Security analysis of two ultra-lightweight RFID authentication protocols T Li, G Wang IFIP international information security conference, 109-120, 2007 | 284 | 2007 |
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol T Li, R Deng The Second International Conference on Availability, Reliability and …, 2007 | 225 | 2007 |
Highly reliable trust establishment scheme in ad hoc networks K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim Computer Networks 45 (6), 687-699, 2004 | 156 | 2004 |
Building trusted path on untrusted device drivers for mobile devices W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014 | 112 | 2014 |
A solution for integrated track and trace in supply chain based on RFID & GPS W He, EL Tan, EW Lee, TY Li 2009 IEEE conference on emerging technologies & factory automation, 1-6, 2009 | 101 | 2009 |
Attacks and improvements to an RIFD mutual authentication protocol and its extensions S Cai, Y Li, T Li, RH Deng Proceedings of the second ACM conference on Wireless network security, 51-58, 2009 | 98 | 2009 |
RFID privacy: relation between two notions, minimal condition, and efficient construction C Ma, Y Li, RH Deng, T Li Proceedings of the 16th ACM conference on computer and communications …, 2009 | 85 | 2009 |
Vulnerability analysis of RFID protocols for tag ownership transfer P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li Computer Networks 54 (9), 1502-1508, 2010 | 64 | 2010 |
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. T Li, G Wang, RH Deng J. Softw. 3 (3), 1-10, 2008 | 45 | 2008 |
A novel two-level trust model for grid TY Li, H Zhu, KY Lam Information and Communications Security: 5th International Conference, ICICS …, 2003 | 43 | 2003 |
Employing lightweight primitives on low-cost rfid tags for authentication T Li 2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008 | 40 | 2008 |
A survey on trust models in heterogeneous networks J Wang, Z Yan, H Wang, T Li, W Pedrycz IEEE Communications Surveys & Tutorials 24 (4), 2127-2162, 2022 | 38 | 2022 |
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador Workshop on RFID Security 9, 11, 2008 | 38 | 2008 |
On the trust and trust modeling for the future fully-connected digital world: A comprehensive study HLJ Ting, X Kang, T Li, H Wang, CK Chu IEEE Access 9, 106743-106783, 2021 | 37 | 2021 |
Trust on web browser: Attack vs. defense TY Li, Y Wu Applied Cryptography and Network Security: First International Conference …, 2003 | 36 | 2003 |
An optimal location update and searching algorithm for tracking mobile agent TY Li, KY Lam Proceedings of the first international joint conference on Autonomous agents …, 2002 | 32 | 2002 |
A secure RFID-based track and trace solution in supply chains W He, N Zhang, PS Tan, EW Lee, TY Li, TL Lim 2008 6th IEEE International Conference on Industrial Informatics, 1364-1369, 2008 | 29 | 2008 |
Toward trustworthy defi oracles: past, present, and future Y Zhao, X Kang, T Li, CK Chu, H Wang IEEE Access 10, 60914-60928, 2022 | 28 | 2022 |
Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework P Peris-Lopez, TL Lim, T Li 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008 | 28 | 2008 |
Randomized bit encoding for stronger backward channel protection in RFID systems TL Lim, T Li, SL Yeo 2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008 | 28 | 2008 |