Tieyan Li
Orcid: 0000-0003-4688-2697
According to our database1,
Tieyan Li
authored at least 82 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Netw., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Toward an Open Trust Establishment Infrastructure for Future Network: Motivations, Models, and Technologies.
IEEE Access, 2024
2023
Towards Trustworthy Digital Media In The Aigc Era: An Introduction To The Upcoming IsoJpegTrust Standard.
IEEE Commun. Stand. Mag., December, 2023
XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets.
IEEE Internet Things J., April, 2023
IEEE Access, 2023
CustTest: An Effective Testbed for Testing Customized Routing in Integrated Heterogeneous Networks.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
2022
IEEE Netw., 2022
IEEE Commun. Surv. Tutorials, 2022
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach.
Proceedings of the Network and System Security - 16th International Conference, 2022
2021
On the Trust and Trust Modelling for the Future Fully-Connected Digital World: A Comprehensive Study.
CoRR, 2021
On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study.
IEEE Access, 2021
2016
Proceedings of the Information Security Practice and Experience, 2016
2015
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015
2014
Proceedings of the Asia-Pacific Workshop on Systems, 2014
Proceedings of the Asia-Pacific Workshop on Systems, 2014
2012
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Int. J. Appl. Cryptogr., 2010
IEICE Trans. Inf. Syst., 2010
Comput. Networks, 2010
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Comput. Commun., 2009
Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Information Security Practice and Experience, 2009
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Security Technology, 2009
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Secur. Commun. Networks, 2008
Pervasive Mob. Comput., 2008
J. Softw., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme.
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of IEEE International Conference on Communications, 2007
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme.
Proceedings of the Global Communications Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information Security Practice and Experience, 2006
2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Protecting Group Dynamic Information in Large Scale Multicast Groups.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2005
2004
Comput. Networks, 2004
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Grid and Cooperative Computing, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
2000
Proceedings of the Design and Applications of Intelligent Agents, 2000
1998
A collaborative educational IS based on WWW.
Proceedings of the Information Systems in the WWW Environment, 1998