Follow
Tieyan Li
Tieyan Li
Verified email at huawei.com
Title
Cited by
Cited by
Year
Security analysis of two ultra-lightweight RFID authentication protocols
T Li, G Wang
IFIP international information security conference, 109-120, 2007
2842007
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
T Li, R Deng
The Second International Conference on Availability, Reliability and …, 2007
2252007
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
1562004
Building trusted path on untrusted device drivers for mobile devices
W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li
Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014
1122014
A solution for integrated track and trace in supply chain based on RFID & GPS
W He, EL Tan, EW Lee, TY Li
2009 IEEE conference on emerging technologies & factory automation, 1-6, 2009
1012009
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
S Cai, Y Li, T Li, RH Deng
Proceedings of the second ACM conference on Wireless network security, 51-58, 2009
982009
RFID privacy: relation between two notions, minimal condition, and efficient construction
C Ma, Y Li, RH Deng, T Li
Proceedings of the 16th ACM conference on computer and communications …, 2009
852009
Vulnerability analysis of RFID protocols for tag ownership transfer
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, T Li, Y Li
Computer Networks 54 (9), 1502-1508, 2010
642010
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
T Li, G Wang, RH Deng
J. Softw. 3 (3), 1-10, 2008
452008
A novel two-level trust model for grid
TY Li, H Zhu, KY Lam
Information and Communications Security: 5th International Conference, ICICS …, 2003
432003
Employing lightweight primitives on low-cost rfid tags for authentication
T Li
2008 IEEE 68th Vehicular Technology Conference, 1-5, 2008
402008
A survey on trust models in heterogeneous networks
J Wang, Z Yan, H Wang, T Li, W Pedrycz
IEEE Communications Surveys & Tutorials 24 (4), 2127-2162, 2022
382022
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
P Peris-Lopez, T Li, TL Lim, JC Hernandez-Castro, JM Estevez-Tapiador
Workshop on RFID Security 9, 11, 2008
382008
On the trust and trust modeling for the future fully-connected digital world: A comprehensive study
HLJ Ting, X Kang, T Li, H Wang, CK Chu
IEEE Access 9, 106743-106783, 2021
372021
Trust on web browser: Attack vs. defense
TY Li, Y Wu
Applied Cryptography and Network Security: First International Conference …, 2003
362003
An optimal location update and searching algorithm for tracking mobile agent
TY Li, KY Lam
Proceedings of the first international joint conference on Autonomous agents …, 2002
322002
A secure RFID-based track and trace solution in supply chains
W He, N Zhang, PS Tan, EW Lee, TY Li, TL Lim
2008 6th IEEE International Conference on Industrial Informatics, 1364-1369, 2008
292008
Toward trustworthy defi oracles: past, present, and future
Y Zhao, X Kang, T Li, CK Chu, H Wang
IEEE Access 10, 60914-60928, 2022
282022
Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework
P Peris-Lopez, TL Lim, T Li
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
282008
Randomized bit encoding for stronger backward channel protection in RFID systems
TL Lim, T Li, SL Yeo
2008 Sixth Annual IEEE International Conference on Pervasive Computing and …, 2008
282008
The system can't perform the operation now. Try again later.
Articles 1–20