Security analysis of two ultra-lightweight RFID authentication protocols T Li, G Wang New Approaches for Security, Privacy and Trust in Complex Environments …, 2007 | 272 | 2007 |
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol T Li, R Deng The Second International Conference on Availability, Reliability and …, 2007 | 214 | 2007 |
Highly reliable trust establishment scheme in ad hoc networks K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim Computer Networks 45 (6), 687-699, 2004 | 151 | 2004 |
Building trusted path on untrusted device drivers for mobile devices W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014 | 104 | 2014 |
Attacks and improvements to an RIFD mutual authentication protocol and its extensions S Cai, Y Li, T Li, RH Deng Proceedings of the second ACM conference on Wireless network security, 51-58, 2009 | 90 | 2009 |
A solution for integrated track and trace in supply chain based on RFID & GPS W He, EL Tan, EW Lee, TY Li 2009 IEEE conference on emerging technologies & factory automation, 1-6, 2009 | 87 | 2009 |
RFID privacy: relation between two notions, minimal condition, and efficient construction C Ma, Y Li, RH Deng, T Li Proceedings of the 16th ACM conference on computer and communications …, 2009 | 81 | 2009 |
Vulnerability analysis of RFID protocols for tag ownership transfer P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li Computer Networks 54 (9), 1502-1508, 2010 | 61 | 2010 |
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. T Li, G Wang, RH Deng J. Softw. 3 (3), 1-10, 2008 | 43 | 2008 |
A novel two-level trust model for grid TY Li, H Zhu, KY Lam Information and Communications Security: 5th International Conference, ICICS …, 2003 | 43 | 2003 |
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador Workshop on RFID Security 9, 11, 2008 | 39 | 2008 |
Employing lightweight primitives on low-cost rfid tags for authentication T Li 2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008 | 37 | 2008 |
Trust on web browser: Attack vs. defense TY Li, Y Wu Applied Cryptography and Network Security: First International Conference …, 2003 | 33 | 2003 |
An optimal location update and searching algorithm for tracking mobile agent TY Li, KY Lam Proceedings of the first international joint conference on Autonomous agents …, 2002 | 33 | 2002 |
Randomized bit encoding for stronger backward channel protection in RFID systems TL Lim, T Li, SL Yeo 2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008 | 28 | 2008 |
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard P Peris-Lopez, T Li, JC Hernandez-Castro, JME Tapiador Computer Communications 32 (7-10), 1185-1193, 2009 | 27 | 2009 |
A software-based root-of-trust primitive on multicore platforms Q Yan, J Han, Y Li, RH Deng, T Li Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 26 | 2011 |
Classify encrypted data in wireless sensor networks Y Wu, D Ma, T Li, RH Deng IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3236-3239, 2004 | 26 | 2004 |
Weaknesses in two recent lightweight RFID authentication protocols P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, ... Information Security and Cryptology: 5th International Conference, Inscrypt …, 2010 | 25 | 2010 |
Insights into malware detection and prevention on mobile phones Q Yan, Y Li, T Li, R Deng Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009 | 25 | 2009 |