Research Repository

Browse by Author: Yi, Xun

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | No Grouping
Number of items: 53.

Article

Paulet, Russell, Kaosar, MG, Yi, Xun and Bertino, E (2014) Privacy-preserving and content-protecting location based queries. IEEE Transactions on Knowledge and Data Engineering, 26 (5). 1200 - 1210. ISSN 1041-4347

Yi, Xun, Bertino, E, Vaidya, J and Xing, C (2014) Private searching on streaming data based on keyword frequency. IEEE Transactions on Dependable and Secure Computing, 11 (2). 155 - 167. ISSN 1545-5971

Wang, Hua ORCID: 0000-0002-8465-0996, Yi, Xun, Bertino, E and Sun, L (2014) Protecting outsourced data in cloud computing through access management. Concurrency and Computation Practice and Experience, 28 (3). 600 - 615. ISSN 1532-0626

Margono, Hendro, Yi, Xun and Raikundalia, Gitesh K (2013) Using association rules mining to analyze human rights violations in Indonesia. International journal of computer science and electronics engineering, 1 (1). pp. 65-69. ISSN 2320-401X (print), 2320-4028 (online)

Yi, Xun, Ling, S and Wang, Huaxiong (2013) Efficient two-server password-only authenticated key exchange. IEEE Transactions on Parallel and Distributed Systems, 24 (9). 1773 - 1782. ISSN 1045-9219

Wu, ZongDa, Xu, Guandong, Yu, Zong, Yi, Xun, Cheng, EnHong and Zhang, Yanchun (2012) Executing SQL queries over encrypted character strings in the Database-As-Service model. Knowledge-Based Systems, 35. pp. 332-348. ISSN 0950-7051 (print) 1872-7409 (on-line)

Yi, Xun and Zhang, Yanchun (2012) Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Information systems, 38 (1). pp. 97-107. ISSN 0306-4379 (print), 1873-6076 (online)

Yi, Xun and Okamoto, Eiji (2012) Practical Internet voting system. Journal of Network and Computer Applications, 36 (1). pp. 378-387. ISSN 1084-8045

Yi, Xun, Kaosar, Md. Golam, Paulet, Russell and Bertino, E (2012) Single-Database Private Information Retrieval from Fully Homomorphic Encryption. IEEE Transactions on Knowledge and Data Engineering, 25 (5). pp. 1125-1134. ISSN 1041-4347

Yi, Xun (2012) Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Transactions on Dependable and Secure Computing, 9 (2). pp. 303-304. ISSN 1545-5971

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2012) Fully homomorphic encryption based two-party association rule mining. Data and Knowledge Engineering, 76-78. pp. 1-15. ISSN 0169-023X

Xu, Guandong, Li, Lin, Zhang, Yanchun, Yi, Xun and Kitsuregawa, Masaru (2011) Modeling user hidden navigational behavior for web recommendation. Web Intelligence and Agent Systems, 9 (3). pp. 239-255. ISSN 1570-1263

Kaosar, Md. Golam and Yi, Xun (2011) Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree a one-pass FP-tree method to perform association rule mining without compromising any data privacy among two parties. International Journal of Information Security and Privacy, 5 (2). pp. 13-32. ISSN 1930-1650 (print) 1930-1669 (online)

Yi, Xun and Okamoto, Eiji (2011) Key Agreement for Large-Scale Dynamic Peer Group. GSTF International Journal on Computing, 1 (2). pp. 52-60. ISSN 2010-2283

Tso, Raylin, Yi, Xun and Huang, Xinyi (2011) Efficient and short certificateless signatures secure against realistic adversaries. Journal of Supercomputing, 55 (2). pp. 173-191. ISSN 0920-8542 (print) 1573-0484 (online)

Tso, Ray-lin, Kim, Cheonshik and Yi, Xun (2011) Certificateless Message Recovery Signatures Providing Girault's Level-3 Security. Journal of Shanghai Jiaotong University (Science) , 16 (5). pp. 577-585. ISSN 1007-1172 (print) 1995-8188 (online)

Kaosar, Md. Golam and Yi, Xun (2010) Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices. International Journal of computer science and information security, 8 (1). pp. 44-51. ISSN 1947-5500

Yi, Xun and Zhang, Yanchun (2009) Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Information systems, 34 (3). pp. 371-380. ISSN 0306-4379

Yi, Xun, Tso, Raylin and Okamoto, Eiji (2009) ID-Based Group Password-Authenticated Key Exchange. Lecture Notes in Computer Science, 5824. pp. 192-211. ISSN 0302-9743

Kaosar, Md. Golam and Yi, Xun (2009) Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933. ISSN 1994-4608 (print) 1992-8424 (online)

Batten, Lynn and Yi, Xun (2008) Efficient broadcast key distribution with dynamic revocation. Security and Communication Networks, 1 (4). pp. 351-362. ISSN 1939-0122

Yi, Xun and Batten, Lynn (2008) Wireless Broadcast Encryption Based on Smart Cards. Wireless Networks, 16 (1). pp. 153-165. ISSN 1022-0038

Tso, Raylin, Yi, Xun and Huang, Xinyi (2008) Efficient and Short Certificateless Signature. Lecture Notes in Computer Science, 5339. pp. 64-79. ISSN 0302-9743

Yi, Xun (2004) Authenticated key agreement in dynamic peer groups. Theoretical computer science, 326 (1-3). pp. 363-382. ISSN 0304-3975

Yi, Xun (2004) Identity-based fault tolerant conference key agreement. IEEE transactions on dependable and secure computing, 1 (3). pp. 170-178. ISSN 1545-5971

Yi, Xun (2003) An identity-based signature scheme from the weil pairing. IEEE Communications Letters, 7 (2). pp. 76-78. ISSN 1089-7798

Book Section

Margono, Hendro, Yi, Xun and Raikundalia, Gitesh K (2014) Mining Indonesian cyber bullying patters in social networks. In: Proceedings of the Thirty-Seventh Australasian Computer Science Conference (ACSC 2014). Thomas, Bruce and Parry, Dave, eds. Conferences in Research and Practice in Information Technology (147). Australian Computer Society, Auckland, New Zealand, pp. 115-124.

Xu, Guandong, Gu, Yanhui and Yi, Xun (2013) On Group Extraction and Fusion for Tag-Based Recommendation. In: Social Media Mining and Social Network Analysis: Emerging Research. Xu, Guandong and Li, Lin, eds. Information Science Reference, Hershey, Pennsylvania, pp. 211-223.

Paulet, Russell, Kaosar, Md. Golam, Yi, Xun and Bertino, Elisa (2012) Privacy-Preserving and Content-Protection Location Based Queries. In: 2012 IEEE 28th International Conference on Data Engineering (ICDE 2012). IEEE, United States, pp. 44-53.

Kaosar, Md. Golam and Yi, Xun (2011) Privacy Preserving Data Gathering in Wireless Sensor Network. In: Network Security, Administration and Management: Advancing Technology and Practice. Kar, Dulal Chandra and Syed, Mahbubur Rahman, eds. Information Science Reference, Hershey, PA, pp. 237-251.

Yi, Xun and Okamoto, Eiji (2011) Practical remote end-to-end voting scheme. In: Electronic Government and the Information Systems Perspective : Second International Conference, EGOVIS 2011 : Toulouse, France, August 29 - September 2, 2011 : proceedings. Andersen, Kim Normann, Francesconi, Enrico, Gronlund, Ake and van Engers, Tom M, eds. Lecture notes in computer science (6866). Springer, Heidelberg, Germany, pp. 386-400.

Yi, Xun, Tso, Raylin and Okamoto, Eiji (2011) Three-Party Password-Authenticated Key Exchange without Random Oracles. In: SECRYPT 2011 : Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011. Lopez, Javier and Samarati, Pierangela, eds. SciTePress, pp. 15-24.

Yi, Xun and Bertino, Elisa (2011) Private searching for single and conjunctive keywords on streaming data. In: Proceedings of the 10th annual ACM workshop on Privacy in the Electronic Society. Association for Computing Machinery, New York, pp. 153-158.

Yi, Xun and Okamoto, Eiji (2011) Practical mobile electronic election. In: System Integration (SII), 2011 IEEE/SICE International Syposium. IEEE, Piscataway, N.J., pp. 1119-1124.

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2011) Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption. In: Algorithms and Architectures for Parallel Processing: 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part I. Xiang, Yang, Cuzzocrea, Alfredo, Hobbs, Michael and Zhou, Wanlei, eds. Lecture Notes in Computer Science, Vol. 7016 . Springer, Heidelberg, pp. 360-370.

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2011) Secure Two-Party Association Rule Mining. In: Information Security 2011 : Proceedings of the Ninth Australasian Information Security Conference (AISC 2011), Perth, Australia, 17-20 January 2011. Boyd, Colin and Pieprzyk, Josef, eds. Conferences in Research and Practice in Information Technology (116). Australian Computer Society, Sydney, Australia, pp. 15-22.

Xu, Zhuojia and Yi, Xun (2011) Classification of privacy-preserving distributed data mining protocols. In: 2011 Sixth International Conference on Digital Information Management (ICDIM). IEEE, Piscataway, N.J., pp. 337-342.

Tso, Raylin, Yi, Xun, Ito, Tadahiko, Okamoto, Takeshi and Okamoto, Eiji (2010) Design and analysis of "flexible" k-out-of-n signatures. In: Autonomic and trusted computing : 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings. Xie, Bing, Branke, Juergen, Sadjadi, S Masoud, Zhang, Darqing and Zhou, Xingshe, eds. Lecture notes in computer science (6407). Springer, Boca Raton, Florida, pp. 255-267.

Yi, Xun (2010) Security Analysis of Yang et al.s' Practical Password-Based Two-Server Authentication and Key Exchange Systems. In: 2010 Fourth International Conference on Network and System Security (NSS 2010) : 1-3 September 2010, Melbourne, Australia, proceedings. Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza, eds. IEEE, Piscataway, NJ, pp. 574-578.

Yi, Xun and Okamoto, Eiji (2010) Key Agreement in Large-Scale Dynamic Peer Group. In: Proceedings of the annual International Conference on Advances in Distributed and Parallel Computing (ADPC 2010) and Real-Time and Embedded Systems (RTES 2010) : 1-2 November 2010, Mandarin Orchard Hotel, Singapore. Avadhani, P. S, ed. Global Science and Technology Forum, Singapore, pp. 3-8.

Tso, Raylin and Yi, Xun (2010) Certificateless proxy signature and its extension to blind signature. In: 2010 Fourth International Conference on Network and System Security (NSS 2010) : Melbourne, Australia, 1 - 3 September 2010, proceedings. Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza, eds. IEEE, Piscataway, N.J., pp. 542-547.

Xu, Guandong, Zhang, Yanchun and Yi, Xun (2008) Modelling User Behaviour for Web Recommendation Using LDA Model. In: 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Workshops WI-IAT Workshops 2008 : 9-12 December 2008 University of Technology, Sydney, Australia, proceedings. Li, Yuefeng, Pasi, Gabriella, Zhang, Chengqi, Cercone, Nick and Cao, Longbing, eds. IEEE Computer Society, Los Alamitos, California, pp. 529-532.

Yi, Xun, Faulkner, Michael and Okamoto, Eiji (2008) Securing Wireless Sensor Networks. In: ARES 2008 Third International Conference on Availability, Reliability and Security. IEEE Computer Society, Los Alamitos, CA, pp. 497-502.

Conference or Workshop Item

Margono, Hendro, Yi, Xun and Raikundalia, Gitesh (2014) Mining Indonesian Cyber Bullying Patterns in Social Networks. In: Thirty-Seventh Australasian Computer Science Conference, 20 January 2013-23 January 2013, Auckland, New Zealand.

Wang, G, Wang, Hua ORCID: 0000-0002-8465-0996, Tao, X, Zhang, J, Yi, Xun and Yong, J (2014) Positive Influence Dominating Set Games. In: 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 21 May 2014-23 May 2014, Taiwan.

Yi, Xun, Paulet, R, Bertino, E and Varadharajan, Vijay (2014) Practical k nearest neighbor queries with location privacy. In: 2014 IEEE 30 th International Conference on Data Engineering, 31 March 2014-04 April 2014, Chicago, IL.

Yi, Xun, Paulet, R, Bertino, E and Xu, Guandong (2013) Private data warehouse queries. In: ACM Symposium on Access Control Models and Technologies, 12 June 2013-14 June 2013, Amsterdam, The Netherlands.

Yi, Xun, Willemson, J and Nait-Abdesselam, F (2013) Privacy-preserving wireless medical sensor network. In: TrustCom 2013, 16 July 2013-18 July 2013, Melbourne, Vic.

Zong, Y, Xu, Guandong, Jin, P, Yi, Xun, Chen, E and Wu, Z (2012) A projective clustering algorithm based on significant local dense areas. In: 2012 IEEE World Congress on Computational Intelligence (WCCI), 10 June 2012-15 June 2012, Brisbane Convention Centre, Brisbane, Australia.

Yi, Xun, Tso, Raylin and Okamoto, Eiji (2012) Identity-based password-authenticated key exchange for client/server model. In: International Conference on Security and Cryptography, 24 July 2012-27 July 2012, Rome, Italy.

Paulet, R, Kaosar, G and Yi, Xun (2011) K-Anonymous Private Query Based on Blind Signature and Oblivious Transfer. In: International Cyber Resilience Conference, 01 August 2011-02 August 2011, Perth, Australia.

Yi, Xun (2010) Security of Hou-Tan Electronic Cash Scheme. In: Workshop on Applications and Techniques in Information Security, 08 November 2010-08 November 2010, Melbourne.

Kaosar, MG, Xu, Z and Yi, Xun (2009) Distributed association rule mining with minimum communication overhead. In: 8th Australasian Data Mining Conference (AusDM), 01 December 2009-04 December 2009, Darlinghurst, Australia.