Follow
Tieyan Li
Tieyan Li
Verified email at huawei.com
Title
Cited by
Cited by
Year
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
IFIP international information security conference, 109-120, 2007
2822007
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
T Li, R Deng
The Second International Conference on Availability, Reliability and …, 2007
2232007
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
1582004
Building trusted path on untrusted device drivers for mobile devices
W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li
Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014
1062014
A solution for integrated track and trace in supply chain based on RFID & GPS
W He, EL Tan, EW Lee, TY Li
2009 IEEE conference on emerging technologies & factory automation, 1-6, 2009
972009
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
942009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on computer and communications …, 2009
852009
Vulnerability analysis of RFID protocols for tag ownership transfer
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li
Computer Networks 54 (9), 1502-1508, 2010
642010
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
T Li, G Wang, RH Deng
J. Softw. 3 (3), 1-10, 2008
442008
A novel two-level trust model for grid
TY Li, H Zhu, KY Lam
Information and Communications Security: 5th International Conference, ICICS …, 2003
412003
Employing lightweight primitives on low-cost rfid tags for authentication
T Li
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
402008
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador
Workshop on RFID Security 9, 11, 2008
392008
Trust on web browser: Attack vs. defense
TY Li, Y Wu
Applied Cryptography and Network Security: First International Conference …, 2003
362003
On the trust and trust modeling for the future fully-connected digital world: A comprehensive study
HLJ Ting, X Kang, T Li, H Wang, CK Chu
IEEE Access 9, 106743-106783, 2021
322021
An optimal location update and searching algorithm for tracking mobile agent
TY Li, KY Lam
Proceedings of the first international joint conference on Autonomous agents …, 2002
322002
A survey on trust models in heterogeneous networks
J Wang, Z Yan, H Wang, T Li, W Pedrycz
IEEE Communications Surveys & Tutorials 24 (4), 2127-2162, 2022
282022
Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework
P Peris-Lopez, TL Lim, T Li
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
282008
Randomized bit encoding for stronger backward channel protection in RFID systems
TL Lim, T Li, SL Yeo
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
282008
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
P Peris-Lopez, T Li, JC Hernandez-Castro, JME Tapiador
Computer Communications 32 (7-10), 1185-1193, 2009
272009
Classify encrypted data in wireless sensor networks
Y Wu, D Ma, T Li, RH Deng
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3236-3239, 2004
272004
The system can't perform the operation now. Try again later.
Articles 1–20