default search action
Xinchun Yin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Xincheng Li, Lifeng Zhou, Xinchun Yin, Jianting Ning:
A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model. IEEE Internet Things J. 11(6): 10865-10879 (2024) - [i1]Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang:
Fluent: Round-efficient Secure Aggregation for Private Federated Learning. CoRR abs/2403.06143 (2024) - 2023
- [j10]Xincheng Li, Xinchun Yin, Jianting Ning:
RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks. IEEE Internet Things J. 10(23): 21100-21114 (2023) - [j9]Xincheng Li, Xinchun Yin, Jianting Ning:
Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud. IEEE Trans. Intell. Transp. Syst. 24(2): 1786-1800 (2023) - [j8]Jingwei Wang, Xinchun Yin, Jianting Ning, Shengmin Xu, Guowen Xu, Xinyi Huang:
Secure Updatable Storage Access Control System for EHRs in the Cloud. IEEE Trans. Serv. Comput. 16(4): 2939-2953 (2023) - 2022
- [j7]Xincheng Li, Xinchun Yin:
Blockchain-based group key agreement protocol for vehicular ad hoc networks. Comput. Commun. 183: 107-120 (2022) - [j6]Jiahao Chen, Xinchun Yin, Jianting Ning:
A fine-grained and secure health data sharing scheme based on blockchain. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - 2021
- [j5]Jingwei Wang, Xinchun Yin, Jianting Ning:
Fine-Grained Task Access Control System for Mobile Crowdsensing. Secur. Commun. Networks 2021: 6682456:1-6682456:13 (2021) - 2020
- [j4]Xincheng Li, Yali Liu, Xinchun Yin:
TBPA: TESLA-based privacy-preserving authentication scheme for vehicular ad hoc networks. Int. J. Embed. Syst. 12(2): 156-165 (2020)
2010 – 2019
- 2019
- [c15]Xincheng Li, Yali Liu, Xinchun Yin:
An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs. HPCC/SmartCity/DSS 2019: 1763-1770 - [c14]Xincheng Li, Yali Liu, Xinchun Yin:
A Message-Oriented Message Dissemination and Authentication Scheme for Vehicular Ad Hoc Networks. ISPA/BDCloud/SocialCom/SustainCom 2019: 223-228 - [c13]Zhenchao Zhang, Yali Liu, Xinchun Yin, Xincheng Li:
A New Pairing-Free Certificateless Signature Scheme for Internet of Things. SciSec 2019: 371-379 - 2018
- [j3]Ping Liu, Rui Wang, Jie Ding, Xinchun Yin:
Performance modeling and evaluating workflow of ITS: real-time positioning and route planning. Multim. Tools Appl. 77(9): 10867-10881 (2018) - [c12]Jingwei Wang, Xinchun Yin, Jianting Ning, Geong Sen Poh:
Attribute-Based Encryption with Efficient Keyword Search and User Revocation. Inscrypt 2018: 490-509 - 2017
- [j2]Daqiang Dong, Xinchun Yin:
基于REESSE3+算法的改进算法 (New Improved Algorithm Based on REESSE3+). 计算机科学 44(12): 120-125 (2017) - 2015
- [j1]Fen Yan, Chao Ding, Xinchun Yin:
基于信息熵的DNS拒绝服务攻击的检测研究 (Research on Exploiting DoS Attack Against DNS Based on Information Entropy). 计算机科学 42(3): 140-143 (2015) - 2014
- [c11]Wenze Shi, Takeshi Ikenaga, Daiki Nobayashi, Xinchun Yin, Yebin Xu:
Reliable Transmission with Multipath and Redundancy for Wireless Mesh Networks. ICA3PP (1) 2014: 755-767 - [c10]Wenze Shi, Takeshi Ikenaga, Daiki Nobayashi, Xinchun Yin, Hui Xu:
A Self-adaptive Reliable Packet Transmission Scheme for Wireless Mesh Networks. ICA3PP (1) 2014: 781-793 - 2011
- [c9]Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin:
Automatic construction of jump-oriented programming shellcode (on the x86). AsiaCCS 2011: 20-29 - [c8]Jianting Ning, Xinchun Yin, Ting Yang:
A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks. CIS 2011: 625-629 - [c7]Xinchun Yin, Ting Yang, Jianting Ning:
Optimized Approach for Computing Multi-base Chains. CIS 2011: 964-968
2000 – 2009
- 2009
- [c6]Ping Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. ICICS 2009: 336-345 - [c5]Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
DROP: Detecting Return-Oriented Programming Malicious Code. ICISS 2009: 163-177 - [c4]Lijie Xu, Guihai Chen, Xinchun Yin, Panlong Yang, Baijian Yang:
LORP: a load-balancing based optimal routing protocol for sensor networks with bottlenecks. WCNC 2009: 2438-2443 - 2008
- [c3]Chunlai Song, Xinchun Yin, Yali Liu:
A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme. CIS (1) 2008: 381-384 - [c2]Fen Yan, Yiqun Chen, Xinchun Yin, Hao Huang:
DDoS Attack Detection Based on Compensation Non-Parameter CUSUM Algorithm. Security and Management 2008: 251-257 - [c1]Yali Liu, Xinchun Yin, Liang Qiu:
ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings. ISECS 2008: 179-183
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint