Tieyan Li

Orcid: 0000-0003-4688-2697

According to our database1, Tieyan Li authored at least 82 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Can Routing Be Effectively Learned in Integrated Heterogeneous Networks?
IEEE Netw., January, 2024

DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks.
IEEE Trans. Dependable Secur. Comput., 2024

Toward an Open Trust Establishment Infrastructure for Future Network: Motivations, Models, and Technologies.
IEEE Access, 2024

2023
Towards Trustworthy Digital Media In The Aigc Era: An Introduction To The Upcoming IsoJpegTrust Standard.
IEEE Commun. Stand. Mag., December, 2023

XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets.
IEEE Internet Things J., April, 2023

SIX-Trust for 6G: Toward a Secure and Trustworthy Future Network.
IEEE Access, 2023

An Overview of Trust Standards for Communication Networks and Future Digital World.
IEEE Access, 2023

CustTest: An Effective Testbed for Testing Customized Routing in Integrated Heterogeneous Networks.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
IEEE Netw., 2022

Guest Editorial: Trust, Security and Privacy of 6G.
IEEE Netw., 2022

SIX-Trust for 6G: Towards a Secure and Trustworthy 6G Network.
CoRR, 2022

Towards Trustworthy DeFi Oracles: Past, Present and Future.
CoRR, 2022

A Survey on Trust Models in Heterogeneous Networks.
IEEE Commun. Surv. Tutorials, 2022

Toward Trustworthy DeFi Oracles: Past, Present, and Future.
IEEE Access, 2022

Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
On the Trust and Trust Modelling for the Future Fully-Connected Digital World: A Comprehensive Study.
CoRR, 2021

On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study.
IEEE Access, 2021

2016
Authenticated CAN Communications Using Standardized Cryptographic Techniques.
Proceedings of the Information Security Practice and Experience, 2016

2015
Automatic Accident Detection and Alarm System.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

2014
PreCrime to the rescue: defeating mobile malware one-step ahead.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

Building trusted path on untrusted device drivers for mobile devices.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

2012
Data synchronization with conflict resolution for RFID-based track and trace.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

2011
Analyzing a Family of Key Protection Schemes against Modification Attacks.
IEEE Trans. Dependable Secur. Comput., 2011

Secure and Practical Key Distribution for RFID-Enabled Supply Chains.
Proceedings of the Security and Privacy in Communication Networks, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Achieving high security and efficiency in RFID-tagged supply chains.
Int. J. Appl. Cryptogr., 2010

Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard.
IEICE Trans. Inf. Syst., 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Comput. Networks, 2010

Time cost evaluation for executing RFID authentication protocols.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Comput. Commun., 2009

Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
Proceedings of the Information Security Practice and Experience, 2009

On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Insights into Malware Detection and Prevention on Mobile Phones.
Proceedings of the Security Technology, 2009

A Solution for Integrated Track and Trace in Supply Chain based on RFID & GPS.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
The security and improvement of an ultra-lightweight RFID authentication protocol.
Secur. Commun. Networks, 2008

A cross-layer framework for privacy enhancement in RFID systems.
Pervasive Mob. Comput., 2008

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
J. Softw., 2008

Flexible Privacy Protection for RFID Tags via Selective Identifier Masking.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Employing Lightweight Primitives on Low-Cost RFID Tags for Authentication.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Secure RFID Identification and Authentication with Triggered Hash Chain Variants.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

A Security and Performance Evaluation of Hash-Based RFID Protocols.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Adaptive Stream Authentication for Wireless Multimedia Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.
Proceedings of the New Approaches for Security, 2007

Resilient Aggregation Scheme for Confidential Sensor Reports.
Proceedings of IEEE International Conference on Communications, 2007

Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme.
Proceedings of the Global Communications Conference, 2007

Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Video stream authentication in lossy networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

More on Shared-Scalar-Product Protocols.
Proceedings of the Information Security Practice and Experience, 2006

Preventing Web-Spoofing with Automatic Detecting Security Indicator.
Proceedings of the Information Security Practice and Experience, 2006

2005
Sequential aggregate signatures for wireless routing protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Protecting Group Dynamic Information in Large Scale Multicast Groups.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Provably secure anonymous identification protocols for ad-hoc access structures.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2005

2004
Highly reliable trust establishment scheme in ad hoc networks.
Comput. Networks, 2004

LITESET/A++: A New Agent-Assisted Secure Payment Protocol.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Dynamic Access Control for Multi-privileged Group Communications.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Trust Establishment in Large Scale Grid Settings.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Time Constraint Delegation for P2P Data Decryption.
Proceedings of the Security in Pervasive Computing, 2003

Efficient Key Assignment Scheme for Mobile Agent Systems.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A Novel Two-Level Trust Model for Grid.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A-peer: An Agent Platform Integrating Peer-to-Peer Network.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

Trust on Web Browser: Attack vs. Defense.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Detecting anomalous agents in mobile agent system: a preliminary approach.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

An optimal location update and searching algorithm for tracking mobile agent.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
A Secure Group Solution for Multi-Agent EC System.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

2000
A Secure Route Structure for Information Gathering Agent.
Proceedings of the Design and Applications of Intelligent Agents, 2000

1998
A collaborative educational IS based on WWW.
Proceedings of the Information Systems in the WWW Environment, 1998


  Loading...