Follow
Tieyan Li
Tieyan Li
Verified email at huawei.com
Title
Cited by
Cited by
Year
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
IFIP international information security conference, 109-120, 2007
2802007
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
T Li, R Deng
The Second International Conference on Availability, Reliability and …, 2007
2212007
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
1582004
Building trusted path on untrusted device drivers for mobile devices
W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li
Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014
1052014
A solution for integrated track and trace in supply chain based on RFID & GPS
W He, EL Tan, EW Lee, TY Li
2009 IEEE conference on emerging technologies & factory automation, 1-6, 2009
972009
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
922009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on computer and communications …, 2009
842009
Vulnerability analysis of RFID protocols for tag ownership transfer
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li
Computer Networks 54 (9), 1502-1508, 2010
632010
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
T Li, G Wang, RH Deng
J. Softw. 3 (3), 1-10, 2008
432008
A novel two-level trust model for grid
TY Li, H Zhu, KY Lam
Information and Communications Security: 5th International Conference, ICICS …, 2003
412003
Employing lightweight primitives on low-cost rfid tags for authentication
T Li
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
402008
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador
Workshop on RFID Security 9, 11, 2008
392008
Trust on web browser: Attack vs. defense
TY Li, Y Wu
Applied Cryptography and Network Security: First International Conference …, 2003
362003
An optimal location update and searching algorithm for tracking mobile agent
TY Li, KY Lam
Proceedings of the first international joint conference on Autonomous agents …, 2002
322002
On the trust and trust modeling for the future fully-connected digital world: A comprehensive study
HLJ Ting, X Kang, T Li, H Wang, CK Chu
IEEE Access 9, 106743-106783, 2021
312021
Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework
P Peris-Lopez, TL Lim, T Li
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
282008
Randomized bit encoding for stronger backward channel protection in RFID systems
TL Lim, T Li, SL Yeo
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
282008
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
P Peris-Lopez, T Li, JC Hernandez-Castro, JME Tapiador
Computer Communications 32 (7-10), 1185-1193, 2009
272009
Classify encrypted data in wireless sensor networks
Y Wu, D Ma, T Li, RH Deng
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3236-3239, 2004
272004
A software-based root-of-trust primitive on multicore platforms
Q Yan, J Han, Y Li, RH Deng, T Li
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
262011
The system can't perform the operation now. Try again later.
Articles 1–20