Nan Li

Orcid: 0000-0002-9351-2800

Affiliations:
  • University of Newcastle, School of Electrical Engineering and Computing, Marsfield, NSW, Australia
  • CSIRO, DATA61, Marsfield, NSW, Australia (former)
  • University of Wollongong, School of Computing and Information Technology, Australia (former)


According to our database1, Nan Li authored at least 30 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
OLBS: Oblivious Location-Based Services.
IEEE Trans. Inf. Forensics Secur., 2024

Diverging assessments: What, Why, and Experiences.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
Targeted Context-Based Attacks on Trust Management Systems in IoT.
IEEE Internet Things J., July, 2023

Visualization and Cybersecurity in the Metaverse: A Survey.
J. Imaging, January, 2023

2022
A Blockchain Based Secure IoT System Using Device Identity Management.
Sensors, 2022

2021
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021

2020
Leakage-resilient biometric-based remote user authentication with fuzzy extractors.
Theor. Comput. Sci., 2020

A new framework for privacy-preserving biometric-based remote user authentication.
J. Comput. Secur., 2020

A New Construction for Linkable Secret Handshake.
Comput. J., 2020

A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability.
Proceedings of the Second IEEE International Conference on Trust, 2020

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019

Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Context-Aware Trust Management System for IoT Applications with Multiple Domains.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks.
IEEE Access, 2018

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

2017
Lightweight Mutual Authentication for IoT and Its Applications.
IEEE Trans. Sustain. Comput., 2017

Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptol. ePrint Arch., 2017

Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2015
Vulnerabilities of an ECC-based RFID authentication scheme.
Secur. Commun. Networks, 2015

Shared RFID ownership transfer protocols.
Comput. Stand. Interfaces, 2015

Anonymous Yoking-Group Proofs.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

2013
On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013

Secure RFID Ownership Transfer Protocols.
Proceedings of the Information Security Practice and Experience, 2013

2011
Efficient Self-certified Signatures with Batch Verification.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Self-certified ring signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011


  Loading...