Shiyuan Xu
Orcid: 0000-0001-9076-1695
According to our database1,
Shiyuan Xu
authored at least 31 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT.
IEEE Trans. Inf. Forensics Secur., 2025
2024
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., November, 2024
PPCT: Privacy-Preserving Contact Tracing Using Concise Private Set Intersection Cardinality.
J. Netw. Syst. Manag., October, 2024
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records.
IEEE Trans. Inf. Forensics Secur., 2024
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things.
IACR Cryptol. ePrint Arch., 2024
RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 10th IEEE International Conference on High Performance and Smart Computing, 2024
Proceedings of the 2024 6th International Conference on Control and Computer Vision, 2024
Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Soft Comput., October, 2023
AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain.
Comput. Networks, April, 2023
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios.
IACR Cryptol. ePrint Arch., 2023
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications.
IACR Cryptol. ePrint Arch., 2023
Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET.
Peer-to-Peer Netw. Appl., 2022
Comput. Syst. Sci. Eng., 2022
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios.
Comput. Networks, 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Benchmarking, Measuring, and Optimizing, 2022
2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
LPPA: A Lightweight Privacy-Preserving Authentication Scheme for the Internet of Drones.
Proceedings of the 21st International Conference on Communication Technology, 2021
2013
Proceedings of the 21st International Conference on Geoinformatics, 2013
2010
Vulnerability assessment of combined impacts of sea level rise and coastal flooding for China's coastal region using remote sensing and GIS.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010