80 results on '"Tieyan Li"'
Search Results
2. Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach.
3. Authenticated CAN Communications Using Standardized Cryptographic Techniques.
4. Automatic Accident Detection and Alarm System.
5. Building trusted path on untrusted device drivers for mobile devices.
6. PreCrime to the rescue: defeating mobile malware one-step ahead.
7. Data synchronization with conflict resolution for RFID-based track and trace.
8. Secure and Practical Key Distribution for RFID-Enabled Supply Chains.
9. A software-based root-of-trust primitive on multicore platforms.
10. Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
11. Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains.
12. A Solution for Integrated Track and Trace in Supply Chain based on RFID & GPS.
13. Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
14. Insights into Malware Detection and Prevention on Mobile Phones.
15. On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
16. Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
17. RFID privacy: relation between two notions, minimal condition, and efficient construction.
18. Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
19. Attacks and improvements to an RIFD mutual authentication protocol and its extensions.
20. Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework.
21. Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme.
22. A Security and Performance Evaluation of Hash-Based RFID Protocols.
23. Secure RFID Identification and Authentication with Triggered Hash Chain Variants.
24. Employing Lightweight Primitives on Low-Cost RFID Tags for Authentication.
25. Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems.
26. Flexible Privacy Protection for RFID Tags via Selective Identifier Masking.
27. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.
28. Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme.
29. Resilient Aggregation Scheme for Confidential Sensor Reports.
30. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol.
31. Adaptive Stream Authentication for Wireless Multimedia Communications.
32. Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications.
33. Preventing Web-Spoofing with Automatic Detecting Security Indicator.
34. More on Shared-Scalar-Product Protocols.
35. An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks.
36. Video stream authentication in lossy networks.
37. Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
38. Provably secure anonymous identification protocols for ad-hoc access structures.
39. Protecting Group Dynamic Information in Large Scale Multicast Groups.
40. Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
41. Sequential aggregate signatures for wireless routing protocols.
42. LITESET/A++: A New Agent-Assisted Secure Payment Protocol.
43. Trust Establishment in Large Scale Grid Settings.
44. Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
45. Dynamic Access Control for Multi-privileged Group Communications.
46. Trust on Web Browser: Attack vs. Defense.
47. A-peer: An Agent Platform Integrating Peer-to-Peer Network.
48. Efficient Key Assignment Scheme for Mobile Agent Systems.
49. Time Constraint Delegation for P2P Data Decryption.
50. A Novel Two-Level Trust Model for Grid.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.