Elsevier期刊
期刊
会议
图书
作者:... Saru Kumari , Xinyi Huang , Mohammad Wazid
来源:[J].Future Generation Computer Systems(IF 1.864), 2017, Vol.68, pp.74-88Elsevier
摘要:Abstract(#br)With the rapid development of mobile cloud computing, the security becomes a crucial part of communication systems in a distributed mobile cloud computing environment. Recently, in 2015, Tsai and Lo proposed a privacy-aware authentication scheme for distributed ...
作者:... Wei Wu , Xinyi Huang , Li Xu
来源:[J].Journal of Computer and System Sciences(IF 1), 2017, Vol.83 (1), pp.73-83Elsevier
摘要:Abstract(#br)We propose a new design of universal designated verifier transitive signatures, to authenticate dynamically growing big graph data. The scheme is built on the classical RSA signature and possesses several desirable properties. It supports edge-signature composition a...
作者:Xinyi Huang , Aiping Dong ...
来源:[J].BBA - General Subjects(IF 3.848), 2017, Vol.1861 (1), pp.3095-3105Elsevier
摘要:Abstract(#br)Background(#br)Seven in absentia homologs (SIAHs) comprise a family of highly conserved E3 ubiquitin ligases that play an important role in regulating signalling pathways in tumorigenesis, including the DNA damage repair and hypoxia response pathways. SIAH1 and SIAH2...
作者:Xinyi Huang , Yang Xiang
来源:[J].Journal of Computer and System Sciences(IF 1), 2017Elsevier
摘要:Abstract(#br)Personal Health Record (PHR) has been developed as a promising solution that allows patient–doctors interactions in a very effective way. Cloud technology has been seen as the prominent candidate to store the sensitive medical record in PHR, but to date, the sec...
作者:... Francesco Palmieri , Xinyi Huang , Aniello Castiglione
来源:[J].Information Sciences(IF 3.643), 2017, Vol.387, pp.56-74Elsevier
摘要:Abstract(#br)With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is moved on centralized network-based repository services, providing elastic outsourced storage capacity, available through remote access. This introduces new challenges a...
作者:Xinyi Huang , Xiaofeng Chen
来源:[J].Information Sciences(IF 3.643), 2017Elsevier
摘要:Abstract(#br)Wireless communications in smart homes are vulnerable to many adversarial attacks such as eavesdropping. To secure the communications, secret session keys need to be established between home appliances. In existing symmetric key establishment protocols, it is assumed...
作者:... Francesco Palmieri , Xinyi Huang , Aniello Castiglione
来源:[J].Information Sciences(IF 3.643), 2016Elsevier
摘要:Abstract(#br)With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is moved on centralized network-based repository services, providing elastic outsourced storage capacity, available through remote access. This introduces new challenges a...
作者:Yanling Lian , Xinyi Huang , Yi Mu
来源:[J].Future Generation Computer Systems(IF 1.864), 2014, Vol.30, pp.133-139Elsevier
摘要:Abstract(#br)Authentication is a procedure by which a client convinces the service provider about a claimed property under a given authentication policy. Anonymous authentication has an added property: protect the real identity of the client. In this paper, we study the situation...
作者:Xinyi Huang , Joseph K. Liu ...
来源:[J].Information Sciences(IF 3.643), 2015, Vol.318, pp.144-156Elsevier
摘要:Abstract(#br)In this paper, we propose a new type of digital signatures which is specifically designed for graph-based big data system. The properties of the proposed signatures are twofold. On one side it possesses the features of transitive signatures: One can sign a graph in s...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×