Innovative e-Research @ VU

 About e-Research
Home
News
Background
Members
Funded projects
Selected projects & Ph.D topics descriptions
Industry & government partners
Contact us
International Activities
ACICT
WISE 2007
WISE Society
WISE Book Series
WWW Journal
New Book: Web Communities
Links
Centre for Applied Informatics (CAI)
ARC Research Network in Enterprise Information Infrastructure (EII)
Victorian Partnership for Advanced Computing(VPAC)

Dr. Xun Yi

School of Computer Science & Mathematics
Victoria University

Dr. Yi is an expert in applied cryptography, network security, wireless and mobile communication security. Since 1996, he has published about 100 research papers on international journals and conference proceedings, more than 20 of them are on international top journals, such as IEEE Trans. Wireless Communication, IEEE Trans. Knowledge and Data Engineering, IEEE Trans. Circuit and Systems, IEEE Trans. Vehicular Technology, IEEE Trans. Dependable and Secure Computing, IEEE Trans. Consume Electronics, IEEE Communication Letters, IEE Electronic Letters, Theoretic Computer Science, and IEICE Trans. Fundamental of Electronics, Communications and Computer Science. His research achievements include secure conference scheme for mobile communications, fast encryption algorithm for multimedia, identity-based key agreement and signature schemes using Weil pairing and etc. These works have been widely cited. He is currently supervising a master research student on design and analysis of hash function. His research on privacy-preserving data mining has been supported by VU Discovery Research Grants.

Selected publications

  1. X. Yi, "Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme", IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 9, Sept 2005.

  2. X. Yi, "Hash Function Based on Chaotic Tent Maps", IEEE Transactions on Circuits and Systems Part II, vol. 52, no. 6,
    2005.

  3. X. Yi, "Identity-Based Fault-Tolerant Conference Key Agreement",
    IEEE Transactions on Dependable and Secure Computing , vol. 1, no. 3, 2004.

  4. X. Yi, "Authenticated Key Agreement in Dynamic Peer Groups", Theoretical
    Computer Science , vol. 326, no. 1-3 , Oct 2004.

  5. X. Yi, C. H. Tan, E.Okamoto, "Security of Kuwakado-Tanaka Transitive Signature Scheme for
    Directed Trees", IEICE Transactions on Fundamental of Electronics, Communications and Computer Science, vol. E87-A, no. 4, Apr 2004.

Innovative e-Research @ VU All rights reserved.
Last Updated: May 29, 2006 by Webmaster.