Tieyan Li
Tieyan Li
Verified email at
Cited by
Cited by
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
IFIP international information security conference, 109-120, 2007
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
T Li, R Deng
The Second International Conference on Availability, Reliability and …, 2007
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
Building trusted path on untrusted device drivers for mobile devices
W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li
Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
A solution for integrated track and trace in supply chain based on RFID & GPS
W He, EL Tan, EW Lee, TY Li
2009 IEEE conference on emerging technologies & factory automation, 1-6, 2009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on computer and communications …, 2009
Vulnerability analysis of RFID protocols for tag ownership transfer
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li
Computer Networks 54 (9), 1502-1508, 2010
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
T Li, G Wang, RH Deng
J. Softw. 3 (3), 1-10, 2008
A novel two-level trust model for grid
TY Li, H Zhu, KY Lam
Information and Communications Security: 5th International Conference, ICICS …, 2003
Employing lightweight primitives on low-cost rfid tags for authentication
T Li
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador
Workshop on RFID Security 9, 11, 2008
Trust on web browser: Attack vs. defense
TY Li, Y Wu
Applied Cryptography and Network Security: First International Conference …, 2003
A survey on trust models in heterogeneous networks
J Wang, Z Yan, H Wang, T Li, W Pedrycz
IEEE Communications Surveys & Tutorials 24 (4), 2127-2162, 2022
On the trust and trust modeling for the future fully-connected digital world: A comprehensive study
HLJ Ting, X Kang, T Li, H Wang, CK Chu
IEEE Access 9, 106743-106783, 2021
An optimal location update and searching algorithm for tracking mobile agent
TY Li, KY Lam
Proceedings of the first international joint conference on Autonomous agents …, 2002
Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework
P Peris-Lopez, TL Lim, T Li
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
A secure RFID-based track and trace solution in supply chains
W He, N Zhang, PS Tan, EW Lee, TY Li, TL Lim
2008 6th IEEE International Conference on Industrial Informatics, 1364-1369, 2008
Randomized bit encoding for stronger backward channel protection in RFID systems
TL Lim, T Li, SL Yeo
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
P Peris-Lopez, T Li, JC Hernandez-Castro, JME Tapiador
Computer Communications 32 (7-10), 1185-1193, 2009
The system can't perform the operation now. Try again later.
Articles 1–20