Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach

    Flash loan has become one of the most creative tools in DeFi industry. The explosive development of flash loan is due to its circumvention to borrower default risk and platform liquidity risk. But it also grea...

    Yining **e, **n Kang, Tieyan Li, Cheng-Kang Chu in Network and System Security (2022)

  2. Article

    Open Access

    Hybrid repair of aberrant right subclavian artery with aortic dissection caused by Kommerell diverticulum

    Aberrant right subclavian artery (ARSA) with associated Kommerell diverticulum (KD) is a rare congenital aortic disease. KD patients have a high risk of rupture, dissection, and compression of adjacent structu...

    Tieyan Li, Lin Zou, Yunzhen Feng, Guoliang Fan in BMC Cardiovascular Disorders (2021)

  3. No Access

    Chapter and Conference Paper

    Authenticated CAN Communications Using Standardized Cryptographic Techniques

    In the near future, connected vehicles are expected to offer the commuters even more convenience and self-autonomy, but at the same time be exposed to much more attacks. A particularly insidious threat to vehi...

    Zhuo Wei, Yanjiang Yang, Tieyan Li in Information Security Practice and Experience (2016)

  4. No Access

    Chapter and Conference Paper

    Circulation System Modelling with National Implantable Ventricular Assist Device (NIVAD): Hydrodynamic Characters, Hemolysis Test in Vitro and Animal Experiments

    This study is to detect the flow field characters of NIVAD and the hemolysis test in vitro and to evaluate the hemodynamic performance and the influence on calves. The flow field characters of NIVAD were calcu...

    Tieyan Li, Liang Ye, Rong Lu, Huimin Fan in Life System Modeling and Simulation (2014)

  5. No Access

    Chapter and Conference Paper

    Secure and Practical Key Distribution for RFID-Enabled Supply Chains

    In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure key distribution problem on a peer-to-peer base. In our model, we focus on any pair of consecutive parties along...

    Tieyan Li, Yingjiu Li, Guilin Wang in Security and Privacy in Communication Networks (2012)

  6. No Access

    Chapter and Conference Paper

    Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol

    In 2010, Yeh, Lo and Winata [1] proposed a process-oriented ultralightweight RFID authentication protocol. This protocol is claimed to provide strong security and robust privacy protection, while at the same t...

    Pedro Peris-Lopez, Julio Cesar Hernandez-Castro in Information Security and Cryptology (2011)

  7. No Access

    Chapter and Conference Paper

    Weaknesses in Two Recent Lightweight RFID Authentication Protocols

    The design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many algorithms have been published lately. In this paper, we analyze two recent prop...

    Pedro Peris-Lopez, Julio C. Hernandez-Castro in Information Security and Cryptology (2010)

  8. No Access

    Chapter and Conference Paper

    Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains

    “Symmetric secret”-based RFID systems are widely adopted in supply chains. In such RFID systems, a reader’s ability to identify a RFID tag relies on the possession of the tag’s secret which is usually only kno...

    Shaoying Cai, Chunhua Su, Yingjiu Li, Robert Deng in Information Systems Security (2010)

  9. No Access

    Chapter and Conference Paper

    Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems

    While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important re...

    Shaoying Cai, Tieyan Li, Yingjiu Li in Information Security Practice and Experien… (2009)

  10. No Access

    Chapter and Conference Paper

    Insights into Malware Detection and Prevention on Mobile Phones

    The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable I...

    Qiang Yan, Yingjiu Li, Tieyan Li, Robert Deng in Security Technology (2009)

  11. No Access

    Chapter and Conference Paper

    A Security and Performance Evaluation of Hash-Based RFID Protocols

    In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the lev...

    Tong-Lee Lim, Tieyan Li, Yingjiu Li in Information Security and Cryptology (2009)

  12. No Access

    Chapter and Conference Paper

    On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup

    In ASIACCS’08, Burmester, Medeiros and Motta proposed an anonymous RFID authentication protocol (BMM protocol [2]) that preserves the security and privacy properties, and achieves better scalability compared w...

    Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert Deng in Information Systems Security (2009)

  13. Chapter and Conference Paper

    Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains

    In USENIX Security 08, Juels, Pappu and Parno proposed a secret sharing based mechanism to alleviate the key distribution problem in RFID-enabled supply chains. Compared to existing pseudonym based RFID protoc...

    Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li in Information and Communications Security (2009)

  14. No Access

    Chapter

    RFID Anticounterfeiting: An Architectural Perspective

    Counterfeit goods have always been an enormous threat to the world economy, but they could potentially be combatted by employing an emerging technology – Radio Frequency IDentification (RFID) — in the near fut...

    Tieyan Li, Tong-Lee Lim in RFID Security (2008)

  15. No Access

    Chapter and Conference Paper

    More on Shared-Scalar-Product Protocols

    Secure scalar product protocols provide fundamental security components for distributed data mining with privacy concerns. This paper makes two contributions in the shared-scalar-product protocols. In the firs...

    Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu in Information Security Practice and Experience (2006)

  16. Chapter and Conference Paper

    Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications

    Privacy-preserving clustering algorithms group similar databases populated at distributed locations to improve data qualities and enable accurate data analysis and thus provide fundamental security components ...

    Huafei Zhu, Tieyan Li, Feng Bao in Security and Privacy in Dynamic Environments (2006)

  17. No Access

    Chapter and Conference Paper

    Preventing Web-Spoofing with Automatic Detecting Security Indicator

    The anti-spoofing community has been intensively proposing new methods for defending against new spoofing techniques. It is still challenging for protecting naïve users from advanced spoofing attacks. In this ...

    Fang Qi, Feng Bao, Tieyan Li, Weijia Jia in Information Security Practice and Experien… (2006)

  18. Chapter and Conference Paper

    Protecting Group Dynamic Information in Large Scale Multicast Groups

    Existing key management schemes can secure group communication efficiently, but are failed on protecting the Group Dynamic Information (GDI) that may undermine group privacy. Recently, Sun et al.

    Yongdong Wu, Tieyan Li, Robert H. Deng in Security and Privacy in the Age of Ubiquit… (2005)

  19. Chapter and Conference Paper

    Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks

    In this paper, a refined sequential aggregate signature scheme from RSA that works for any modulus is presented, then a compact stimulation mechanism without a central, trusted authority for routing discovery ...

    Huafei Zhu, Feng Bao, Tieyan Li in Communications and Multimedia Security (2005)

  20. No Access

    Chapter and Conference Paper

    Improving Sensor Network Security with Information Quality

    With extremely limited resources, it is hard to protect sensor networks well with conventional security mechanisms. We study a class of passive fingerprinting techniques and propose an innovative information qual...

    Qiang Qiu, Tieyan Li, Jit Biswas in Security and Privacy in Ad-hoc and Sensor Networks (2005)

previous disabled Page of 2