Search

Your search keyword '"Tieyan Li"' showing total 18 results

Search Constraints

Start Over You searched for: Author "Tieyan Li" Remove constraint Author: "Tieyan Li" Topic cryptography Remove constraint Topic: cryptography
18 results on '"Tieyan Li"'

Search Results

1. Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?

2. Analyzing a Family of Key Protection Schemes against Modification Attacks

3. Time cost evaluation for executing RFID authentication protocols

4. Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard

5. Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard

6. Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework

7. Secure RFID Identification and Authentication with Triggered Hash Chain Variants

8. Employing Lightweight Primitives on Low-Cost RFID Tags for Authentication

9. Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems

10. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol

11. An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks

12. Key encapsulation protocols for grouped low-state devices

13. More on Shared-Scalar-Product Protocols

14. A secure group solution for multi-agent ec system

15. Sequential aggregate signatures for wireless routing protocols

16. Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream

17. LITESET/A++: a new agent-assisted secure payment protocol

18. Classify encrypted data in wireless sensor networks

Catalog

Books, media, physical & digital resources