron Wakefield;Sainan Lyu;Sajani Jayasuriya.
Automation in Construction (2020)
Public and private blockchain in construction business process and information integration
Rebecca Yang;Ron Wakefield;Sainan Lyu;Sajani Jayasuriya.
Automation in Construction (2020)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
RMIT University
Purdue University West Lafayette
Commonwealth Scientific and Industrial Research Organisation
RMIT University
Fujian Normal University
University of Technology Sydney
Victoria University
Monash University
University of Sydney
Free University of Bozen-Bolzano
University of Glasgow
University of Bologna
Sapienza University of Rome
Jet Propulsion Lab
RWTH Aachen University
King Abdullah University of Science and Technology
Pacific Northwest National Laboratory
Institut National des Sciences Appliquées de Lyon
University of Edinburgh
University of Queensland
LabCorp (United States)
University of Melbourne
University of South Carolina
The University of Texas Health Science Center at Houston
University of Florida
Technical University of Darmstadt