Follow
Tieyan Li
Tieyan Li
Verified email at huawei.com
Title
Cited by
Cited by
Year
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
IFIP international information security conference, 109-120, 2007
2802007
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
T Li, R Deng
The Second International Conference on Availability, Reliability and …, 2007
2222007
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
1562004
Building trusted path on untrusted device drivers for mobile devices
W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li
Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014
1082014
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
962009
A solution for integrated track and trace in supply chain based on RFID & GPS
W He, EL Tan, EW Lee, TY Li
2009 IEEE conference on emerging technologies & factory automation, 1-6, 2009
952009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on computer and communications …, 2009
852009
Vulnerability analysis of RFID protocols for tag ownership transfer
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li
Computer Networks 54 (9), 1502-1508, 2010
642010
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
T Li, G Wang, RH Deng
J. Softw. 3 (3), 1-10, 2008
442008
A novel two-level trust model for grid
TY Li, H Zhu, KY Lam
Information and Communications Security: 5th International Conference, ICICS …, 2003
432003
Employing lightweight primitives on low-cost rfid tags for authentication
T Li
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
402008
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador
Workshop on RFID Security 9, 11, 2008
382008
Trust on web browser: Attack vs. defense
TY Li, Y Wu
Applied Cryptography and Network Security: First International Conference …, 2003
362003
A survey on trust models in heterogeneous networks
J Wang, Z Yan, H Wang, T Li, W Pedrycz
IEEE Communications Surveys & Tutorials 24 (4), 2127-2162, 2022
342022
On the trust and trust modeling for the future fully-connected digital world: A comprehensive study
HLJ Ting, X Kang, T Li, H Wang, CK Chu
IEEE Access 9, 106743-106783, 2021
342021
An optimal location update and searching algorithm for tracking mobile agent
TY Li, KY Lam
Proceedings of the first international joint conference on Autonomous agents …, 2002
322002
Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework
P Peris-Lopez, TL Lim, T Li
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
282008
A secure RFID-based track and trace solution in supply chains
W He, N Zhang, PS Tan, EW Lee, TY Li, TL Lim
2008 6th IEEE International Conference on Industrial Informatics, 1364-1369, 2008
282008
Randomized bit encoding for stronger backward channel protection in RFID systems
TL Lim, T Li, SL Yeo
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
282008
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
P Peris-Lopez, T Li, JC Hernandez-Castro, JME Tapiador
Computer Communications 32 (7-10), 1185-1193, 2009
272009
The system can't perform the operation now. Try again later.
Articles 1–20