Xiang, Yang

< Back to all Authors
Group by: Item type | Date
Jump to:
2010 | 2011
Number of items: 3.

2010

Yi, Xun (2010) Security Analysis of Yang et al.s' Practical Password-Based Two-Server Authentication and Key Exchange Systems. In: 2010 Fourth International Conference on Network and System Security (NSS 2010) : 1-3 September 2010, Melbourne, Australia, proceedings. Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza, eds. IEEE, Piscataway, NJ, pp. 574-578.

Tso, Raylin and Yi, Xun (2010) Certificateless proxy signature and its extension to blind signature. In: 2010 Fourth International Conference on Network and System Security (NSS 2010) : Melbourne, Australia, 1 - 3 September 2010, proceedings. Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza, eds. IEEE, Piscataway, N.J., pp. 542-547.

2011

Kaosar, Md. Golam, Paulet, Russell and Yi, Xun (2011) Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic Encryption. In: Algorithms and Architectures for Parallel Processing: 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part I. Xiang, Yang, Cuzzocrea, Alfredo, Hobbs, Michael and Zhou, Wanlei, eds. Lecture Notes in Computer Science, Vol. 7016 . Springer, Heidelberg, pp. 360-370.