Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

    Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessin...

    Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao in Information Security and Cryptology (2024)

  2. No Access

    Chapter and Conference Paper

    SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios

    Unmanned Aerial Vehicles (UAVs) are widely utilized for wireless communication services, promoting the emergence of promising UAV-assisted vehicle networks. However, due to the ever-increasing traffic data and...

    Yuyang Cheng, Shiyuan Xu, Yibo Cao in Wireless Algorithms, Systems, and Applicat… (2022)

  3. No Access

    Chapter and Conference Paper

    VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain

    Vehicular ad-hoc networks (VANETs) is emerging as the most essential technology for securing traffic safety as well as enhancing traffic conditions. The confidentiality of messages transmitted in VANETs is of ...

    Shiyuan Xu, Xue Chen, Yunhua He, Yibo Cao in Wireless Algorithms, Systems, and Applicat… (2022)

  4. No Access

    Chapter and Conference Paper

    A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking

    Automated Valet Parking (AVP) systems have great potential to mitigate parking pressure. The core of AVP is parking space reservation which users send relevant information to parking lot providers to complete ...

    Shiyuan Xu, Xue Chen, Chao Wang, Yunhua He in Wireless Algorithms, Systems, and Applicat… (2021)