dblp.uni-trier.dewww.uni-trier.de

Tieyan Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
38EEShaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng: Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383
37EEShaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58
2008
36EETong-Lee Lim, Tieyan Li, Tao Gu: Secure RFID Identification and Authentication with Triggered Hash Chain Variants. ICPADS 2008: 583-590
35EETong-Lee Lim, Tieyan Li, Yingjiu Li: A Security and Performance Evaluation of Hash-Based RFID Protocols. Inscrypt 2008: 406-424
34EETong-Lee Lim, Tieyan Li, Sze-Ling Yeo: Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems. PerCom 2008: 40-49
33EETieyan Li: Employing Lightweight Primitives on Low-Cost RFID Tags for Authentication. VTC Fall 2008: 1-5
32EETong-Lee Lim, Tieyan Li: Flexible Privacy Protection for RFID Tags via Selective Identifier Masking. WCNC 2008: 1570-1575
31EETieyan Li, Guilin Wang, Robert H. Deng: Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. JSW 3(3): 1-10 (2008)
30EETong-Lee Lim, Tieyan Li, Sze-Ling Yeo: A cross-layer framework for privacy enhancement in RFID systems. Pervasive and Mobile Computing 4(6): 889-905 (2008)
29EETieyan Li, Robert H. Deng, Guilin Wang: The security and improvement of an ultra-lightweight RFID authentication protocol. Security and Communication Networks 1(2): 135-146 (2008)
2007
28EETieyan Li, Robert H. Deng: Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. ARES 2007: 238-245
27EETong-Lee Lim, Tieyan Li: Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme. GLOBECOM 2007: 59-63
26EETieyan Li, Yongdong Wu: Resilient Aggregation Scheme for Confidential Sensor Reports. ICC 2007: 1472-1477
25EETieyan Li, Guilin Wang: Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. SEC 2007: 109-120
2006
24EEFang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu: Preventing Web-Spoofing with Automatic Detecting Security Indicator. ISPEC 2006: 112-122
23EEHuafei Zhu, Feng Bao, Tieyan Li, Ying Qiu: More on Shared-Scalar-Product Protocols. ISPEC 2006: 142-152
22EEHuafei Zhu, Tieyan Li, Feng Bao: Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. SEC 2006: 340-350
21EETieyan Li, Yongdong Wu, Huafei Zhu: An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. VTC Spring 2006: 831-835
2005
20EEHuafei Zhu, Feng Bao, Tieyan Li: Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. Communications and Multimedia Security 2005: 200-209
19EETieyan Li, Huafei Zhu, Yongdong Wu: Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. ICICS 2005: 389-401
18 Yongdong Wu, Tieyan Li, Robert H. Deng: Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476
2004
17EEYan Wang, Tieyan Li: LITESET/A++: A New Agent-Assisted Secure Payment Protocol. CEC 2004: 244-251
16EEBo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324
15EEDi Ma, Robert H. Deng, Yongdong Wu, Tieyan Li: Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519
14EETieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91
13EEKui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim: Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45(6): 687-699 (2004)
2003
12EETieyan Li, Yongdong Wu: Trust on Web Browser: Attack vs. Defense. ACNS 2003: 241-253
11EETieyan Li, Zhi-Gang Zhao, Si-Zhen Yo: A-peer: An Agent Platform Integrating Peer-to-Peer Network. CCGRID 2003: 614-617
10EETieyan Li, Huafei Zhu, Kwok-Yan Lam: A Novel Two-Level Trust Model for Grid. ICICS 2003: 214-225
9EEYan Wang, Chi-Hung Chi, Tieyan Li: Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents. ICICS 2003: 22-33
8EEWai-Meng Chew, Chi-Hung Chi, Tieyan Li: Efficient Key Assignment Scheme for Mobile Agent Systems. ICTAI 2003: 338-345
7EETieyan Li: Time Constraint Delegation for P2P Data Decryption. SPC 2003: 173-186
2002
6EETieyan Li, Kwok-Yan Lam: An optimal location update and searching algorithm for tracking mobile agent. AAMAS 2002: 639-646
5EETieyan Li, Kwok-Yan Lam: Detecting anomalous agents in mobile agent system: a preliminary approach. AAMAS 2002: 655-656
4EETieyan Li, Wai-Meng Chew, Kwok-Yan Lam: Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. IPDPS 2002
2001
3 Tieyan Li, Kwok-Yan Lam: A Secure Group Solution for Multi-Agent EC System. IPDPS 2001: 169
2000
2EETieyan Li, Chuk-Yang Seng, Kwok-Yan Lam: A Secure Route Structure for Information Gathering Agent. PRIMA 2000: 101-114
1998
1 Meiqi Fang, Tieyan Li, Jinghai Rao, Xiaomeng Su: A collaborative educational IS based on WWW. Information Systems in the WWW Environment 1998: 277-297

Coauthor Index

1Feng Bao [13] [16] [20] [22] [23] [24]
2Shaoying Cai [37] [38]
3Wai-Meng Chew [4] [8]
4Chi-Hung Chi [8] [9]
5Robert H. Deng (Robert Huijie Deng) [13] [14] [15] [16] [18] [28] [29] [31] [37] [38]
6Meiqi Fang [1]
7Tao Gu [36]
8Weijia Jia [24]
9Mohan S. Kankanhalli [16]
10Kwangjo Kim [13]
11Kwok-Yan Lam [2] [3] [4] [5] [6] [10]
12Yingjiu Li [35] [37] [38]
13Tong-Lee Lim [27] [30] [32] [34] [35] [36]
14Di Ma [14] [15]
15Fang Qi [24]
16Ying Qiu [23]
17Jinghai Rao [1]
18Kui Ren [13]
19Chuk-Yang Seng [2]
20Xiaomeng Su [1]
21Zhiguo Wan [13]
22Guilin Wang [25] [29] [31]
23Yan Wang [9] [17]
24Yongdong Wu [12] [14] [15] [18] [19] [21] [24] [26]
25Sze-Ling Yeo [30] [34]
26Si-Zhen Yo [11]
27Zhi-Gang Zhao [11]
28Bo Zhu [16]
29Huafei Zhu [10] [14] [16] [19] [20] [21] [22] [23]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)