Browse by Author: Yi, Xun

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | No Grouping
Number of items: 56.

Margono, Hendro, Yi, Xun and Raikundalia, Gitesh K (2014) Mining Indonesian cyber bullying patterns in social networks. In: Proceedings of the Thirty-Seventh Australasian Computer Science Conference (ACSC 2014). Thomas, Bruce and Parry, Dave, eds. Conferences in Research and Practice in Information Technology (147). Australian Computer Society, Auckland, New Zealand, pp. 115-124.

Wang, G, Wang, Hua ORCID: 0000-0002-8465-0996, Tao, X, Zhang, J, Yi, Xun and Yong, J (2014) Positive Influence Dominating Set Games. In: 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 21 May 2014-23 May 2014, Taiwan.

Yi, Xun, Paulet, R, Bertino, E and Varadharajan, Vijay (2014) Practical k nearest neighbor queries with location privacy. In: 2014 IEEE 30 th International Conference on Data Engineering, 31 March 2014-04 April 2014, Chicago, IL.

Paulet, Russell, Kaosar, MG, Yi, Xun and Bertino, E (2014) Privacy-preserving and content-protecting location based queries. IEEE Transactions on Knowledge and Data Engineering, 26 (5). 1200 - 1210. ISSN 1041-4347

Yi, Xun, Bertino, E, Vaidya, J and Xing, C (2014) Private searching on streaming data based on keyword frequency. IEEE Transactions on Dependable and Secure Computing, 11 (2). 155 - 167. ISSN 1545-5971

Wang, Hua ORCID: 0000-0002-8465-0996, Yi, Xun, Bertino, E and Sun, L (2014) Protecting outsourced data in cloud computing through access management. Concurrency and Computation Practice and Experience, 28 (3). 600 - 615. ISSN 1532-0626

Margono, Hendro, Yi, Xun and Raikundalia, Gitesh K (2013) Using association rules mining to analyze human rights violations in Indonesia. International journal of computer science and electronics engineering, 1 (1). pp. 65-69. ISSN 2320-401X (print), 2320-4028 (online)

Xu, Guandong, Gu, Yanhui and Yi, Xun (2013) On Group Extraction and Fusion for Tag-Based Recommendation. In: Social Media Mining and Social Network Analysis: Emerging Research. Xu, Guandong and Li, Lin, eds. Information Science Reference, Hershey, Pennsylvania, pp. 211-223.

Yi, Xun, Ling, S and Wang, Huaxiong (2013) Efficient two-server password-only authenticated key exchange. IEEE Transactions on Parallel and Distributed Systems, 24 (9). 1773 - 1782. ISSN 1045-9219

Yi, Xun, Paulet, R, Bertino, E and Xu, Guandong (2013) Private data warehouse queries. In: ACM Symposium on Access Control Models and Technologies, 12 June 2013-14 June 2013, Amsterdam, The Netherlands.

Yi, Xun, Willemson, J and Nait-Abdesselam, F (2013) Privacy-preserving wireless medical sensor network. In: TrustCom 2013, 16 July 2013-18 July 2013, Melbourne, Vic.

Yi, Xun, Miao, Yuan, Bertino, E and Willemson, J (2013) Multiparty Privacy Protection for Electronic Health Records. In: 2013 IEEE Global Communications Conference (GLOBECOM), 9 December 2013 - 13 December 2013, Atlanta, USA.

Kaosar, Mohammed, Mamun, Quazi, Islam, Rafiqul and Yi, Xun (2013) (k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. In: 9th International ICST Conference, SecureComm2013, 25 September 2013 - 28 September 2013, Sydney, NSW.

Yi, Xun, Paulet, Russell and Bertino, Elisa (2013) Private Information Retrieval. Synthesis lectures on information security, privacy, & trust (5). Morgan and Claypool Publishers, San Rafael, California.

Wu, ZongDa, Xu, Guandong, Yu, Zong, Yi, Xun, Cheng, EnHong and Zhang, Yanchun (2012) Executing SQL queries over encrypted character strings in the Database-As-Service model. Knowledge-Based Systems, 35. pp. 332-348. ISSN 0950-7051 (print) 1872-7409 (on-line)

Yi, Xun and Zhang, Yanchun (2012) Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Information systems, 38 (1). pp. 97-107. ISSN 0306-4379 (print), 1873-6076 (online)

Yi, Xun and Okamoto, Eiji (2012) Practical Internet voting system. Journal of Network and Computer Applications, 36 (1). pp. 378-387. ISSN 1084-8045

Yi, Xun, Kaosar, Md. Golam, Paulet, Russell and Bertino, E (2012) Single-Database Private Information Retrieval from Fully Homomorphic Encryption. IEEE Transactions on Knowledge and Data Engineering, 25 (5). pp. 1125-1134. ISSN 1041-4347

Yi, Xun (2012) Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Transactions on Dependable and Secure Computing, 9 (2). pp. 303-304. ISSN 1545-5971

Paulet, Russell, Kaosar, Md. Golam, Yi, Xun and Bertino, E (2012) Privacy-Preserving and Content-Protection Location Based Queries. In: 2012 IEEE 28th International Conference on Data Engineering (ICDE 2012). IEEE, United States, pp. 44-53.

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2012) Fully homomorphic encryption based two-party association rule mining. Data and Knowledge Engineering, 76-78. pp. 1-15. ISSN 0169-023X

Yi, Xun and Xing, Chaoping (2012) Private (t,n) Threshold Searching on Streaming Data. In: SocialCom/PASSAT 2012, 3rd September 2012 - 5th September 2012, Amsterdam, Netherlands.

Zong, Y, Xu, Guandong, Jin, P, Yi, Xun, Chen, E and Wu, Z (2012) A projective clustering algorithm based on significant local dense areas. In: 2012 IEEE World Congress on Computational Intelligence (WCCI), 10 June 2012-15 June 2012, Brisbane Convention Centre, Brisbane, Australia.

Yi, Xun, Tso, Raylin and Okamoto, Eiji (2012) Identity-based password-authenticated key exchange for client/server model. In: International Conference on Security and Cryptography, 24 July 2012-27 July 2012, Rome, Italy.

Xu, Guandong, Li, Lin, Zhang, Yanchun, Yi, Xun and Kitsuregawa, Masaru (2011) Modeling user hidden navigational behavior for web recommendation. Web Intelligence and Agent Systems, 9 (3). pp. 239-255. ISSN 1570-1263

Kaosar, Md. Golam and Yi, Xun (2011) Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree a one-pass FP-tree method to perform association rule mining without compromising any data privacy among two parties. International Journal of Information Security and Privacy, 5 (2). pp. 13-32. ISSN 1930-1650 (print) 1930-1669 (online)

Yi, Xun and Okamoto, Eiji (2011) Key Agreement for Large-Scale Dynamic Peer Group. GSTF International Journal on Computing, 1 (2). pp. 52-60. ISSN 2010-2283

Tso, Raylin, Yi, Xun and Huang, Xinyi (2011) Efficient and short certificateless signatures secure against realistic adversaries. Journal of Supercomputing, 55 (2). pp. 173-191. ISSN 0920-8542 (print) 1573-0484 (online)

Kaosar, Md. Golam and Yi, Xun (2011) Privacy Preserving Data Gathering in Wireless Sensor Network. In: Network Security, Administration and Management: Advancing Technology and Practice. Kar, Dulal Chandra and Syed, Mahbubur Rahman, eds. Information Science Reference, Hershey, PA, pp. 237-251.

Tso, Ray-lin, Kim, Cheonshik and Yi, Xun (2011) Certificateless Message Recovery Signatures Providing Girault's Level-3 Security. Journal of Shanghai Jiaotong University (Science), 16 (5). pp. 577-585. ISSN 1007-1172 (print) 1995-8188 (online)

Yi, Xun and Okamoto, Eiji (2011) Practical remote end-to-end voting scheme. In: Electronic Government and the Information Systems Perspective : Second International Conference, EGOVIS 2011 : Toulouse, France, August 29 - September 2, 2011 : proceedings. Andersen, Kim Normann, Francesconi, Enrico, Gronlund, Ake and van Engers, Tom M, eds. Lecture notes in computer science (6866). Springer, Heidelberg, Germany, pp. 386-400.

Yi, Xun, Tso, Raylin and Okamoto, Eiji (2011) Three-Party Password-Authenticated Key Exchange without Random Oracles. In: SECRYPT 2011 : Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011. Lopez, Javier and Samarati, Pierangela, eds. SciTePress, pp. 15-24.

Yi, Xun and Bertino, Elisa (2011) Private searching for single and conjunctive keywords on streaming data. In: Proceedings of the 10th annual ACM workshop on Privacy in the Electronic Society. Association for Computing Machinery, New York, pp. 153-158.

Yi, Xun and Okamoto, Eiji (2011) Practical mobile electronic election. In: System Integration (SII), 2011 IEEE/SICE International Syposium. IEEE, Piscataway, N.J., pp. 1119-1124.

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2011) Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption. In: Algorithms and Architectures for Parallel Processing: 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part I. Xiang, Yang, Cuzzocrea, Alfredo, Hobbs, Michael and Zhou, Wanlei, eds. Lecture Notes in Computer Science, Vol. 7016 . Springer, Heidelberg, pp. 360-370.

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2011) Secure Two-Party Association Rule Mining. In: Information Security 2011 : Proceedings of the Ninth Australasian Information Security Conference (AISC 2011), Perth, Australia, 17-20 January 2011. Boyd, Colin and Pieprzyk, Josef, eds. Conferences in Research and Practice in Information Technology (116). Australian Computer Society, Sydney, Australia, pp. 15-22.

Xu, Zhuojia and Yi, Xun (2011) Classification of privacy-preserving distributed data mining protocols. In: 2011 Sixth International Conference on Digital Information Management (ICDIM). IEEE, Piscataway, N.J., pp. 337-342.

Paulet, R, Kaosar, G and Yi, Xun (2011) K-Anonymous Private Query Based on Blind Signature and Oblivious Transfer. In: International Cyber Resilience Conference, 01 August 2011-02 August 2011, Perth, Australia.

Kaosar, Md. Golam and Yi, Xun (2010) Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices. International Journal of computer science and information security, 8 (1). pp. 44-51. ISSN 1947-5500

Tso, Raylin, Yi, Xun, Ito, Tadahiko, Okamoto, Takeshi and Okamoto, Eiji (2010) Design and analysis of "flexible" k-out-of-n signatures. In: Autonomic and trusted computing : 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings. Xie, Bing, Branke, Juergen, Sadjadi, S Masoud, Zhang, Darqing and Zhou, Xingshe, eds. Lecture notes in computer science (6407). Springer, Boca Raton, Florida, pp. 255-267.

Yi, Xun (2010) Security Analysis of Yang et al.s' Practical Password-Based Two-Server Authentication and Key Exchange Systems. In: 2010 Fourth International Conference on Network and System Security (NSS 2010) : 1-3 September 2010, Melbourne, Australia, proceedings. Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza, eds. IEEE, Piscataway, NJ, pp. 574-578.

Yi, Xun and Okamoto, Eiji (2010) Key Agreement in Large-Scale Dynamic Peer Group. In: Proceedings of the annual International Conference on Advances in Distributed and Parallel Computing (ADPC 2010) and Real-Time and Embedded Systems (RTES 2010) : 1-2 November 2010, Mandarin Orchard Hotel, Singapore. Avadhani, P. S, ed. Global Science and Technology Forum, Singapore, pp. 3-8.

Tso, Raylin and Yi, Xun (2010) Certificateless proxy signature and its extension to blind signature. In: 2010 Fourth International Conference on Network and System Security (NSS 2010) : Melbourne, Australia, 1 - 3 September 2010, proceedings. Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza, eds. IEEE, Piscataway, N.J., pp. 542-547.

Yi, Xun (2010) Security of Hou-Tan Electronic Cash Scheme. In: Workshop on Applications and Techniques in Information Security, 08 November 2010-08 November 2010, Melbourne.

Kaosar, MG, Xu, Z and Yi, Xun (2009) Distributed association rule mining with minimum communication overhead. In: 8th Australasian Data Mining Conference (AusDM), 01 December 2009-04 December 2009, Darlinghurst, Australia.

Yi, Xun and Zhang, Yanchun (2009) Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Information systems, 34 (3). pp. 371-380. ISSN 0306-4379

Yi, Xun, Tso, Raylin and Okamoto, Eiji (2009) ID-Based Group Password-Authenticated Key Exchange. Lecture Notes in Computer Science, 5824. pp. 192-211. ISSN 0302-9743

Kaosar, Md. Golam and Yi, Xun (2009) Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933. ISSN 1994-4608 (print) 1992-8424 (online)

Batten, Lynn and Yi, Xun (2008) Efficient broadcast key distribution with dynamic revocation. Security and Communication Networks, 1 (4). pp. 351-362. ISSN 1939-0122

Yi, Xun and Batten, Lynn (2008) Wireless Broadcast Encryption Based on Smart Cards. Wireless Networks, 16 (1). pp. 153-165. ISSN 1022-0038

Tso, Raylin, Yi, Xun and Huang, Xinyi (2008) Efficient and Short Certificateless Signature. Lecture Notes in Computer Science, 5339. pp. 64-79. ISSN 0302-9743

Xu, Guandong, Zhang, Yanchun and Yi, Xun (2008) Modelling User Behaviour for Web Recommendation Using LDA Model. In: 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Workshops WI-IAT Workshops 2008 : 9-12 December 2008 University of Technology, Sydney, Australia, proceedings. Li, Yuefeng, Pasi, Gabriella, Zhang, Chengqi, Cercone, Nick and Cao, Longbing, eds. IEEE Computer Society, Los Alamitos, California, pp. 529-532.

Yi, Xun, Faulkner, Michael and Okamoto, Eiji (2008) Securing Wireless Sensor Networks. In: ARES 2008 Third International Conference on Availability, Reliability and Security. IEEE Computer Society, Los Alamitos, CA, pp. 497-502.

Yi, Xun (2004) Authenticated key agreement in dynamic peer groups. Theoretical computer science, 326 (1-3). pp. 363-382. ISSN 0304-3975

Yi, Xun (2004) Identity-based fault tolerant conference key agreement. IEEE transactions on dependable and secure computing, 1 (3). pp. 170-178. ISSN 1545-5971

Yi, Xun (2003) An identity-based signature scheme from the weil pairing. IEEE Communications Letters, 7 (2). pp. 76-78. ISSN 1089-7798