2009 |
38 | EE | Shaoying Cai,
Tieyan Li,
Yingjiu Li,
Robert H. Deng:
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
ISPEC 2009: 372-383 |
37 | EE | Shaoying Cai,
Yingjiu Li,
Tieyan Li,
Robert H. Deng:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
WISEC 2009: 51-58 |
2008 |
36 | EE | Tong-Lee Lim,
Tieyan Li,
Tao Gu:
Secure RFID Identification and Authentication with Triggered Hash Chain Variants.
ICPADS 2008: 583-590 |
35 | EE | Tong-Lee Lim,
Tieyan Li,
Yingjiu Li:
A Security and Performance Evaluation of Hash-Based RFID Protocols.
Inscrypt 2008: 406-424 |
34 | EE | Tong-Lee Lim,
Tieyan Li,
Sze-Ling Yeo:
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems.
PerCom 2008: 40-49 |
33 | EE | Tieyan Li:
Employing Lightweight Primitives on Low-Cost RFID Tags for Authentication.
VTC Fall 2008: 1-5 |
32 | EE | Tong-Lee Lim,
Tieyan Li:
Flexible Privacy Protection for RFID Tags via Selective Identifier Masking.
WCNC 2008: 1570-1575 |
31 | EE | Tieyan Li,
Guilin Wang,
Robert H. Deng:
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
JSW 3(3): 1-10 (2008) |
30 | EE | Tong-Lee Lim,
Tieyan Li,
Sze-Ling Yeo:
A cross-layer framework for privacy enhancement in RFID systems.
Pervasive and Mobile Computing 4(6): 889-905 (2008) |
29 | EE | Tieyan Li,
Robert H. Deng,
Guilin Wang:
The security and improvement of an ultra-lightweight RFID authentication protocol.
Security and Communication Networks 1(2): 135-146 (2008) |
2007 |
28 | EE | Tieyan Li,
Robert H. Deng:
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol.
ARES 2007: 238-245 |
27 | EE | Tong-Lee Lim,
Tieyan Li:
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme.
GLOBECOM 2007: 59-63 |
26 | EE | Tieyan Li,
Yongdong Wu:
Resilient Aggregation Scheme for Confidential Sensor Reports.
ICC 2007: 1472-1477 |
25 | EE | Tieyan Li,
Guilin Wang:
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.
SEC 2007: 109-120 |
2006 |
24 | EE | Fang Qi,
Feng Bao,
Tieyan Li,
Weijia Jia,
Yongdong Wu:
Preventing Web-Spoofing with Automatic Detecting Security Indicator.
ISPEC 2006: 112-122 |
23 | EE | Huafei Zhu,
Feng Bao,
Tieyan Li,
Ying Qiu:
More on Shared-Scalar-Product Protocols.
ISPEC 2006: 142-152 |
22 | EE | Huafei Zhu,
Tieyan Li,
Feng Bao:
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications.
SEC 2006: 340-350 |
21 | EE | Tieyan Li,
Yongdong Wu,
Huafei Zhu:
An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks.
VTC Spring 2006: 831-835 |
2005 |
20 | EE | Huafei Zhu,
Feng Bao,
Tieyan Li:
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
Communications and Multimedia Security 2005: 200-209 |
19 | EE | Tieyan Li,
Huafei Zhu,
Yongdong Wu:
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
ICICS 2005: 389-401 |
18 | | Yongdong Wu,
Tieyan Li,
Robert H. Deng:
Protecting Group Dynamic Information in Large Scale Multicast Groups.
SEC 2005: 459-476 |
2004 |
17 | EE | Yan Wang,
Tieyan Li:
LITESET/A++: A New Agent-Assisted Secure Payment Protocol.
CEC 2004: 244-251 |
16 | EE | Bo Zhu,
Tieyan Li,
Huafei Zhu,
Mohan S. Kankanhalli,
Feng Bao,
Robert H. Deng:
Trust Establishment in Large Scale Grid Settings.
GCC 2004: 317-324 |
15 | EE | Di Ma,
Robert H. Deng,
Yongdong Wu,
Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications.
ICICS 2004: 508-519 |
14 | EE | Tieyan Li,
Yongdong Wu,
Di Ma,
Huafei Zhu,
Robert H. Deng:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
ICICS 2004: 79-91 |
13 | EE | Kui Ren,
Tieyan Li,
Zhiguo Wan,
Feng Bao,
Robert H. Deng,
Kwangjo Kim:
Highly reliable trust establishment scheme in ad hoc networks.
Computer Networks 45(6): 687-699 (2004) |
2003 |
12 | EE | Tieyan Li,
Yongdong Wu:
Trust on Web Browser: Attack vs. Defense.
ACNS 2003: 241-253 |
11 | EE | Tieyan Li,
Zhi-Gang Zhao,
Si-Zhen Yo:
A-peer: An Agent Platform Integrating Peer-to-Peer Network.
CCGRID 2003: 614-617 |
10 | EE | Tieyan Li,
Huafei Zhu,
Kwok-Yan Lam:
A Novel Two-Level Trust Model for Grid.
ICICS 2003: 214-225 |
9 | EE | Yan Wang,
Chi-Hung Chi,
Tieyan Li:
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.
ICICS 2003: 22-33 |
8 | EE | Wai-Meng Chew,
Chi-Hung Chi,
Tieyan Li:
Efficient Key Assignment Scheme for Mobile Agent Systems.
ICTAI 2003: 338-345 |
7 | EE | Tieyan Li:
Time Constraint Delegation for P2P Data Decryption.
SPC 2003: 173-186 |
2002 |
6 | EE | Tieyan Li,
Kwok-Yan Lam:
An optimal location update and searching algorithm for tracking mobile agent.
AAMAS 2002: 639-646 |
5 | EE | Tieyan Li,
Kwok-Yan Lam:
Detecting anomalous agents in mobile agent system: a preliminary approach.
AAMAS 2002: 655-656 |
4 | EE | Tieyan Li,
Wai-Meng Chew,
Kwok-Yan Lam:
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
IPDPS 2002 |
2001 |
3 | | Tieyan Li,
Kwok-Yan Lam:
A Secure Group Solution for Multi-Agent EC System.
IPDPS 2001: 169 |
2000 |
2 | EE | Tieyan Li,
Chuk-Yang Seng,
Kwok-Yan Lam:
A Secure Route Structure for Information Gathering Agent.
PRIMA 2000: 101-114 |
1998 |
1 | | Meiqi Fang,
Tieyan Li,
Jinghai Rao,
Xiaomeng Su:
A collaborative educational IS based on WWW.
Information Systems in the WWW Environment 1998: 277-297 |