List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol Information Security and Cryptology | 2011-07-29 | Paper |
| Vulnerability analysis of RFID protocols for tag ownership transfer Computer Networks | 2010-11-25 | Paper |
| Weaknesses in two recent lightweight RFID authentication protocols Information Security and Cryptology | 2010-11-23 | Paper |
| Achieving high security and efficiency in RFID-tagged supply chains International Journal of Applied Cryptography | 2010-09-22 | Paper |
| Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
| Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
| Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| Highly reliable trust establishment scheme in ad hoc networks Computer Networks | 2004-11-12 | Paper |
Research outcomes over time
This page was built for person: Tieyan Li