BibTeX records: Tieyan Li

download as .bib file

@article{DBLP:journals/tdsc/LiuYWWL24,
  author       = {Gao Liu and
                  Zheng Yan and
                  Dongliang Wang and
                  Haiguang Wang and
                  Tieyan Li},
  title        = {DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated
                  Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {110--124},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3246799},
  doi          = {10.1109/TDSC.2023.3246799},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuYWWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangKLLCW23,
  author       = {Huilin Wang and
                  Xin Kang and
                  Tieyan Li and
                  Zhongding Lei and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  title        = {An Overview of Trust Standards for Communication Networks and Future
                  Digital World},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {42991--42998},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3270042},
  doi          = {10.1109/ACCESS.2023.3270042},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangKLLCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangKLWCL23,
  author       = {Yiying Wang and
                  Xin Kang and
                  Tieyan Li and
                  Haiguang Wang and
                  Cheng{-}Kang Chu and
                  Zhongding Lei},
  title        = {SIX-Trust for 6G: Toward a Secure and Trustworthy Future Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {107657--107668},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3321114},
  doi          = {10.1109/ACCESS.2023.3321114},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangKLWCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/MoKHZLG23,
  author       = {Jiayun Mo and
                  Xin Kang and
                  Ziyuan Hu and
                  Haibo Zhou and
                  Tieyan Li and
                  Xiaojun Gu},
  title        = {Towards Trustworthy Digital Media In The Aigc Era: An Introduction
                  To The Upcoming IsoJpegTrust Standard},
  journal      = {{IEEE} Commun. Stand. Mag.},
  volume       = {7},
  number       = {4},
  pages        = {2--5},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOMSTD.2023.10353009},
  doi          = {10.1109/MCOMSTD.2023.10353009},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csm/MoKHZLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangZYWL23,
  author       = {Mingjun Wang and
                  Dongsheng Zhao and
                  Zheng Yan and
                  Haiguang Wang and
                  Tieyan Li},
  title        = {XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication
                  for 5G HetNets},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {7},
  pages        = {5962--5976},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3223223},
  doi          = {10.1109/JIOT.2022.3223223},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangZYWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZhangXYWL23,
  author       = {Jialei Zhang and
                  Xiaoxuan Xie and
                  Zheng Yan and
                  Haiguang Wang and
                  Tieyan Li},
  title        = {CustTest: An Effective Testbed for Testing Customized Routing in Integrated
                  Heterogeneous Networks},
  booktitle    = {29th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2023, Ocean Flower Island, China, December 17-21, 2023},
  pages        = {783--790},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICPADS60453.2023.00118},
  doi          = {10.1109/ICPADS60453.2023.00118},
  timestamp    = {Sun, 14 Apr 2024 20:48:59 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/ZhangXYWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhaoKLCW22,
  author       = {Yinjie Zhao and
                  Xin Kang and
                  Tieyan Li and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  title        = {Toward Trustworthy DeFi Oracles: Past, Present, and Future},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {60914--60928},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3179374},
  doi          = {10.1109/ACCESS.2022.3179374},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhaoKLCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/WangYWLP22,
  author       = {Jie Wang and
                  Zheng Yan and
                  Haiguang Wang and
                  Tieyan Li and
                  Witold Pedrycz},
  title        = {A Survey on Trust Models in Heterogeneous Networks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {24},
  number       = {4},
  pages        = {2127--2162},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMST.2022.3192978},
  doi          = {10.1109/COMST.2022.3192978},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/WangYWLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ZhangYFWLW22,
  author       = {Jialei Zhang and
                  Zheng Yan and
                  Shufan Fei and
                  Mingjun Wang and
                  Tieyan Li and
                  Haiguang Wang},
  title        = {Is Today's End-to-End Communication Security Enough for 5G and Its
                  Beyond?},
  journal      = {{IEEE} Netw.},
  volume       = {36},
  number       = {1},
  pages        = {105--112},
  year         = {2022},
  url          = {https://doi.org/10.1109/MNET.101.2100189},
  doi          = {10.1109/MNET.101.2100189},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ZhangYFWLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/YanYLMYY22,
  author       = {Zheng Yan and
                  Laurence T. Yang and
                  Tieyan Li and
                  Yoan Miche and
                  Shui Yu and
                  Stephen S. Yau},
  title        = {Guest Editorial: Trust, Security and Privacy of 6G},
  journal      = {{IEEE} Netw.},
  volume       = {36},
  number       = {4},
  pages        = {100--102},
  year         = {2022},
  url          = {https://doi.org/10.1109/MNET.2022.9919737},
  doi          = {10.1109/MNET.2022.9919737},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/YanYLMYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/XieKLCW22,
  author       = {Yining Xie and
                  Xin Kang and
                  Tieyan Li and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {Towards Secure and Trustworthy Flash Loans: {A} Blockchain-Based Trust
                  Management Approach},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {499--513},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_28},
  doi          = {10.1007/978-3-031-23020-2\_28},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/XieKLCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-02358,
  author       = {Yinjie Zhao and
                  Xin Kang and
                  Tieyan Li and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  title        = {Towards Trustworthy DeFi Oracles: Past, Present and Future},
  journal      = {CoRR},
  volume       = {abs/2201.02358},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.02358},
  eprinttype    = {arXiv},
  eprint       = {2201.02358},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-02358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-17291,
  author       = {Yiying Wang and
                  Xin Kang and
                  Tieyan Li and
                  Haiguang Wang and
                  Cheng{-}Kang Chu and
                  Zhongding Lei},
  title        = {SIX-Trust for 6G: Towards a Secure and Trustworthy 6G Network},
  journal      = {CoRR},
  volume       = {abs/2210.17291},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.17291},
  doi          = {10.48550/ARXIV.2210.17291},
  eprinttype    = {arXiv},
  eprint       = {2210.17291},
  timestamp    = {Thu, 03 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-17291.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-01618,
  author       = {Huilin Wang and
                  Xin Kang and
                  Tieyan Li and
                  Zhongding Lei and
                  Cheng{-}Kang Chu and
                  Haiguang Wang},
  title        = {An Overview of Trust Standards for Communication Networks and Future
                  Digital World},
  journal      = {CoRR},
  volume       = {abs/2212.01618},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.01618},
  doi          = {10.48550/ARXIV.2212.01618},
  eprinttype    = {arXiv},
  eprint       = {2212.01618},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-01618.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TingKLWC21,
  author       = {Hannah Lim Jing Ting and
                  Xin Kang and
                  Tieyan Li and
                  Haiguang Wang and
                  Cheng{-}Kang Chu},
  title        = {On the Trust and Trust Modeling for the Future Fully-Connected Digital
                  World: {A} Comprehensive Study},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {106743--106783},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3100767},
  doi          = {10.1109/ACCESS.2021.3100767},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TingKLWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-07528,
  author       = {Hannah Lim Jing Ting and
                  Xin Kang and
                  Tieyan Li and
                  Haiguang Wang and
                  Cheng{-}Kang Chu},
  title        = {On the Trust and Trust Modelling for the Future Fully-Connected Digital
                  World: {A} Comprehensive Study},
  journal      = {CoRR},
  volume       = {abs/2106.07528},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.07528},
  eprinttype    = {arXiv},
  eprint       = {2106.07528},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-07528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WeiYL16,
  author       = {Zhuo Wei and
                  Yanjiang Yang and
                  Tieyan Li},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Authenticated {CAN} Communications Using Standardized Cryptographic
                  Techniques},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {330--343},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_23},
  doi          = {10.1007/978-3-319-49151-6\_23},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WeiYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/WeiLLLSD15,
  author       = {Zhuo Wei and
                  Swee{-}Won Lo and
                  Yu Liang and
                  Tieyan Li and
                  Jialie Shen and
                  Robert H. Deng},
  editor       = {Xiaofang Zhou and
                  Alan F. Smeaton and
                  Qi Tian and
                  Dick C. A. Bulterman and
                  Heng Tao Shen and
                  Ketan Mayer{-}Patel and
                  Shuicheng Yan},
  title        = {Automatic Accident Detection and Alarm System},
  booktitle    = {Proceedings of the 23rd Annual {ACM} Conference on Multimedia Conference,
                  {MM} '15, Brisbane, Australia, October 26 - 30, 2015},
  pages        = {781--784},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2733373.2807402},
  doi          = {10.1145/2733373.2807402},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/WeiLLLSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/TanLXZCL14,
  author       = {Cheng Tan and
                  Haibo Li and
                  Yubin Xia and
                  Binyu Zang and
                  Cheng{-}Kang Chu and
                  Tieyan Li},
  title        = {PreCrime to the rescue: defeating mobile malware one-step ahead},
  booktitle    = {Asia-Pacific Workshop on Systems, APSys'14, Beijing, China, June 25-26,
                  2014},
  pages        = {5:1--5:7},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2637166.2637224},
  doi          = {10.1145/2637166.2637224},
  timestamp    = {Sun, 26 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsys/TanLXZCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/LiMHXZCL14,
  author       = {Wenhao Li and
                  Mingyang Ma and
                  Jinchen Han and
                  Yubin Xia and
                  Binyu Zang and
                  Cheng{-}Kang Chu and
                  Tieyan Li},
  title        = {Building trusted path on untrusted device drivers for mobile devices},
  booktitle    = {Asia-Pacific Workshop on Systems, APSys'14, Beijing, China, June 25-26,
                  2014},
  pages        = {8:1--8:7},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2637166.2637225},
  doi          = {10.1145/2637166.2637225},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsys/LiMHXZCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/XuHAJZWL12,
  author       = {Chi Xu and
                  Wei He and
                  Yintai Ao and
                  Xiao Xue Jian and
                  NengSheng Zhang and
                  Xiao Wendong and
                  Tieyan Li},
  title        = {Data synchronization with conflict resolution for RFID-based track
                  and trace},
  booktitle    = {Proceedings of 2012 {IEEE} 17th International Conference on Emerging
                  Technologies {\&} Factory Automation, {ETFA} 2012, Krakow, Poland,
                  September 17-21, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ETFA.2012.6489549},
  doi          = {10.1109/ETFA.2012.6489549},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/etfa/XuHAJZWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiW11,
  author       = {Tieyan Li and
                  Guilin Wang},
  title        = {Analyzing a Family of Key Protection Schemes against Modification
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {5},
  pages        = {770--776},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2010.44},
  doi          = {10.1109/TDSC.2010.44},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YanHLDL11,
  author       = {Qiang Yan and
                  Jin Han and
                  Yingjiu Li and
                  Robert H. Deng and
                  Tieyan Li},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {A software-based root-of-trust primitive on multicore platforms},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {334--343},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966957},
  doi          = {10.1145/1966913.1966957},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YanHLDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiLW11,
  author       = {Tieyan Li and
                  Yingjiu Li and
                  Guilin Wang},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Secure and Practical Key Distribution for RFID-Enabled Supply Chains},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {356--372},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_20},
  doi          = {10.1007/978-3-642-31909-9\_20},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Peris-LopezHTLL10,
  author       = {Pedro Peris{-}Lopez and
                  Julio C. Hernandez{-}Castro and
                  Juan E. Tapiador and
                  Tieyan Li and
                  Yingjiu Li},
  title        = {Vulnerability analysis of {RFID} protocols for tag ownership transfer},
  journal      = {Comput. Networks},
  volume       = {54},
  number       = {9},
  pages        = {1502--1508},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comnet.2009.11.007},
  doi          = {10.1016/J.COMNET.2009.11.007},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Peris-LopezHTLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Peris-LopezLH10,
  author       = {Pedro Peris{-}Lopez and
                  Tieyan Li and
                  Julio C. Hernandez{-}Castro},
  title        = {Lightweight Props on the Weak Security of {EPC} Class-1 Generation-2
                  Standard},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {3},
  pages        = {518--527},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.518},
  doi          = {10.1587/TRANSINF.E93.D.518},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Peris-LopezLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/CaiLLDY10,
  author       = {Shaoying Cai and
                  Yingjiu Li and
                  Tieyan Li and
                  Robert H. Deng and
                  Haixia Yao},
  title        = {Achieving high security and efficiency in RFID-tagged supply chains},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {3--12},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033794},
  doi          = {10.1504/IJACT.2010.033794},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/CaiLLDY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Peris-LopezCPEL10,
  author       = {Pedro Peris{-}Lopez and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Raphael C.{-}W. Phan and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Tieyan Li},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Quasi-Linear Cryptanalysis of a Secure {RFID} Ultralightweight Authentication
                  Protocol},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {427--442},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_30},
  doi          = {10.1007/978-3-642-21518-6\_30},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Peris-LopezCPEL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CaiSLDL10,
  author       = {Shaoying Cai and
                  Chunhua Su and
                  Yingjiu Li and
                  Robert H. Deng and
                  Tieyan Li},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply
                  Chains},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {246--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_18},
  doi          = {10.1007/978-3-642-17714-9\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/CaiSLDL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iot/ChiewLLDA10,
  author       = {Kevin Chiew and
                  Yingjiu Li and
                  Tieyan Li and
                  Robert H. Deng and
                  Manfred Aigner},
  editor       = {Florian Michahelles and
                  Jin Mitsugi},
  title        = {Time cost evaluation for executing {RFID} authentication protocols},
  booktitle    = {2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan,
                  November 29 - December 1, 2010. Proceedings},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/IOT.2010.5678437},
  doi          = {10.1109/IOT.2010.5678437},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iot/ChiewLLDA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Peris-LopezLHT09,
  author       = {Pedro Peris{-}Lopez and
                  Tieyan Li and
                  Julio C. Hernandez{-}Castro and
                  Juan E. Tapiador},
  title        = {Practical attacks on a mutual authentication scheme under the {EPC}
                  Class-1 Generation-2 standard},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {7-10},
  pages        = {1185--1193},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2009.03.010},
  doi          = {10.1016/J.COMCOM.2009.03.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Peris-LopezLHT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaLDL09,
  author       = {Changshe Ma and
                  Yingjiu Li and
                  Robert H. Deng and
                  Tieyan Li},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {{RFID} privacy: relation between two notions, minimal condition, and
                  efficient construction},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {54--65},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653670},
  doi          = {10.1145/1653662.1653670},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaLDL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Peris-LopezHTLL09,
  author       = {Pedro Peris{-}Lopez and
                  Julio C. Hernandez{-}Castro and
                  Juan E. Tapiador and
                  Tieyan Li and
                  Jan C. A. van der Lubbe},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Weaknesses in Two Recent Lightweight {RFID} Authentication Protocols},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {383--392},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_28},
  doi          = {10.1007/978-3-642-16342-5\_28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Peris-LopezHTLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/HeTLL09,
  author       = {Wei He and
                  Eng Leong Tan and
                  Eng Wah Lee and
                  Tieyan Li},
  title        = {A Solution for Integrated Track and Trace in Supply Chain based on
                  {RFID} {\&} {GPS}},
  booktitle    = {Proceedings of 12th {IEEE} International Conference on Emerging Technologies
                  and Factory Automation, {ETFA} 2009, September 22-25, 2008, Palma
                  de Mallorca, Spain},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ETFA.2009.5347146},
  doi          = {10.1109/ETFA.2009.5347146},
  timestamp    = {Tue, 06 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/etfa/HeTLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/YanLLD09,
  author       = {Qiang Yan and
                  Yingjiu Li and
                  Tieyan Li and
                  Robert H. Deng},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Kirk P. Arnett},
  title        = {Insights into Malware Detection and Prevention on Mobile Phones},
  booktitle    = {Security Technology - International Conference, SecTech 2009, Held
                  as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {58},
  pages        = {242--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10847-1\_30},
  doi          = {10.1007/978-3-642-10847-1\_30},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/YanLLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CaiLMLD09,
  author       = {Shaoying Cai and
                  Tieyan Li and
                  Changshe Ma and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Enabling Secure Secret Updating for Unidirectional Key Distribution
                  in RFID-Enabled Supply Chains},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {150--164},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_13},
  doi          = {10.1007/978-3-642-11145-7\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CaiLMLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangLMLD09,
  author       = {Bing Liang and
                  Yingjiu Li and
                  Changshe Ma and
                  Tieyan Li and
                  Robert H. Deng},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {On the Untraceability of Anonymous {RFID} Authentication Protocol
                  with Constant Key-Lookup},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_7},
  doi          = {10.1007/978-3-642-10772-6\_7},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/LiangLMLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CaiLLD09,
  author       = {Shaoying Cai and
                  Tieyan Li and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {372--383},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_32},
  doi          = {10.1007/978-3-642-00843-6\_32},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CaiLLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CaiLLD09,
  author       = {Shaoying Cai and
                  Yingjiu Li and
                  Tieyan Li and
                  Robert H. Deng},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Attacks and improvements to an {RIFD} mutual authentication protocol
                  and its extensions},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {51--58},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514282},
  doi          = {10.1145/1514274.1514282},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CaiLLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/LiWD08,
  author       = {Tieyan Li and
                  Guilin Wang and
                  Robert H. Deng},
  title        = {Security Analysis on a Family of Ultra-lightweight {RFID} Authentication
                  Protocols},
  journal      = {J. Softw.},
  volume       = {3},
  number       = {3},
  pages        = {1--10},
  year         = {2008},
  url          = {http://www.academypublisher.com/jsw/vol03/no03/jsw03030110.html},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/LiWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/LimLY08,
  author       = {Tong{-}Lee Lim and
                  Tieyan Li and
                  Sze{-}Ling Yeo},
  title        = {A cross-layer framework for privacy enhancement in {RFID} systems},
  journal      = {Pervasive Mob. Comput.},
  volume       = {4},
  number       = {6},
  pages        = {889--905},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.pmcj.2008.09.005},
  doi          = {10.1016/J.PMCJ.2008.09.005},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/LimLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiDW08,
  author       = {Tieyan Li and
                  Robert H. Deng and
                  Guilin Wang},
  title        = {The security and improvement of an ultra-lightweight {RFID} authentication
                  protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {1},
  number       = {2},
  pages        = {135--146},
  year         = {2008},
  url          = {https://doi.org/10.1002/sec.8},
  doi          = {10.1002/SEC.8},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiDW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LimLL08,
  author       = {Tong{-}Lee Lim and
                  Tieyan Li and
                  Yingjiu Li},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {A Security and Performance Evaluation of Hash-Based {RFID} Protocols},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {406--424},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_30},
  doi          = {10.1007/978-3-642-01440-6\_30},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LimLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/Peris-LopezLL08,
  author       = {Pedro Peris{-}Lopez and
                  Tong{-}Lee Lim and
                  Tieyan Li},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {Providing Stronger Authentication at a Low Cost to {RFID} Tags Operating
                  under the EPCglobal Framework},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {159--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.82},
  doi          = {10.1109/EUC.2008.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/Peris-LopezLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/LimLG08,
  author       = {Tong{-}Lee Lim and
                  Tieyan Li and
                  Tao Gu},
  title        = {Secure {RFID} Identification and Authentication with Triggered Hash
                  Chain Variants},
  booktitle    = {14th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2008, Melbourne, Victoria, Australia, December 8-10, 2008},
  pages        = {583--590},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICPADS.2008.46},
  doi          = {10.1109/ICPADS.2008.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/LimLG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/LimLY08,
  author       = {Tong{-}Lee Lim and
                  Tieyan Li and
                  Sze{-}Ling Yeo},
  title        = {Randomized Bit Encoding for Stronger Backward Channel Protection in
                  {RFID} Systems},
  booktitle    = {Sixth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications (PerCom 2008), 17-21 March 2008, Hong Kong},
  pages        = {40--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PERCOM.2008.23},
  doi          = {10.1109/PERCOM.2008.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/LimLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/LimL08,
  author       = {Tong{-}Lee Lim and
                  Tieyan Li},
  title        = {Exposing an effective denial of information attack from the misuse
                  of EPCglobal standards in an {RFID} authentication scheme},
  booktitle    = {Proceedings of the {IEEE} 19th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2008, 15-18 September
                  2008, Cannes, French Riviera, France},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/PIMRC.2008.4699588},
  doi          = {10.1109/PIMRC.2008.4699588},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/LimL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/Li08,
  author       = {Tieyan Li},
  title        = {Employing Lightweight Primitives on Low-Cost {RFID} Tags for Authentication},
  booktitle    = {Proceedings of the 68th {IEEE} Vehicular Technology Conference, {VTC}
                  Fall 2008, 21-24 September 2008, Calgary, Alberta, Canada},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/VETECF.2008.290},
  doi          = {10.1109/VETECF.2008.290},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/Li08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LimL08,
  author       = {Tong{-}Lee Lim and
                  Tieyan Li},
  title        = {Flexible Privacy Protection for {RFID} Tags via Selective Identifier
                  Masking},
  booktitle    = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference,
                  March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings},
  pages        = {1570--1575},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/WCNC.2008.281},
  doi          = {10.1109/WCNC.2008.281},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/LimL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiD07,
  author       = {Tieyan Li and
                  Robert H. Deng},
  title        = {Vulnerability Analysis of EMAP-An Efficient {RFID} Mutual Authentication
                  Protocol},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {238--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.159},
  doi          = {10.1109/ARES.2007.159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LimL07,
  author       = {Tong{-}Lee Lim and
                  Tieyan Li},
  title        = {Addressing the Weakness in a Lightweight {RFID} Tag-Reader Mutual
                  Authentication Scheme},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {59--63},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.19},
  doi          = {10.1109/GLOCOM.2007.19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LimL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiW07,
  author       = {Tieyan Li and
                  Yongdong Wu},
  title        = {Resilient Aggregation Scheme for Confidential Sensor Reports},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {1472--1477},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.247},
  doi          = {10.1109/ICC.2007.247},
  timestamp    = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LiW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiW07,
  author       = {Tieyan Li and
                  Guilin Wang},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {Security Analysis of Two Ultra-Lightweight {RFID} Authentication Protocols},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {109--120},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_10},
  doi          = {10.1007/978-0-387-72367-9\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LiW07,
  author       = {Tieyan Li and
                  Yongdong Wu},
  title        = {Adaptive Stream Authentication for Wireless Multimedia Communications},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007,
                  Hong Kong, China, 11-15 March, 2007},
  pages        = {2613--2618},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/WCNC.2007.486},
  doi          = {10.1109/WCNC.2007.486},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/LiW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/QiBLJW06,
  author       = {Fang Qi and
                  Feng Bao and
                  Tieyan Li and
                  Weijia Jia and
                  Yongdong Wu},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Preventing Web-Spoofing with Automatic Detecting Security Indicator},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {112--122},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_11},
  doi          = {10.1007/11689522\_11},
  timestamp    = {Tue, 24 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/QiBLJW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhuBLQ06,
  author       = {Huafei Zhu and
                  Feng Bao and
                  Tieyan Li and
                  Ying Qiu},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {More on Shared-Scalar-Product Protocols},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {142--152},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_14},
  doi          = {10.1007/11689522\_14},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhuBLQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZhuLB06,
  author       = {Huafei Zhu and
                  Tieyan Li and
                  Feng Bao},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {340--350},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_29},
  doi          = {10.1007/0-387-33406-8\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ZhuLB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/LiWZ06,
  author       = {Tieyan Li and
                  Yongdong Wu and
                  Huafei Zhu},
  title        = {An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks},
  booktitle    = {Proceedings of the 63rd {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2006, 7-10 May 2006, Melbourne, Australia},
  pages        = {831--835},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/VETECS.2006.1682941},
  doi          = {10.1109/VETECS.2006.1682941},
  timestamp    = {Thu, 16 Apr 2020 08:52:59 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/LiWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/WuL06,
  author       = {Yongdong Wu and
                  Tieyan Li},
  title        = {Video stream authentication in lossy networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2006,
                  3-6 April 2006, Las Vegas, Nevada, {USA}},
  pages        = {2150--2155},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/WCNC.2006.1696629},
  doi          = {10.1109/WCNC.2006.1696629},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/WuL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/ZhuBL05,
  author       = {Huafei Zhu and
                  Feng Bao and
                  Tieyan Li},
  editor       = {Jana Dittmann and
                  Stefan Katzenbeisser and
                  Andreas Uhl},
  title        = {Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian
                  Ad-Hoc Networks},
  booktitle    = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2005, Salzburg, Austria, September
                  19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3677},
  pages        = {200--209},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552055\_20},
  doi          = {10.1007/11552055\_20},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/ZhuBL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiZW05,
  author       = {Tieyan Li and
                  Huafei Zhu and
                  Yongdong Wu},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Multi-Source Stream Authentication Framework in Case of Composite
                  {MPEG-4} Stream},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {389--401},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_33},
  doi          = {10.1007/11602897\_33},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiZW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ZhuL05,
  author       = {Huafei Zhu and
                  Tieyan Li},
  title        = {Provably secure anonymous identification protocols for ad-hoc access
                  structures},
  booktitle    = {Proceedings of the {IEEE} 16th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, Berlin, Germany, September
                  11-14, 2005},
  pages        = {2696--2700},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/PIMRC.2005.1651933},
  doi          = {10.1109/PIMRC.2005.1651933},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/ZhuL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WuLD05,
  author       = {Yongdong Wu and
                  Tieyan Li and
                  Robert H. Deng},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {Protecting Group Dynamic Information in Large Scale Multicast Groups},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {459--476},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/WuLD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhuBLW05,
  author       = {Huafei Zhu and
                  Feng Bao and
                  Tieyan Li and
                  Yongdong Wu},
  title        = {Sequential aggregate signatures for wireless routing protocols},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
                  March 13-17, 2005, New Orleans, Louisiana, {USA}},
  pages        = {2436--2439},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/WCNC.2005.1424896},
  doi          = {10.1109/WCNC.2005.1424896},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/ZhuBLW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RenLWBDK04,
  author       = {Kui Ren and
                  Tieyan Li and
                  Zhiguo Wan and
                  Feng Bao and
                  Robert H. Deng and
                  Kwangjo Kim},
  title        = {Highly reliable trust establishment scheme in ad hoc networks},
  journal      = {Comput. Networks},
  volume       = {45},
  number       = {6},
  pages        = {687--699},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comnet.2004.01.008},
  doi          = {10.1016/J.COMNET.2004.01.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/RenLWBDK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ZhuLZKBD04,
  author       = {Bo Zhu and
                  Tieyan Li and
                  Huafei Zhu and
                  Mohan S. Kankanhalli and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Hai Jin and
                  Yi Pan and
                  Nong Xiao and
                  Jianhua Sun},
  title        = {Trust Establishment in Large Scale Grid Settings},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference,
                  Wuhan, China, October 21-24, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3251},
  pages        = {317--324},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30208-7\_46},
  doi          = {10.1007/978-3-540-30208-7\_46},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/ZhuLZKBD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiWMZD04,
  author       = {Tieyan Li and
                  Yongdong Wu and
                  Di Ma and
                  Huafei Zhu and
                  Robert H. Deng},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Flexible Verification of {MPEG-4} Stream in Peer-to-Peer {CDN}},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {79--91},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_7},
  doi          = {10.1007/978-3-540-30191-2\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiWMZD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaDWL04,
  author       = {Di Ma and
                  Robert H. Deng and
                  Yongdong Wu and
                  Tieyan Li},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Dynamic Access Control for Multi-privileged Group Communications},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {508--519},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_39},
  doi          = {10.1007/978-3-540-30191-2\_39},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaDWL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/WangL04,
  author       = {Yan Wang and
                  Tieyan Li},
  title        = {{LITESET/A++:} {A} New Agent-Assisted Secure Payment Protocol},
  booktitle    = {2004 {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2004), 6-9 July 2004, San Diego, CA, {USA}},
  pages        = {244--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICECT.2004.1319740},
  doi          = {10.1109/ICECT.2004.1319740},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/WangL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiW03,
  author       = {Tieyan Li and
                  Yongdong Wu},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {Trust on Web Browser: Attack vs. Defense},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_19},
  doi          = {10.1007/978-3-540-45203-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/LiZY03,
  author       = {Tieyan Li and
                  Zhi{-}Gang Zhao and
                  Si{-}Zhen Yo},
  title        = {A-peer: An Agent Platform Integrating Peer-to-Peer Network},
  booktitle    = {3rd {IEEE} International Symposium on Cluster Computing and the Grid
                  (CCGrid 2003), 12-15 May 2003, Tokyo, Japan},
  pages        = {614--617},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CCGRID.2003.1199422},
  doi          = {10.1109/CCGRID.2003.1199422},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/LiZY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangCL03,
  author       = {Yan Wang and
                  Chi{-}Hung Chi and
                  Tieyan Li},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {Secure Route Structures for the Fast Dispatch of Large-Scale Mobile
                  Agents},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {22--33},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_3},
  doi          = {10.1007/978-3-540-39927-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WangCL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiZL03,
  author       = {Tieyan Li and
                  Huafei Zhu and
                  Kwok{-}Yan Lam},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {A Novel Two-Level Trust Model for Grid},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {214--225},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_20},
  doi          = {10.1007/978-3-540-39927-8\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiZL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/ChewCL03,
  author       = {Wai{-}Meng Chew and
                  Chi{-}Hung Chi and
                  Tieyan Li},
  title        = {Efficient Key Assignment Scheme for Mobile Agent Systems},
  booktitle    = {15th {IEEE} International Conference on Tools with Artificial Intelligence
                  {(ICTAI} 2003), 3-5 November 2003, Sacramento, California, {USA}},
  pages        = {338--345},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/TAI.2003.1250209},
  doi          = {10.1109/TAI.2003.1250209},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictai/ChewCL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Li03,
  author       = {Tieyan Li},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Time Constraint Delegation for {P2P} Data Decryption},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {173--186},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_16},
  doi          = {10.1007/978-3-540-39881-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Li03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/LiL02,
  author       = {Tieyan Li and
                  Kwok{-}Yan Lam},
  title        = {An optimal location update and searching algorithm for tracking mobile
                  agent},
  booktitle    = {The First International Joint Conference on Autonomous Agents {\&}
                  Multiagent Systems, {AAMAS} 2002, July 15-19, 2002, Bologna, Italy,
                  Proceedings},
  pages        = {639--646},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/544862.544892},
  doi          = {10.1145/544862.544892},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/LiL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/LiL02a,
  author       = {Tieyan Li and
                  Kwok{-}Yan Lam},
  title        = {Detecting anomalous agents in mobile agent system: a preliminary approach},
  booktitle    = {The First International Joint Conference on Autonomous Agents {\&}
                  Multiagent Systems, {AAMAS} 2002, July 15-19, 2002, Bologna, Italy,
                  Proceedings},
  pages        = {655--656},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/544862.544894},
  doi          = {10.1145/544862.544894},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/LiL02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/LiCL02,
  author       = {Tieyan Li and
                  Wai{-}Meng Chew and
                  Kwok{-}Yan Lam},
  title        = {Defending against Distributed Denial of Service Attacks Using Resistant
                  Mobile Agent Architecture},
  booktitle    = {16th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts
                  Proceedings},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/IPDPS.2002.1016626},
  doi          = {10.1109/IPDPS.2002.1016626},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/LiCL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/LiL01,
  author       = {Tieyan Li and
                  Kwok{-}Yan Lam},
  title        = {A Secure Group Solution for Multi-Agent {EC} System},
  booktitle    = {Proceedings of the 15th International Parallel {\&} Distributed
                  Processing Symposium (IPDPS-01), San Francisco, CA, USA, April 23-27,
                  2001},
  pages        = {169},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/IPDPS.2001.925163},
  doi          = {10.1109/IPDPS.2001.925163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/LiL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prima/LiSL00,
  author       = {Tieyan Li and
                  Chuk{-}Yang Seng and
                  Kwok{-}Yan Lam},
  editor       = {Chengqi Zhang and
                  Von{-}Wun Soo},
  title        = {A Secure Route Structure for Information Gathering Agent},
  booktitle    = {Design and Applications of Intelligent Agents, Third Pacific Rim International
                  Workshop on Multi-Agents, {PRIMA} 2000, Melbourne, Australia, August
                  28-29, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1881},
  pages        = {101--114},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44594-3\_8},
  doi          = {10.1007/3-540-44594-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/prima/LiSL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8-1/FangLRS98,
  author       = {Meiqi Fang and
                  Tieyan Li and
                  Jinghai Rao and
                  Xiaomeng Su},
  editor       = {Colette Rolland and
                  Yu Chen and
                  Meiqi Fang},
  title        = {A collaborative educational {IS} based on {WWW}},
  booktitle    = {Information Systems in the {WWW} Environment, {IFIP} {TC8/WG8.1} Working
                  Conference on Information Systems in the {WWW} Environment, 15-17
                  July 1998, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {115},
  pages        = {277--297},
  publisher    = {Chapman {\&} Hall},
  year         = {1998},
  timestamp    = {Fri, 08 Apr 2005 09:03:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip8-1/FangLRS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics