Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xun Yi is active.

Publication


Featured researches published by Xun Yi.


Mobile Computing and Communications Review | 1998

An optimized protocol for mobile network authentication and security

Xun Yi; Eiji Okamoto; Kwok Yan Lam

Recent years have seen an explosive growth of interest in mobile networks that support the mobility. The mobility of users, the transmission of signals through open air and the requirement of low power consumption by a mobile user bring to a mobile network a large number of new security issues. In this paper, we propose an optimized protocol for mobile network authentication and security. The particular features of the new proposal are: (1) only a public parameter (a large prime p) and the public key of the certification authority (yca) is required knowledge for all network participants; (2) only a block cipher is used as both the secret-key encryption algorithm and the underlying cipher of the hash function.


Lecture Notes in Computer Science | 1998

A Secure Intelligent Trade Agent System

Xun Yi; XiaoFeng Wang; Kwok-Yan Lam

In this paper, a secure intelligent trade agent system is developed. In this system, an intelligent trade agent can be authenticated and supplied certain authorized agent execution environment for it to run by a host. The owner of a malicious intelligent trade agent is easily dug out. A host can only legally modify the information relative to it in the agent because the owner of the agent can be conscious of any little unauthorized modification made by any host. The secure intelligent trade agent system has two extra features: 1. The payment in the system is anonymous to servers (e.g., shops, companies). 2. It is convenient for the system to charge. So far, any security weakness in the secure intelligent trade agent system has not been found yet.


electronic imaging | 1999

Agent-based copyright protection architecture for online electronic publishing

Xun Yi; Shigeki Kitazawa; Eiji Okamoto; XiaoFeng Wang; Kwok-Yan Lam; S. Tu

Electronic publishing faces one major technical and economic challenge, i.e., how to prevent individuals from easily copying and illegally distributing electronic documents. Conventional cryptographic systems permit only valid key- holders access to encrypted data, but once such data is decrypted there is no way to track its reproduction or retransmission. Therefore, they provide little protection against data privacy, in which a publisher is confronted with unauthorized reproduction of information. In this paper, we explore the use of intelligent agent, digital watermark and cryptographic techniques to discourage the distribution of illegal electronic copies and propose an agent-based strategy to protect the copyright of on-line electronic publishing. In fact, it is impossible to develop an absolute secure copyright protection architecture for on-line electronic publishing which can prevent a malicious customer from spending a great deal of efforts on analyzing the software and finally obtaining the plaintext of the encrypted electronic document. Our work in this paper aims at making the value of analyzing agent and removing watermark to be much greater than that of the electronic document itself.


pacific rim international conference on multi-agents | 1998

Secure Agent-Mediated Mobile Payment

XiaoFeng Wang; Kwok-Yan Lam; Xun Yi

Mobile devices usually have too limited and expensive communication capacity to meet consistent connection requirement of online payment protocols such as SET. Mobile agent approaches have been proposed by SET/A and SET/A+ to solve the problem. In this paper, we propose a new secure agent-mediated payment scheme which provides simpler and more compatible solution. Its particular features lie at: (1) the payment procedure is combined with brokering stage during the internet trading. (2) there is no modification to the SET protocol which results in 100 percent compatibility. Moreover, system simplification can be achieved in the proposed scheme without any sacrifice of security.


Lecture Notes in Computer Science | 1998

Secure Information Gathering Agent for Internet Trading

XiaoFeng Wang; Xun Yi; Kwok-Yan Lam; Eiji Okamoto

With the proliferation of commercial information on the Internet, intelligent agent becomes an effective implement to collect information for conducting trading. However, great security threats also exist under this scenario. Since agent will be executed by the host, it seems inevitable to expose its codes and data to host’s attacks. In this paper, we propose a security system to protect information gathering agent from malicious hosts. The encryption technique and detection object will be taken to sense any illegal manipulation to the agent body. Distributed login data base (LDB) is introduced to assure any destructor will be easily dug out. Therefore, Internet trading under the framework of this system enable agent to conduct commercial information gathering among hosts freely and securely.


symposium on reliable distributed systems | 1998

A secure auction-like negotiation protocol for agent-based Internet trading

Xun Yi; Eiji Okamoto; XiaoFeng Wang; Kwok Yan Lam; D.F. Hsu

We propose a secure auction-like negotiation protocol for agent based Internet trading, which not only retains the agents mobility and flexibility, but also takes secure measures to prevent attacks from malicious hosts during the negotiation process. The particular features of the proposed protocol are: (1) negotiation for agent based trading is performed through a novel pattern of electronic auction; (2) negotiation results between two hosts are ensured to be valid with their signatures; (3) malicious actions can be detected and the breeder can be dug out by the help of sociological factors; (4) information gathering and negotiation processes are combined together while few communications are needed.


cooperative information agents | 1999

Secure agent-mediated auctionlike negotiation protocol for internet retail commerce

XiaoFeng Wang; Kwok-Yan Lam; Xun Yi; Chengqi Zhang; Eiji Okamoto

With the proliferation of retail commerce on the Internet, mobile agents play more and more important roles in automating information brokering and negoiation for online shopping. However, due to the limited computing resources and security concerns, current first-generation shopping agents have limited capacities to conduct commercial bargaining. On the other hand, though auctions appear promising to solve these dificulties with their fairness and openness features, they suffer from the problems such as reversed consumer-buyer relation and low performance. In this paper, we propose a secure agent-mediated auction-like negotiation protocol which combines togather the favorable features of traditional English auction and mobile agent scheme. Its features lie at: (1) auctionlike scheme is implemented which keeps the dominant equilibrium in the English auction and rationalizes consumer-seller relation in the retail commerce. (2) security for negotiation agents is guaranteed which makes tampering on agent body easy to detect. (3) flexibility during the trading is achieved by combining information gathering and negotiation together while few communications are needed.


australasian conference on information security and privacy | 1998

Differential Cryptanalysis of a Block Cipher

Xun Yi; Kwok Yan Lam; Yongfei Han

In this paper differential cryptanalysis of a secret-key block cipher based on mixing operations of different algebraic groups is treated. The results show the cipher is resistant to differential attack.


ISW '97 Proceedings of the First International Workshop on Information Security | 1997

A New Byte-Oriented Block Cipher

Xun Yi; Kwok-Yan Lam; Shi Xin Cheng; Xiao Hu You

In this paper, a new byte-oriented block cipher with a key of length 64 bits is proposed. In the proposed cipher, the block length is 64 bits and only byte operations are utilized. The cipher structure is composed of two simple operations (exclusive-or and addition) and three cryptographically strong S-boxes (one is 8 x 8 S-box, two are 8-bit involution S-boxes) and chosen to provide necessary confusion and diffusion and facilitate both hardware and software implementation. The design principles of the proposed cipher are explained and a sample data is given.


Mobile Computing and Communications Review | 1999

Author's reply to "comments on an optimized protocol for mobile network authentication and security"

Xun Yi

Collaboration


Dive into the Xun Yi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

XiaoFeng Wang

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shigeki Kitazawa

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kwok Yan Lam

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Hisao Sakazaki

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S. Tu

University of New Orleans

View shared research outputs
Top Co-Authors

Avatar

Dieter Gollmann

Hamburg University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge