Xinchun Yin

Orcid: 0000-0003-2045-0781

According to our database1, Xinchun Yin authored at least 27 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model.
IEEE Internet Things J., March, 2024

Fluent: Round-efficient Secure Aggregation for Private Federated Learning.
CoRR, 2024

2023
Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud.
IEEE Trans. Intell. Transp. Syst., February, 2023

Secure Updatable Storage Access Control System for EHRs in the Cloud.
IEEE Trans. Serv. Comput., 2023

RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks.
IEEE Internet Things J., 2023

2022
A fine-grained and secure health data sharing scheme based on blockchain.
Trans. Emerg. Telecommun. Technol., 2022

Blockchain-based group key agreement protocol for vehicular ad hoc networks.
Comput. Commun., 2022

2021
Fine-Grained Task Access Control System for Mobile Crowdsensing.
Secur. Commun. Networks, 2021

2020
TBPA: TESLA-based privacy-preserving authentication scheme for vehicular ad hoc networks.
Int. J. Embed. Syst., 2020

2019
A New Pairing-Free Certificateless Signature Scheme for Internet of Things.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

A Message-Oriented Message Dissemination and Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Performance modeling and evaluating workflow of ITS: real-time positioning and route planning.
Multim. Tools Appl., 2018

Attribute-Based Encryption with Efficient Keyword Search and User Revocation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
基于REESSE3+算法的改进算法 (New Improved Algorithm Based on REESSE3+).
计算机科学, 2017

2015
基于信息熵的DNS拒绝服务攻击的检测研究 (Research on Exploiting DoS Attack Against DNS Based on Information Entropy).
计算机科学, 2015

2014
A Self-adaptive Reliable Packet Transmission Scheme for Wireless Mesh Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Reliable Transmission with Multipath and Redundancy for Wireless Mesh Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2011
Optimized Approach for Computing Multi-base Chains.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Automatic construction of jump-oriented programming shellcode (on the x86).
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
LORP: a load-balancing based optimal routing protocol for sensor networks with bottlenecks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

DROP: Detecting Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security, 5th International Conference, 2009

IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

DDoS Attack Detection Based on Compensation Non-Parameter CUSUM Algorithm.
Proceedings of the 2008 International Conference on Security & Management, 2008

A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...