Xuyun Nie
Orcid: 0000-0003-2868-0442
According to our database1,
Xuyun Nie
authored at least 38 papers
between 2006 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare.
IEEE Trans. Ind. Informatics, 2022
Secur. Commun. Networks, 2022
Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT.
IEEE Internet Things J., 2022
2021
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021
Secure and dynamic access control for the Internet of Things (IoT) based traffic system.
PeerJ Comput. Sci., 2021
A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT.
IEEE Internet Things J., 2021
2020
Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020
Efficient Ranked Multi-Keyword Retrieval With Privacy Protection for Multiple Data Owners in Cloud Computing.
IEEE Syst. J., 2020
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020
Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks.
IEEE Internet Things J., 2020
A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising.
IEEE Access, 2020
2019
Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
2018
Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018
Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle.
Int. J. Netw. Secur., 2018
IEEE Access, 2018
2017
2016
Int. J. Netw. Secur., 2016
2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Int. J. Secur. Networks, 2012
2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
Unattended Home Delivery System based on PKI Trust Model in Urban Areas.
Proceedings of the ICISO 2010, 2010
2009
Proceedings of the International Forum on Information Technology and Applications, 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006