


default search action
Robert H. Deng
- > Home > Persons > Robert H. Deng
Publications
- 2015
- [c162]Zhuo Wei, Swee-Won Lo, Yu Liang, Tieyan Li, Jialie Shen, Robert H. Deng
:
Automatic Accident Detection and Alarm System. ACM Multimedia 2015: 781-784 - 2011
- [c126]Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng
, Tieyan Li:
A software-based root-of-trust primitive on multicore platforms. AsiaCCS 2011: 334-343 - 2010
- [j63]Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng
, Haixia Yao:
Achieving high security and efficiency in RFID-tagged supply chains. Int. J. Appl. Cryptogr. 2(1): 3-12 (2010) - [c113]Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng
, Tieyan Li:
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. ICISS 2010: 246-260 - [c112]Kevin Chiew, Yingjiu Li, Tieyan Li, Robert H. Deng
, Manfred Aigner:
Time cost evaluation for executing RFID authentication protocols. IOT 2010 - 2009
- [c110]Changshe Ma, Yingjiu Li, Robert H. Deng
, Tieyan Li:
RFID privacy: relation between two notions, minimal condition, and efficient construction. CCS 2009: 54-65 - [c107]Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng
:
Insights into Malware Detection and Prevention on Mobile Phones. FGIT-SecTech 2009: 242-249 - [c105]Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng
:
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. ICICS 2009: 150-164 - [c104]Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng
:
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. ICISS 2009: 71-85 - [c100]Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng
:
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ISPEC 2009: 372-383 - [c95]Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng
:
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. WISEC 2009: 51-58 - 2008
- [j52]Tieyan Li, Guilin Wang, Robert H. Deng:
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols. J. Softw. 3(3): 1-10 (2008) - [j51]Tieyan Li, Robert H. Deng
, Guilin Wang:
The security and improvement of an ultra-lightweight RFID authentication protocol. Secur. Commun. Networks 1(2): 135-146 (2008) - 2007
- [c86]Tieyan Li, Robert H. Deng
:
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. ARES 2007: 238-245 - 2005
- [c57]Yongdong Wu, Tieyan Li, Robert H. Deng:
Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476 - 2004
- [j33]Kui Ren
, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng
, Kwangjo Kim:
Highly reliable trust establishment scheme in ad hoc networks. Comput. Networks 45(6): 687-699 (2004) - [c53]Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli
, Feng Bao, Robert H. Deng
:
Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 - [c52]Tieyan Li, Yongdong Wu, Di Ma
, Huafei Zhu, Robert H. Deng
:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91 - [c51]Di Ma
, Robert H. Deng
, Yongdong Wu, Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-21 01:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
