Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tieyan Li
@article{DBLP:journals/tdsc/LiuYWWL24, author = {Gao Liu and Zheng Yan and Dongliang Wang and Haiguang Wang and Tieyan Li}, title = {DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {110--124}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3246799}, doi = {10.1109/TDSC.2023.3246799}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuYWWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangKLLCW23, author = {Huilin Wang and Xin Kang and Tieyan Li and Zhongding Lei and Cheng{-}Kang Chu and Haiguang Wang}, title = {An Overview of Trust Standards for Communication Networks and Future Digital World}, journal = {{IEEE} Access}, volume = {11}, pages = {42991--42998}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3270042}, doi = {10.1109/ACCESS.2023.3270042}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangKLLCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangKLWCL23, author = {Yiying Wang and Xin Kang and Tieyan Li and Haiguang Wang and Cheng{-}Kang Chu and Zhongding Lei}, title = {SIX-Trust for 6G: Toward a Secure and Trustworthy Future Network}, journal = {{IEEE} Access}, volume = {11}, pages = {107657--107668}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3321114}, doi = {10.1109/ACCESS.2023.3321114}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangKLWCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csm/MoKHZLG23, author = {Jiayun Mo and Xin Kang and Ziyuan Hu and Haibo Zhou and Tieyan Li and Xiaojun Gu}, title = {Towards Trustworthy Digital Media In The Aigc Era: An Introduction To The Upcoming IsoJpegTrust Standard}, journal = {{IEEE} Commun. Stand. Mag.}, volume = {7}, number = {4}, pages = {2--5}, year = {2023}, url = {https://doi.org/10.1109/MCOMSTD.2023.10353009}, doi = {10.1109/MCOMSTD.2023.10353009}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csm/MoKHZLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangZYWL23, author = {Mingjun Wang and Dongsheng Zhao and Zheng Yan and Haiguang Wang and Tieyan Li}, title = {XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {7}, pages = {5962--5976}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3223223}, doi = {10.1109/JIOT.2022.3223223}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangZYWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ZhangXYWL23, author = {Jialei Zhang and Xiaoxuan Xie and Zheng Yan and Haiguang Wang and Tieyan Li}, title = {CustTest: An Effective Testbed for Testing Customized Routing in Integrated Heterogeneous Networks}, booktitle = {29th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2023, Ocean Flower Island, China, December 17-21, 2023}, pages = {783--790}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICPADS60453.2023.00118}, doi = {10.1109/ICPADS60453.2023.00118}, timestamp = {Sun, 14 Apr 2024 20:48:59 +0200}, biburl = {https://dblp.org/rec/conf/icpads/ZhangXYWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhaoKLCW22, author = {Yinjie Zhao and Xin Kang and Tieyan Li and Cheng{-}Kang Chu and Haiguang Wang}, title = {Toward Trustworthy DeFi Oracles: Past, Present, and Future}, journal = {{IEEE} Access}, volume = {10}, pages = {60914--60928}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3179374}, doi = {10.1109/ACCESS.2022.3179374}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhaoKLCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/WangYWLP22, author = {Jie Wang and Zheng Yan and Haiguang Wang and Tieyan Li and Witold Pedrycz}, title = {A Survey on Trust Models in Heterogeneous Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {24}, number = {4}, pages = {2127--2162}, year = {2022}, url = {https://doi.org/10.1109/COMST.2022.3192978}, doi = {10.1109/COMST.2022.3192978}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/WangYWLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ZhangYFWLW22, author = {Jialei Zhang and Zheng Yan and Shufan Fei and Mingjun Wang and Tieyan Li and Haiguang Wang}, title = {Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?}, journal = {{IEEE} Netw.}, volume = {36}, number = {1}, pages = {105--112}, year = {2022}, url = {https://doi.org/10.1109/MNET.101.2100189}, doi = {10.1109/MNET.101.2100189}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ZhangYFWLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/YanYLMYY22, author = {Zheng Yan and Laurence T. Yang and Tieyan Li and Yoan Miche and Shui Yu and Stephen S. Yau}, title = {Guest Editorial: Trust, Security and Privacy of 6G}, journal = {{IEEE} Netw.}, volume = {36}, number = {4}, pages = {100--102}, year = {2022}, url = {https://doi.org/10.1109/MNET.2022.9919737}, doi = {10.1109/MNET.2022.9919737}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/YanYLMYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/XieKLCW22, author = {Yining Xie and Xin Kang and Tieyan Li and Cheng{-}Kang Chu and Haiguang Wang}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Towards Secure and Trustworthy Flash Loans: {A} Blockchain-Based Trust Management Approach}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {499--513}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_28}, doi = {10.1007/978-3-031-23020-2\_28}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/XieKLCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-02358, author = {Yinjie Zhao and Xin Kang and Tieyan Li and Cheng{-}Kang Chu and Haiguang Wang}, title = {Towards Trustworthy DeFi Oracles: Past, Present and Future}, journal = {CoRR}, volume = {abs/2201.02358}, year = {2022}, url = {https://arxiv.org/abs/2201.02358}, eprinttype = {arXiv}, eprint = {2201.02358}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-02358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-17291, author = {Yiying Wang and Xin Kang and Tieyan Li and Haiguang Wang and Cheng{-}Kang Chu and Zhongding Lei}, title = {SIX-Trust for 6G: Towards a Secure and Trustworthy 6G Network}, journal = {CoRR}, volume = {abs/2210.17291}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.17291}, doi = {10.48550/ARXIV.2210.17291}, eprinttype = {arXiv}, eprint = {2210.17291}, timestamp = {Thu, 03 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-17291.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-01618, author = {Huilin Wang and Xin Kang and Tieyan Li and Zhongding Lei and Cheng{-}Kang Chu and Haiguang Wang}, title = {An Overview of Trust Standards for Communication Networks and Future Digital World}, journal = {CoRR}, volume = {abs/2212.01618}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.01618}, doi = {10.48550/ARXIV.2212.01618}, eprinttype = {arXiv}, eprint = {2212.01618}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-01618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TingKLWC21, author = {Hannah Lim Jing Ting and Xin Kang and Tieyan Li and Haiguang Wang and Cheng{-}Kang Chu}, title = {On the Trust and Trust Modeling for the Future Fully-Connected Digital World: {A} Comprehensive Study}, journal = {{IEEE} Access}, volume = {9}, pages = {106743--106783}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3100767}, doi = {10.1109/ACCESS.2021.3100767}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TingKLWC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-07528, author = {Hannah Lim Jing Ting and Xin Kang and Tieyan Li and Haiguang Wang and Cheng{-}Kang Chu}, title = {On the Trust and Trust Modelling for the Future Fully-Connected Digital World: {A} Comprehensive Study}, journal = {CoRR}, volume = {abs/2106.07528}, year = {2021}, url = {https://arxiv.org/abs/2106.07528}, eprinttype = {arXiv}, eprint = {2106.07528}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-07528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WeiYL16, author = {Zhuo Wei and Yanjiang Yang and Tieyan Li}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Authenticated {CAN} Communications Using Standardized Cryptographic Techniques}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {330--343}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_23}, doi = {10.1007/978-3-319-49151-6\_23}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WeiYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/WeiLLLSD15, author = {Zhuo Wei and Swee{-}Won Lo and Yu Liang and Tieyan Li and Jialie Shen and Robert H. Deng}, editor = {Xiaofang Zhou and Alan F. Smeaton and Qi Tian and Dick C. A. Bulterman and Heng Tao Shen and Ketan Mayer{-}Patel and Shuicheng Yan}, title = {Automatic Accident Detection and Alarm System}, booktitle = {Proceedings of the 23rd Annual {ACM} Conference on Multimedia Conference, {MM} '15, Brisbane, Australia, October 26 - 30, 2015}, pages = {781--784}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2733373.2807402}, doi = {10.1145/2733373.2807402}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/WeiLLLSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsys/TanLXZCL14, author = {Cheng Tan and Haibo Li and Yubin Xia and Binyu Zang and Cheng{-}Kang Chu and Tieyan Li}, title = {PreCrime to the rescue: defeating mobile malware one-step ahead}, booktitle = {Asia-Pacific Workshop on Systems, APSys'14, Beijing, China, June 25-26, 2014}, pages = {5:1--5:7}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637166.2637224}, doi = {10.1145/2637166.2637224}, timestamp = {Sun, 26 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsys/TanLXZCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsys/LiMHXZCL14, author = {Wenhao Li and Mingyang Ma and Jinchen Han and Yubin Xia and Binyu Zang and Cheng{-}Kang Chu and Tieyan Li}, title = {Building trusted path on untrusted device drivers for mobile devices}, booktitle = {Asia-Pacific Workshop on Systems, APSys'14, Beijing, China, June 25-26, 2014}, pages = {8:1--8:7}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637166.2637225}, doi = {10.1145/2637166.2637225}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsys/LiMHXZCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/XuHAJZWL12, author = {Chi Xu and Wei He and Yintai Ao and Xiao Xue Jian and NengSheng Zhang and Xiao Wendong and Tieyan Li}, title = {Data synchronization with conflict resolution for RFID-based track and trace}, booktitle = {Proceedings of 2012 {IEEE} 17th International Conference on Emerging Technologies {\&} Factory Automation, {ETFA} 2012, Krakow, Poland, September 17-21, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ETFA.2012.6489549}, doi = {10.1109/ETFA.2012.6489549}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/etfa/XuHAJZWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiW11, author = {Tieyan Li and Guilin Wang}, title = {Analyzing a Family of Key Protection Schemes against Modification Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {5}, pages = {770--776}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2010.44}, doi = {10.1109/TDSC.2010.44}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YanHLDL11, author = {Qiang Yan and Jin Han and Yingjiu Li and Robert H. Deng and Tieyan Li}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {A software-based root-of-trust primitive on multicore platforms}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {334--343}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966957}, doi = {10.1145/1966913.1966957}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YanHLDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiLW11, author = {Tieyan Li and Yingjiu Li and Guilin Wang}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Secure and Practical Key Distribution for RFID-Enabled Supply Chains}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {356--372}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_20}, doi = {10.1007/978-3-642-31909-9\_20}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LiLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Peris-LopezHTLL10, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan E. Tapiador and Tieyan Li and Yingjiu Li}, title = {Vulnerability analysis of {RFID} protocols for tag ownership transfer}, journal = {Comput. Networks}, volume = {54}, number = {9}, pages = {1502--1508}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2009.11.007}, doi = {10.1016/J.COMNET.2009.11.007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Peris-LopezHTLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Peris-LopezLH10, author = {Pedro Peris{-}Lopez and Tieyan Li and Julio C. Hernandez{-}Castro}, title = {Lightweight Props on the Weak Security of {EPC} Class-1 Generation-2 Standard}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {3}, pages = {518--527}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.518}, doi = {10.1587/TRANSINF.E93.D.518}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Peris-LopezLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/CaiLLDY10, author = {Shaoying Cai and Yingjiu Li and Tieyan Li and Robert H. Deng and Haixia Yao}, title = {Achieving high security and efficiency in RFID-tagged supply chains}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {3--12}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033794}, doi = {10.1504/IJACT.2010.033794}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/CaiLLDY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Peris-LopezCPEL10, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Raphael C.{-}W. Phan and Juan M. Est{\'{e}}vez{-}Tapiador and Tieyan Li}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Quasi-Linear Cryptanalysis of a Secure {RFID} Ultralightweight Authentication Protocol}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {427--442}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_30}, doi = {10.1007/978-3-642-21518-6\_30}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Peris-LopezCPEL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CaiSLDL10, author = {Shaoying Cai and Chunhua Su and Yingjiu Li and Robert H. Deng and Tieyan Li}, editor = {Somesh Jha and Anish Mathuria}, title = {Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {246--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_18}, doi = {10.1007/978-3-642-17714-9\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/CaiSLDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iot/ChiewLLDA10, author = {Kevin Chiew and Yingjiu Li and Tieyan Li and Robert H. Deng and Manfred Aigner}, editor = {Florian Michahelles and Jin Mitsugi}, title = {Time cost evaluation for executing {RFID} authentication protocols}, booktitle = {2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29 - December 1, 2010. Proceedings}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/IOT.2010.5678437}, doi = {10.1109/IOT.2010.5678437}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iot/ChiewLLDA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Peris-LopezLHT09, author = {Pedro Peris{-}Lopez and Tieyan Li and Julio C. Hernandez{-}Castro and Juan E. Tapiador}, title = {Practical attacks on a mutual authentication scheme under the {EPC} Class-1 Generation-2 standard}, journal = {Comput. Commun.}, volume = {32}, number = {7-10}, pages = {1185--1193}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2009.03.010}, doi = {10.1016/J.COMCOM.2009.03.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/Peris-LopezLHT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaLDL09, author = {Changshe Ma and Yingjiu Li and Robert H. Deng and Tieyan Li}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {{RFID} privacy: relation between two notions, minimal condition, and efficient construction}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {54--65}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653670}, doi = {10.1145/1653662.1653670}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaLDL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Peris-LopezHTLL09, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan E. Tapiador and Tieyan Li and Jan C. A. van der Lubbe}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Weaknesses in Two Recent Lightweight {RFID} Authentication Protocols}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {383--392}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_28}, doi = {10.1007/978-3-642-16342-5\_28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Peris-LopezHTLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/HeTLL09, author = {Wei He and Eng Leong Tan and Eng Wah Lee and Tieyan Li}, title = {A Solution for Integrated Track and Trace in Supply Chain based on {RFID} {\&} {GPS}}, booktitle = {Proceedings of 12th {IEEE} International Conference on Emerging Technologies and Factory Automation, {ETFA} 2009, September 22-25, 2008, Palma de Mallorca, Spain}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ETFA.2009.5347146}, doi = {10.1109/ETFA.2009.5347146}, timestamp = {Tue, 06 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/etfa/HeTLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YanLLD09, author = {Qiang Yan and Yingjiu Li and Tieyan Li and Robert H. Deng}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Wai{-}Chi Fang and Kirk P. Arnett}, title = {Insights into Malware Detection and Prevention on Mobile Phones}, booktitle = {Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {58}, pages = {242--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10847-1\_30}, doi = {10.1007/978-3-642-10847-1\_30}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/YanLLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CaiLMLD09, author = {Shaoying Cai and Tieyan Li and Changshe Ma and Yingjiu Li and Robert H. Deng}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {150--164}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_13}, doi = {10.1007/978-3-642-11145-7\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CaiLMLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiangLMLD09, author = {Bing Liang and Yingjiu Li and Changshe Ma and Tieyan Li and Robert H. Deng}, editor = {Atul Prakash and Indranil Gupta}, title = {On the Untraceability of Anonymous {RFID} Authentication Protocol with Constant Key-Lookup}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {71--85}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_7}, doi = {10.1007/978-3-642-10772-6\_7}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LiangLMLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CaiLLD09, author = {Shaoying Cai and Tieyan Li and Yingjiu Li and Robert H. Deng}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {372--383}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_32}, doi = {10.1007/978-3-642-00843-6\_32}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CaiLLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CaiLLD09, author = {Shaoying Cai and Yingjiu Li and Tieyan Li and Robert H. Deng}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Attacks and improvements to an {RIFD} mutual authentication protocol and its extensions}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {51--58}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514282}, doi = {10.1145/1514274.1514282}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CaiLLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LiWD08, author = {Tieyan Li and Guilin Wang and Robert H. Deng}, title = {Security Analysis on a Family of Ultra-lightweight {RFID} Authentication Protocols}, journal = {J. Softw.}, volume = {3}, number = {3}, pages = {1--10}, year = {2008}, url = {http://www.academypublisher.com/jsw/vol03/no03/jsw03030110.html}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LiWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/LimLY08, author = {Tong{-}Lee Lim and Tieyan Li and Sze{-}Ling Yeo}, title = {A cross-layer framework for privacy enhancement in {RFID} systems}, journal = {Pervasive Mob. Comput.}, volume = {4}, number = {6}, pages = {889--905}, year = {2008}, url = {https://doi.org/10.1016/j.pmcj.2008.09.005}, doi = {10.1016/J.PMCJ.2008.09.005}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/LimLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiDW08, author = {Tieyan Li and Robert H. Deng and Guilin Wang}, title = {The security and improvement of an ultra-lightweight {RFID} authentication protocol}, journal = {Secur. Commun. Networks}, volume = {1}, number = {2}, pages = {135--146}, year = {2008}, url = {https://doi.org/10.1002/sec.8}, doi = {10.1002/SEC.8}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiDW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LimLL08, author = {Tong{-}Lee Lim and Tieyan Li and Yingjiu Li}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {A Security and Performance Evaluation of Hash-Based {RFID} Protocols}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {406--424}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_30}, doi = {10.1007/978-3-642-01440-6\_30}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LimLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/Peris-LopezLL08, author = {Pedro Peris{-}Lopez and Tong{-}Lee Lim and Tieyan Li}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Providing Stronger Authentication at a Low Cost to {RFID} Tags Operating under the EPCglobal Framework}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {159--166}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.82}, doi = {10.1109/EUC.2008.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/Peris-LopezLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/LimLG08, author = {Tong{-}Lee Lim and Tieyan Li and Tao Gu}, title = {Secure {RFID} Identification and Authentication with Triggered Hash Chain Variants}, booktitle = {14th International Conference on Parallel and Distributed Systems, {ICPADS} 2008, Melbourne, Victoria, Australia, December 8-10, 2008}, pages = {583--590}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICPADS.2008.46}, doi = {10.1109/ICPADS.2008.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/LimLG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/LimLY08, author = {Tong{-}Lee Lim and Tieyan Li and Sze{-}Ling Yeo}, title = {Randomized Bit Encoding for Stronger Backward Channel Protection in {RFID} Systems}, booktitle = {Sixth Annual {IEEE} International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong}, pages = {40--49}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PERCOM.2008.23}, doi = {10.1109/PERCOM.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/LimLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/LimL08, author = {Tong{-}Lee Lim and Tieyan Li}, title = {Exposing an effective denial of information attack from the misuse of EPCglobal standards in an {RFID} authentication scheme}, booktitle = {Proceedings of the {IEEE} 19th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2008, 15-18 September 2008, Cannes, French Riviera, France}, pages = {1--6}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/PIMRC.2008.4699588}, doi = {10.1109/PIMRC.2008.4699588}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/LimL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/Li08, author = {Tieyan Li}, title = {Employing Lightweight Primitives on Low-Cost {RFID} Tags for Authentication}, booktitle = {Proceedings of the 68th {IEEE} Vehicular Technology Conference, {VTC} Fall 2008, 21-24 September 2008, Calgary, Alberta, Canada}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/VETECF.2008.290}, doi = {10.1109/VETECF.2008.290}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/Li08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LimL08, author = {Tong{-}Lee Lim and Tieyan Li}, title = {Flexible Privacy Protection for {RFID} Tags via Selective Identifier Masking}, booktitle = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings}, pages = {1570--1575}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/WCNC.2008.281}, doi = {10.1109/WCNC.2008.281}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/LimL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LiD07, author = {Tieyan Li and Robert H. Deng}, title = {Vulnerability Analysis of EMAP-An Efficient {RFID} Mutual Authentication Protocol}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {238--245}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.159}, doi = {10.1109/ARES.2007.159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/LiD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LimL07, author = {Tong{-}Lee Lim and Tieyan Li}, title = {Addressing the Weakness in a Lightweight {RFID} Tag-Reader Mutual Authentication Scheme}, booktitle = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM} '07, Washington, DC, USA, 26-30 November 2007}, pages = {59--63}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/GLOCOM.2007.19}, doi = {10.1109/GLOCOM.2007.19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LimL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiW07, author = {Tieyan Li and Yongdong Wu}, title = {Resilient Aggregation Scheme for Confidential Sensor Reports}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {1472--1477}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.247}, doi = {10.1109/ICC.2007.247}, timestamp = {Tue, 19 Jun 2018 07:53:33 +0200}, biburl = {https://dblp.org/rec/conf/icc/LiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiW07, author = {Tieyan Li and Guilin Wang}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {Security Analysis of Two Ultra-Lightweight {RFID} Authentication Protocols}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {109--120}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_10}, doi = {10.1007/978-0-387-72367-9\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LiW07, author = {Tieyan Li and Yongdong Wu}, title = {Adaptive Stream Authentication for Wireless Multimedia Communications}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2007, Hong Kong, China, 11-15 March, 2007}, pages = {2613--2618}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/WCNC.2007.486}, doi = {10.1109/WCNC.2007.486}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/LiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/QiBLJW06, author = {Fang Qi and Feng Bao and Tieyan Li and Weijia Jia and Yongdong Wu}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Preventing Web-Spoofing with Automatic Detecting Security Indicator}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {112--122}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_11}, doi = {10.1007/11689522\_11}, timestamp = {Tue, 24 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/QiBLJW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhuBLQ06, author = {Huafei Zhu and Feng Bao and Tieyan Li and Ying Qiu}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {More on Shared-Scalar-Product Protocols}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {142--152}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_14}, doi = {10.1007/11689522\_14}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ZhuBLQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ZhuLB06, author = {Huafei Zhu and Tieyan Li and Feng Bao}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {340--350}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_29}, doi = {10.1007/0-387-33406-8\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ZhuLB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LiWZ06, author = {Tieyan Li and Yongdong Wu and Huafei Zhu}, title = {An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks}, booktitle = {Proceedings of the 63rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2006, 7-10 May 2006, Melbourne, Australia}, pages = {831--835}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/VETECS.2006.1682941}, doi = {10.1109/VETECS.2006.1682941}, timestamp = {Thu, 16 Apr 2020 08:52:59 +0200}, biburl = {https://dblp.org/rec/conf/vtc/LiWZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/WuL06, author = {Yongdong Wu and Tieyan Li}, title = {Video stream authentication in lossy networks}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2006, 3-6 April 2006, Las Vegas, Nevada, {USA}}, pages = {2150--2155}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/WCNC.2006.1696629}, doi = {10.1109/WCNC.2006.1696629}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/WuL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/ZhuBL05, author = {Huafei Zhu and Feng Bao and Tieyan Li}, editor = {Jana Dittmann and Stefan Katzenbeisser and Andreas Uhl}, title = {Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks}, booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2005, Salzburg, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3677}, pages = {200--209}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552055\_20}, doi = {10.1007/11552055\_20}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/ZhuBL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiZW05, author = {Tieyan Li and Huafei Zhu and Yongdong Wu}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Multi-Source Stream Authentication Framework in Case of Composite {MPEG-4} Stream}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {389--401}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_33}, doi = {10.1007/11602897\_33}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/ZhuL05, author = {Huafei Zhu and Tieyan Li}, title = {Provably secure anonymous identification protocols for ad-hoc access structures}, booktitle = {Proceedings of the {IEEE} 16th International Symposium on Personal, Indoor and Mobile Radio Communications, Berlin, Germany, September 11-14, 2005}, pages = {2696--2700}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/PIMRC.2005.1651933}, doi = {10.1109/PIMRC.2005.1651933}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/ZhuL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/WuLD05, author = {Yongdong Wu and Tieyan Li and Robert H. Deng}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {Protecting Group Dynamic Information in Large Scale Multicast Groups}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {459--476}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/WuLD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ZhuBLW05, author = {Huafei Zhu and Feng Bao and Tieyan Li and Yongdong Wu}, title = {Sequential aggregate signatures for wireless routing protocols}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005, March 13-17, 2005, New Orleans, Louisiana, {USA}}, pages = {2436--2439}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/WCNC.2005.1424896}, doi = {10.1109/WCNC.2005.1424896}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/ZhuBLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RenLWBDK04, author = {Kui Ren and Tieyan Li and Zhiguo Wan and Feng Bao and Robert H. Deng and Kwangjo Kim}, title = {Highly reliable trust establishment scheme in ad hoc networks}, journal = {Comput. Networks}, volume = {45}, number = {6}, pages = {687--699}, year = {2004}, url = {https://doi.org/10.1016/j.comnet.2004.01.008}, doi = {10.1016/J.COMNET.2004.01.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RenLWBDK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/ZhuLZKBD04, author = {Bo Zhu and Tieyan Li and Huafei Zhu and Mohan S. Kankanhalli and Feng Bao and Robert H. Deng}, editor = {Hai Jin and Yi Pan and Nong Xiao and Jianhua Sun}, title = {Trust Establishment in Large Scale Grid Settings}, booktitle = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3251}, pages = {317--324}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30208-7\_46}, doi = {10.1007/978-3-540-30208-7\_46}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gcc/ZhuLZKBD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiWMZD04, author = {Tieyan Li and Yongdong Wu and Di Ma and Huafei Zhu and Robert H. Deng}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Flexible Verification of {MPEG-4} Stream in Peer-to-Peer {CDN}}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {79--91}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_7}, doi = {10.1007/978-3-540-30191-2\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiWMZD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaDWL04, author = {Di Ma and Robert H. Deng and Yongdong Wu and Tieyan Li}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Dynamic Access Control for Multi-privileged Group Communications}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {508--519}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_39}, doi = {10.1007/978-3-540-30191-2\_39}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaDWL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/WangL04, author = {Yan Wang and Tieyan Li}, title = {{LITESET/A++:} {A} New Agent-Assisted Secure Payment Protocol}, booktitle = {2004 {IEEE} International Conference on E-Commerce Technology {(CEC} 2004), 6-9 July 2004, San Diego, CA, {USA}}, pages = {244--251}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ICECT.2004.1319740}, doi = {10.1109/ICECT.2004.1319740}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/WangL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiW03, author = {Tieyan Li and Yongdong Wu}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {Trust on Web Browser: Attack vs. Defense}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {241--253}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_19}, doi = {10.1007/978-3-540-45203-4\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/LiZY03, author = {Tieyan Li and Zhi{-}Gang Zhao and Si{-}Zhen Yo}, title = {A-peer: An Agent Platform Integrating Peer-to-Peer Network}, booktitle = {3rd {IEEE} International Symposium on Cluster Computing and the Grid (CCGrid 2003), 12-15 May 2003, Tokyo, Japan}, pages = {614--617}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CCGRID.2003.1199422}, doi = {10.1109/CCGRID.2003.1199422}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/LiZY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangCL03, author = {Yan Wang and Chi{-}Hung Chi and Tieyan Li}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {22--33}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_3}, doi = {10.1007/978-3-540-39927-8\_3}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/WangCL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiZL03, author = {Tieyan Li and Huafei Zhu and Kwok{-}Yan Lam}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {A Novel Two-Level Trust Model for Grid}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {214--225}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_20}, doi = {10.1007/978-3-540-39927-8\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiZL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/ChewCL03, author = {Wai{-}Meng Chew and Chi{-}Hung Chi and Tieyan Li}, title = {Efficient Key Assignment Scheme for Mobile Agent Systems}, booktitle = {15th {IEEE} International Conference on Tools with Artificial Intelligence {(ICTAI} 2003), 3-5 November 2003, Sacramento, California, {USA}}, pages = {338--345}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/TAI.2003.1250209}, doi = {10.1109/TAI.2003.1250209}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictai/ChewCL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Li03, author = {Tieyan Li}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Time Constraint Delegation for {P2P} Data Decryption}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {173--186}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_16}, doi = {10.1007/978-3-540-39881-3\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/Li03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/LiL02, author = {Tieyan Li and Kwok{-}Yan Lam}, title = {An optimal location update and searching algorithm for tracking mobile agent}, booktitle = {The First International Joint Conference on Autonomous Agents {\&} Multiagent Systems, {AAMAS} 2002, July 15-19, 2002, Bologna, Italy, Proceedings}, pages = {639--646}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/544862.544892}, doi = {10.1145/544862.544892}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/LiL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/LiL02a, author = {Tieyan Li and Kwok{-}Yan Lam}, title = {Detecting anomalous agents in mobile agent system: a preliminary approach}, booktitle = {The First International Joint Conference on Autonomous Agents {\&} Multiagent Systems, {AAMAS} 2002, July 15-19, 2002, Bologna, Italy, Proceedings}, pages = {655--656}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/544862.544894}, doi = {10.1145/544862.544894}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/LiL02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/LiCL02, author = {Tieyan Li and Wai{-}Meng Chew and Kwok{-}Yan Lam}, title = {Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture}, booktitle = {16th International Parallel and Distributed Processing Symposium {(IPDPS} 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/IPDPS.2002.1016626}, doi = {10.1109/IPDPS.2002.1016626}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/LiCL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/LiL01, author = {Tieyan Li and Kwok{-}Yan Lam}, title = {A Secure Group Solution for Multi-Agent {EC} System}, booktitle = {Proceedings of the 15th International Parallel {\&} Distributed Processing Symposium (IPDPS-01), San Francisco, CA, USA, April 23-27, 2001}, pages = {169}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/IPDPS.2001.925163}, doi = {10.1109/IPDPS.2001.925163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/LiL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prima/LiSL00, author = {Tieyan Li and Chuk{-}Yang Seng and Kwok{-}Yan Lam}, editor = {Chengqi Zhang and Von{-}Wun Soo}, title = {A Secure Route Structure for Information Gathering Agent}, booktitle = {Design and Applications of Intelligent Agents, Third Pacific Rim International Workshop on Multi-Agents, {PRIMA} 2000, Melbourne, Australia, August 28-29, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1881}, pages = {101--114}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44594-3\_8}, doi = {10.1007/3-540-44594-3\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/prima/LiSL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8-1/FangLRS98, author = {Meiqi Fang and Tieyan Li and Jinghai Rao and Xiaomeng Su}, editor = {Colette Rolland and Yu Chen and Meiqi Fang}, title = {A collaborative educational {IS} based on {WWW}}, booktitle = {Information Systems in the {WWW} Environment, {IFIP} {TC8/WG8.1} Working Conference on Information Systems in the {WWW} Environment, 15-17 July 1998, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {115}, pages = {277--297}, publisher = {Chapman {\&} Hall}, year = {1998}, timestamp = {Fri, 08 Apr 2005 09:03:25 +0200}, biburl = {https://dblp.org/rec/conf/ifip8-1/FangLRS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.