Follow
Tieyan Li
Tieyan Li
Verified email at huawei.com
Title
Cited by
Cited by
Year
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
New Approaches for Security, Privacy and Trust in Complex Environments …, 2007
2722007
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
T Li, R Deng
The Second International Conference on Availability, Reliability and …, 2007
2142007
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
1512004
Building trusted path on untrusted device drivers for mobile devices
W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li
Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014
1042014
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
902009
A solution for integrated track and trace in supply chain based on RFID & GPS
W He, EL Tan, EW Lee, TY Li
2009 IEEE conference on emerging technologies & factory automation, 1-6, 2009
872009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on computer and communications …, 2009
812009
Vulnerability analysis of RFID protocols for tag ownership transfer
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li
Computer Networks 54 (9), 1502-1508, 2010
612010
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
T Li, G Wang, RH Deng
J. Softw. 3 (3), 1-10, 2008
432008
A novel two-level trust model for grid
TY Li, H Zhu, KY Lam
Information and Communications Security: 5th International Conference, ICICS …, 2003
432003
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador
Workshop on RFID Security 9, 11, 2008
392008
Employing lightweight primitives on low-cost rfid tags for authentication
T Li
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
372008
Trust on web browser: Attack vs. defense
TY Li, Y Wu
Applied Cryptography and Network Security: First International Conference …, 2003
332003
An optimal location update and searching algorithm for tracking mobile agent
TY Li, KY Lam
Proceedings of the first international joint conference on Autonomous agents …, 2002
332002
Randomized bit encoding for stronger backward channel protection in RFID systems
TL Lim, T Li, SL Yeo
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
282008
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
P Peris-Lopez, T Li, JC Hernandez-Castro, JME Tapiador
Computer Communications 32 (7-10), 1185-1193, 2009
272009
A software-based root-of-trust primitive on multicore platforms
Q Yan, J Han, Y Li, RH Deng, T Li
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
262011
Classify encrypted data in wireless sensor networks
Y Wu, D Ma, T Li, RH Deng
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3236-3239, 2004
262004
Weaknesses in two recent lightweight RFID authentication protocols
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, ...
Information Security and Cryptology: 5th International Conference, Inscrypt …, 2010
252010
Insights into malware detection and prevention on mobile phones
Q Yan, Y Li, T Li, R Deng
Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009
252009
The system can't perform the operation now. Try again later.
Articles 1–20