Tieyan Li

According to our database1, Tieyan Li authored at least 64 papers between 1998 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Authenticated CAN Communications Using Standardized Cryptographic Techniques.
Proceedings of the Information Security Practice and Experience, 2016

2015
Automatic Accident Detection and Alarm System.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

2014
PreCrime to the rescue: defeating mobile malware one-step ahead.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

Building trusted path on untrusted device drivers for mobile devices.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

2012
Data synchronization with conflict resolution for RFID-based track and trace.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

2011
Analyzing a Family of Key Protection Schemes against Modification Attacks.
IEEE Trans. Dependable Sec. Comput., 2011

Secure and Practical Key Distribution for RFID-Enabled Supply Chains.
Proceedings of the Security and Privacy in Communication Networks, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Achieving high security and efficiency in RFID-tagged supply chains.
IJACT, 2010

Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard.
IEICE Transactions, 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Computer Networks, 2010

Time cost evaluation for executing RFID authentication protocols.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Computer Communications, 2009

Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
Proceedings of the Information Security Practice and Experience, 2009

On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Insights into Malware Detection and Prevention on Mobile Phones.
Proceedings of the Security Technology, 2009

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
The security and improvement of an ultra-lightweight RFID authentication protocol.
Security and Communication Networks, 2008

A cross-layer framework for privacy enhancement in RFID systems.
Pervasive and Mobile Computing, 2008

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
JSW, 2008

Flexible Privacy Protection for RFID Tags via Selective Identifier Masking.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Employing Lightweight Primitives on Low-Cost RFID Tags for Authentication.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Secure RFID Identification and Authentication with Triggered Hash Chain Variants.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

A Security and Performance Evaluation of Hash-Based RFID Protocols.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Adaptive Stream Authentication for Wireless Multimedia Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.
Proceedings of the New Approaches for Security, 2007

Resilient Aggregation Scheme for Confidential Sensor Reports.
Proceedings of IEEE International Conference on Communications, 2007

Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme.
Proceedings of the Global Communications Conference, 2007

Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Video stream authentication in lossy networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

More on Shared-Scalar-Product Protocols.
Proceedings of the Information Security Practice and Experience, 2006

Preventing Web-Spoofing with Automatic Detecting Security Indicator.
Proceedings of the Information Security Practice and Experience, 2006

2005
Sequential aggregate signatures for wireless routing protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Protecting Group Dynamic Information in Large Scale Multicast Groups.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Provably secure anonymous identification protocols for ad-hoc access structures.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2005

2004
Highly reliable trust establishment scheme in ad hoc networks.
Computer Networks, 2004

LITESET/A++: A New Agent-Assisted Secure Payment Protocol.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Dynamic Access Control for Multi-privileged Group Communications.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Trust Establishment in Large Scale Grid Settings.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Time Constraint Delegation for P2P Data Decryption.
Proceedings of the Security in Pervasive Computing, 2003

Efficient Key Assignment Scheme for Mobile Agent Systems.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A Novel Two-Level Trust Model for Grid.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A-peer: An Agent Platform Integrating Peer-to-Peer Network.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

Trust on Web Browser: Attack vs. Defense.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Detecting anomalous agents in mobile agent system: a preliminary approach.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

An optimal location update and searching algorithm for tracking mobile agent.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
A Secure Group Solution for Multi-Agent EC System.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

2000
A Secure Route Structure for Information Gathering Agent.
Proceedings of the Design and Applications of Intelligent Agents, 2000

1998
A collaborative educational IS based on WWW.
Proceedings of the Information Systems in the WWW Environment, 1998


  Loading...