Back to Homepage

Publications

Selected Publications(代表性论文)


Complete List(列表)

Book Chapters (2)

  1. Xinyi Huang, Willy Susilo, Yi Mu, and Wei Wu. “Delegating Authentication Power in Mobile Networks”. Book Chapter, Security and Privacy in Wireless and Mobile Computing: 217-234. Troubador Publishing, 2008.
  2. Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen, and Fangguo Zhang. “Efficient Authentication Schemes for AODV and DSR”. Book Chapter, Security in Distributed and Networking Systems: 367-390. World Scientific Publishing, 2007

Edited Books (2)

  1. Xinyi Huang and Jianying Zhou. "Information Security Practice and Experience, 10th International Conference, ISPEC2014, Proceedings". Lecture Notes in Computer Science 8434, Springer, 2014.
  2. Javier Lopez, Xinyi Huang, and Ravi Sandhu. “Network and System Security, 7th International Conference, NSS 2013, Proceedings”. Lecture Notes in Computer Science 7873, Springer, 2013.

List of CCF A and B Papers

  1. Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min. "Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage". IEEE Transactions on Information Forensics and Security (Accepted on 2016-04-06).CCF Rank A
  2. Zhe Liu, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, and Lu Zhou. "On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age". IEEE Transactions on Dependable and Secure Computing. (Accepted on 2016-04-06) CCF Rank A
  3. Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Jin Li and Xinyi Huang. "Hierarchical and Shared Access Control". IEEE Transactions on Information Forensics and Security (Accepted on Accepted on 2015-12-17).CCF Rank A
  4. Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, and Jin Li. "Fine-grained Two-factor Access Control for Web-based Cloud Computing Services". IEEE Transactions on Information Forensics and Security. (Accepted on 2015-09-30)CCF Rank A
  5. Shaohua Tang, Xiaoyu Li, Xinyi Huang, Yang Xiang, and Lingling Xu. “Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing”. IEEE Transactions on Computers. (Accepted on 2015-08-28) CCF Rank A
  6. Debiao He, Sherali Zeadally, Baowen Xu, and Xinyi Huang. “An Efficient Identity-based Conditional Privacy-preserving Authentication Scheme For Vehicular Ad-hoc Networks”. IEEE Transactions on Information Forensics and Security, 2015. (Accepted,2015-07-24)CCF Rank A
  7. Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, and Xinyi Huang. “Universally Composable RFID Mutual Authentication”. IEEE Transactions on Dependable and Secure Computing. (Accepted,2015-04-22)CCF Rank A
  8. Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang and Yang Xiang. “Secure Distributed Deduplication Systems with Improved Reliability”. IEEE Transactions on Computers. (Accepted, 2015-01-22).CCF Rank A
  9. Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang. “Verifiable Auditing for Outsourced Database in Cloud Computing”. IEEE Transactions on Computers. (Accepted, 2015-01-21).CCF Rank A
  10. Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, and Wenjing Lou. "New Publicly Verifiable Databases with Efficient Updates". IEEE Transactions on Dependable and Secure Computing. (Accepted, 2014-09-28). CCF Rank A
  11. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, and Jianying Zhou. “K-times Attribute-Based Anonymous Access Control for Cloud Computing”. IEEE Transactions on Computers 64(9): 2595-2608, 2015CCF Rank A
  12. Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou. "Cost-Effective Authentic and Anonymous Data Sharing with Forward Security". IEEE Transactions on Computers 64(4): 971-983, IEEE Computer Society, 2015. CCF Rank A
  13. Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, and Duncan S. Wong. “New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations”. IEEE Transactions on Information Forensics and Security (IEEE TIFS)10(1): 69-78, 2015.CCF Rank A
  14. Joseph K. Liu, Cheng-Kang Chu, Sherman S.M. Chow, Xinyi Huang, Man Ho Au, and Jianying Zhou. “Time-Bound Anonymous Authentication for Roaming Networks”. IEEE Transactions on Information Forensics and Security 10 (1): 178-189, 2015.CCF Rank A
  15. Xinyi Huang, Yang Xiang, Elisa Bertino, Jianying Zhou, and Li Xu. “Robust Multi-Factor Authentication for Fragile Communications”. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 11(6): 568-581, IEEE Computer Society, 2014. CCF Rank A
  16. Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, and Zhiming Yang. “Provably Secure Group Key Management Approach Based upon Hyper-Sphere”. IEEE Transactions on Parallel and Distributed Systems 25(12): 3253-3263, IEEE Computer Society, 2014 CCF Rank A
  17. Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, and Duncan S. Wong. “Secure Outsourced Attribute-based Signatures”. IEEE Transactions on Parallel and Distributed Systems 25(12): 3285-3294, IEEE Computer Society, 2014. CCF Rank A
  18. Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, and Li Xu. “Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems”. IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS) 25(7): 1767-1775, IEEE Computer Society, 2014. CCF Rank A
  19. Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, and Yang Xiang. “Securely Outsourcing Attribute-based Encryption with Checkability”. IEEE Transactions on Parallel and Distributed Systems 25(8): 2201-2210, 2014. CCF Rank A
  20. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang. "Optimistic Fair Exchange with Strong Resolution Ambiguity". IEEE Journal on Selected Areas in Communications 29(7): 1491-1502, 2011. CCF Rank A
  21. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, and Robert Deng. “Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures”. IEEE Transactions on Information Forensics and Security 6(2): 498-512, IEEE Signal Processing Society, 2011. CCF Rank A
  22. Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, and Robert H. Deng. “A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems”. IEEE Transactions on Parallel and Distributed Systems 22 (8): 1390-1397, IEEE Computer Society Press, 2011. CCF Rank A
  23. Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang. “Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004”. Journal of Computer Science and Technology 22(1): 71-74. Springer, 2007.
  24. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, and Wei Wu. “Certificateless Signatures: New Schemes and Security Models". The Computer Journal 55(4): 457-474, 2012.
  25. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang. “Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting”. In 13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010. Lecture Notes in Computer Science 6056: 124-141. Springer, 2010.
  26. Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, and Yang Xiang. "Certificate-Based Encryption Resilient to Key Leakage". Journal of Systems and Software 116: 101–112, 2016
  27. Jinguang Han, Ye Yang, Xinyi Huang, Tsz Hon Yuen, Jiguo Li, and Jie Cao. "Accountable Mobile E-Commerce Scheme via Identity-based Plaintext-Checkable Encryption". Information Sciences 345(6): 143–155, 2016
  28. Shuquan Hou, Xinyi Huang, Joseph K Liu, Jin Li, and Li Xu. “Universal Designated Verifier Transitive Signatures for Graph-based Big Data”. Information Sciences 318: 144-156 (2015)
  29. Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou. “A Forward-Secure Certificate-Based Signature Scheme”. The Computer Journal 58(4): 853-866, 2015
  30. Li Xu, Yuan He, Xiaofeng Chen, and Xinyi Huang. Ticket-Based Handoff Authentication for Wireless Mesh Networks. Computer Networks 73: 185-194, 2014
  31. Yuexin Zhang, Yang Xiang, Xinyi Huang, and Li Xu. “A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks”. The 19th European Symposium on Research in Computer Security (ESORICS 2014), Lecture Notes in Computer Science 8712: 526-541.
  32. Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, and Yong Yu. “New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era”. The 19th European Symposium on Research in Computer Security (ESORICS 2014), Lecture Notes in Computer Science 8713: 182-199.
  33. Ai-Jun Ge, Xin-Yi Huang, Cheng Chen, Chuan-Gui Ma and Rui Zhang. "Cryptanalysis of Wang-Zhu-Feng-Yau's "Attribute-Based Signature with Policy-and-Endorsement Mechanism" ". Journal of Computer Science and Technology 28(4): 743-748, Springer, 2013.
  34. Xu An Wang, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, and Xuguang Wu. “Further Observation on Proxy Re-encryption with Keyword Search”. Journal of Systems and Software 85(3): 643-654, 2012.
  35. Raylin Tso, Xinyi Huang, Willy Susilo. “Strongly Secure Certificateless Short Signatures”. Journal of Systems and Software 85(6) 1409–1417, 2012.
  36. Jiguo Li, Xinyi Huang, Yichen Zhang, and Lizhong Xu. “An Efficient Short Certificate-based Signature Scheme”, Journal of Systems and Software 85(2): 314-322, 2012.
  37. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang and Li Xu. “A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption”. The Computer Journal 55(10): 1157-1168, 2012.
  38. Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. “Constructions of Certificate-Based Signature Secure against Key Replacement Attacks”. Journal of Computer Security 18(3): 421-449, 2010.
  39. Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo and Lei Zhang. “Certificateless Threshold Signature Scheme from Bilinear Maps”. Information Sciences 180(23): 4714-4728, 2010.
Back to Homepage