iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/49/2793-1.rss
dblp: Li Lu https://dblp.org/pid/49/2793-1.html dblp person page RSS feed Wed, 06 Nov 2024 20:31:29 +0100 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Li Luhttps://dblp.org/pid/49/2793-1.html14451 A Lightweight and Chip-Level Reconfigurable Architecture for Next-Generation IoT End Devices.https://doi.org/10.1109/TC.2023.3343094, , , , , , :
A Lightweight and Chip-Level Reconfigurable Architecture for Next-Generation IoT End Devices. IEEE Trans. Computers 73(3): 747-763 ()]]>
https://dblp.org/rec/journals/tc/ZhangLSMLZW24Fri, 01 Mar 2024 00:00:00 +0100
Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter.https://doi.org/10.1109/TDSC.2023.3305607, , , , , :
Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter. IEEE Trans. Dependable Secur. Comput. 21(4): 2434-2447 ()]]>
https://dblp.org/rec/journals/tdsc/LiLLSZL24Mon, 01 Jul 2024 01:00:00 +0200
Frequency Scaling Meets Intermittency: Optimizing Task Rate for RFID-Scale Computing Devices.https://doi.org/10.1109/TMC.2023.3239515, , , , :
Frequency Scaling Meets Intermittency: Optimizing Task Rate for RFID-Scale Computing Devices. IEEE Trans. Mob. Comput. 23(2): 1689-1700 ()]]>
https://dblp.org/rec/journals/tmc/LiLCSL24Thu, 01 Feb 2024 00:00:00 +0100
LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices.https://doi.org/10.1145/3582016.3582050, , , , , , , :
LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices. ASPLOS (3) : 404-418]]>
https://dblp.org/rec/conf/asplos/ZhangLSMCB0Z23Sun, 01 Jan 2023 00:00:00 +0100
Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications.https://doi.org/10.1145/3570361.3613284, , , , , , :
Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications. MobiCom : 69:1-69:16]]>
https://dblp.org/rec/conf/mobicom/LiMBZSL023Sun, 01 Jan 2023 00:00:00 +0100
μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices.https://www.usenix.org/conference/nsdi23/presentation/song-yihang, , , , , , , :
μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices. NSDI : 1751-1766]]>
https://dblp.org/rec/conf/nsdi/Song0WZZYHL23Sun, 01 Jan 2023 00:00:00 +0100
Rethinking Power Efficiency for Next-Generation Processor-Free Sensing Devices.https://doi.org/10.3390/s22083074, , , , :
Rethinking Power Efficiency for Next-Generation Processor-Free Sensing Devices. Sensors 22(8): 3074 ()]]>
https://dblp.org/rec/journals/sensors/SongLZLL22Sat, 01 Jan 2022 00:00:00 +0100
Butterfly: μW Level ULP Sensor Nodes with High Task Throughput.https://doi.org/10.3390/s22083082, , , , , , , :
Butterfly: μW Level ULP Sensor Nodes with High Task Throughput. Sensors 22(8): 3082 ()]]>
https://dblp.org/rec/journals/sensors/ZhangLSMZSZH22Sat, 01 Jan 2022 00:00:00 +0100
BioTouch: Reliable Re-Authentication via Finger Bio-Capacitance and Touching Behavior.https://doi.org/10.3390/s22093583, , , , , :
BioTouch: Reliable Re-Authentication via Finger Bio-Capacitance and Touching Behavior. Sensors 22(9): 3583 ()]]>
https://dblp.org/rec/journals/sensors/ZhangLSMLH22Sat, 01 Jan 2022 00:00:00 +0100
Pedestrian Flow Prediction and Route Recommendation with Business Events.https://doi.org/10.3390/s22197478, , , , , :
Pedestrian Flow Prediction and Route Recommendation with Business Events. Sensors 22(19): 7478 ()]]>
https://dblp.org/rec/journals/sensors/GuSRLJL22Sat, 01 Jan 2022 00:00:00 +0100
ACM: Accuracy-Aware Collaborative Monitoring for Software-Defined Network-Wide Measurement.https://doi.org/10.3390/s22207932, , , , , :
ACM: Accuracy-Aware Collaborative Monitoring for Software-Defined Network-Wide Measurement. Sensors 22(20): 7932 ()]]>
https://dblp.org/rec/journals/sensors/GuSDSWL22Sat, 01 Jan 2022 00:00:00 +0100
Chipnet: Enabling Large-scale Backscatter Network with Processor-free Devices.https://doi.org/10.1145/3544492, , , , , , , , :
Chipnet: Enabling Large-scale Backscatter Network with Processor-free Devices. ACM Trans. Sens. Networks 18(4): 61:1-61:26 ()]]>
https://dblp.org/rec/journals/tosn/SongSLYLZMSW22Tue, 01 Nov 2022 00:00:00 +0100
Realizing Power-efficient Encryption Communication for Computational RFID Tags.https://doi.org/10.1109/CBD58033.2022.00045, , , :
Realizing Power-efficient Encryption Communication for Computational RFID Tags. CBD : 212-218]]>
https://dblp.org/rec/conf/cbd/SongLGZ22Sat, 01 Jan 2022 00:00:00 +0100
Cross-session Specific Emitter Identification using Adversarial Domain Adaptation with Wasserstein distance.https://doi.org/10.1109/ICPR56361.2022.9956207, , , , :
Cross-session Specific Emitter Identification using Adversarial Domain Adaptation with Wasserstein distance. ICPR : 3119-3124]]>
https://dblp.org/rec/conf/icpr/YeWD0Z22Sat, 01 Jan 2022 00:00:00 +0100
Online ECG Emotion Recognition for Unknown Subjects via Hypergraph-Based Transfer Learning.https://doi.org/10.24963/ijcai.2022/509, , , , :
Online ECG Emotion Recognition for Unknown Subjects via Hypergraph-Based Transfer Learning. IJCAI : 3666-3672]]>
https://dblp.org/rec/conf/ijcai/YePM0022Sat, 01 Jan 2022 00:00:00 +0100
Passive DSSS: Empowering the Downlink Communication for Backscatter Systems.https://www.usenix.org/conference/nsdi22/presentation/li-songfan, , , , , , , :
Passive DSSS: Empowering the Downlink Communication for Backscatter Systems. NSDI : 913-928]]>
https://dblp.org/rec/conf/nsdi/LiZZSYC0022Sat, 01 Jan 2022 00:00:00 +0100
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme.https://doi.org/10.1155/2021/6668498, , , :
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme. Secur. Commun. Networks 2021: 6668498:1-6668498:15 ()]]>
https://dblp.org/rec/journals/scn/SongLZL21Fri, 01 Jan 2021 00:00:00 +0100
Online Cross-subject Emotion Recognition from ECG via Unsupervised Domain Adaptation.https://doi.org/10.1109/EMBC46164.2021.9630433, , , , :
Online Cross-subject Emotion Recognition from ECG via Unsupervised Domain Adaptation. EMBC : 1001-1005]]>
https://dblp.org/rec/conf/embc/HeYLPL21Fri, 01 Jan 2021 00:00:00 +0100
I Sense You by Breath: Speaker Recognition via Breath Biometrics.https://doi.org/10.1109/TDSC.2017.2767587, , , :
I Sense You by Breath: Speaker Recognition via Breath Biometrics. IEEE Trans. Dependable Secur. Comput. 17(2): 306-319 ()]]>
https://dblp.org/rec/journals/tdsc/LuLHL20Wed, 01 Jan 2020 00:00:00 +0100
Robust Heart Rate Monitoring for Quasi-Periodic Motions by Wrist-Type PPG Signals.https://doi.org/10.1109/JBHI.2019.2912708, , , , , :
Robust Heart Rate Monitoring for Quasi-Periodic Motions by Wrist-Type PPG Signals. IEEE J. Biomed. Health Informatics 24(3): 636-648 ()]]>
https://dblp.org/rec/journals/titb/HeYLCLW20Wed, 01 Jan 2020 00:00:00 +0100
Internet-of-microchips: direct radio-to-bus communication with SPI backscatter.https://doi.org/10.1145/3372224.3419182, , , , , , :
Internet-of-microchips: direct radio-to-bus communication with SPI backscatter. MobiCom : 25:1-25:14]]>
https://dblp.org/rec/conf/mobicom/LiZSZL0020Wed, 01 Jan 2020 00:00:00 +0100
Edge-empowered accurate urban vehicle localization with cellular-aware trajectories.https://doi.org/10.1007/s42045-018-0005-y, , , , :
Edge-empowered accurate urban vehicle localization with cellular-aware trajectories. CCF Trans. Netw. 2(1): 12-27 ()]]>
https://dblp.org/rec/journals/ccfton/ZhuWCCL19Tue, 01 Jan 2019 00:00:00 +0100
Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices.https://doi.org/10.1109/JIOT.2018.2854374, , , , :
Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices. IEEE Internet Things J. 6(1): 705-717 ()]]>
https://dblp.org/rec/journals/iotj/LiLHYZ19Tue, 01 Jan 2019 00:00:00 +0100
A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System.https://doi.org/10.1109/TCYB.2018.2795041, , , , :
A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System. IEEE Trans. Cybern. 49(3): 1084-1096 ()]]>
https://dblp.org/rec/journals/tcyb/FuQYLL19Tue, 01 Jan 2019 00:00:00 +0100
Bag of meta-words: A novel method to represent document for the sentiment classification.https://doi.org/10.1016/j.eswa.2018.06.052, , , :
Bag of meta-words: A novel method to represent document for the sentiment classification. Expert Syst. Appl. 113: 33-43 ()]]>
https://dblp.org/rec/journals/eswa/FuQHL18Mon, 01 Jan 2018 00:00:00 +0100
Attention based collaborative filtering.https://doi.org/10.1016/j.neucom.2018.05.049, , , :
Attention based collaborative filtering. Neurocomputing 311: 88-98 ()]]>
https://dblp.org/rec/journals/ijon/FuQML18Mon, 01 Jan 2018 00:00:00 +0100
R3: Reliable Over-the-Air Reprogramming on Computational RFIDs.https://doi.org/10.1145/3070720, , , , , :
R3: Reliable Over-the-Air Reprogramming on Computational RFIDs. ACM Trans. Embed. Comput. Syst. 17(1): 9:1-9:25 ()]]>
https://dblp.org/rec/journals/tecs/WuLHLLZ18Mon, 01 Jan 2018 00:00:00 +0100
Online Vehicle Front-Rear Distance Estimation With Urban Context-Aware Trajectories.https://doi.org/10.1109/TVT.2017.2751594, , , , :
Online Vehicle Front-Rear Distance Estimation With Urban Context-Aware Trajectories. IEEE Trans. Veh. Technol. 67(2): 1063-1074 ()]]>
https://dblp.org/rec/journals/tvt/ZhuCZWL18Mon, 01 Jan 2018 00:00:00 +0100
Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise.https://doi.org/10.1109/ICPR.2018.8545685, , , , , , :
Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise. ICPR : 3766-3771]]>
https://dblp.org/rec/conf/icpr/HeYLXLHS18Mon, 01 Jan 2018 00:00:00 +0100
An RFID Based Smartphone Proximity Absence Alert System.https://doi.org/10.1109/TMC.2016.2591524, , :
An RFID Based Smartphone Proximity Absence Alert System. IEEE Trans. Mob. Comput. 16(5): 1246-1257 ()]]>
https://dblp.org/rec/journals/tmc/HussainLG17Sun, 01 Jan 2017 00:00:00 +0100
ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes.https://doi.org/10.1109/TMC.2017.2651820, , , :
ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes. IEEE Trans. Mob. Comput. 16(10): 2901-2912 ()]]>
https://dblp.org/rec/journals/tmc/ZhuHCL17Sun, 01 Jan 2017 00:00:00 +0100
Detecting Clocking Attack in Contactless Access Control Systems.https://doi.org/10.1109/CBD.2017.56, , :
Detecting Clocking Attack in Contactless Access Control Systems. CBD : 285-290]]>
https://dblp.org/rec/conf/cbd/TianLH17Sun, 01 Jan 2017 00:00:00 +0100
Secure and Private RFID-Enabled Third-Party Supply Chain Systems.https://doi.org/10.1109/TC.2016.2538260, , , , :
Secure and Private RFID-Enabled Third-Party Supply Chain Systems. IEEE Trans. Computers 65(11): 3413-3426 ()]]>
https://dblp.org/rec/journals/tc/QiZLLL16Fri, 01 Jan 2016 00:00:00 +0100
PURE: Blind Regression Modeling for Low Quality Data with Participatory Sensing.https://doi.org/10.1109/TPDS.2015.2427805, , , , :
PURE: Blind Regression Modeling for Low Quality Data with Participatory Sensing. IEEE Trans. Parallel Distributed Syst. 27(4): 1199-1211 ()]]>
https://dblp.org/rec/journals/tpds/ChangZZLZ16Fri, 01 Jan 2016 00:00:00 +0100
POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks.https://doi.org/10.1109/TPDS.2015.2467392, , , , , :
POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks. IEEE Trans. Parallel Distributed Syst. 27(6): 1770-1782 ()]]>
https://dblp.org/rec/journals/tpds/QinZZLXL16Fri, 01 Jan 2016 00:00:00 +0100
A FMCW-Based Cross Layer RF Distance Bounding Scheme.https://doi.org/10.1109/TWC.2016.2532858, , :
A FMCW-Based Cross Layer RF Distance Bounding Scheme. IEEE Trans. Wirel. Commun. 15(6): 4009-4016 ()]]>
https://dblp.org/rec/journals/twc/LuHH16Fri, 01 Jan 2016 00:00:00 +0100
RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories.https://doi.org/10.1109/IPDPS.2016.20, , , :
RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories. IPDPS : 123-131]]>
https://dblp.org/rec/conf/ipps/ZhuCLZ16Fri, 01 Jan 2016 00:00:00 +0100
R2: Over-the-air reprogramming on computational RFIDs.https://doi.org/10.1109/RFID.2016.7488004, , , :
R2: Over-the-air reprogramming on computational RFIDs. IEEE RFID : 47-54]]>
https://dblp.org/rec/conf/rfid/WuHLL16Fri, 01 Jan 2016 00:00:00 +0100
ACTION: Breaking the Privacy Barrier for RFID Systems.http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-24-number-1-2-2014/ahswn-24-1-2-p-135-159/, , :
ACTION: Breaking the Privacy Barrier for RFID Systems. Ad Hoc Sens. Wirel. Networks 24(1-2): 135-159 ()]]>
https://dblp.org/rec/journals/ahswn/LuLH15Thu, 01 Jan 2015 00:00:00 +0100
BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain.https://doi.org/10.1504/IJAHUC.2015.069061, , , :
BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain. Int. J. Ad Hoc Ubiquitous Comput. 18(4): 234-244 ()]]>
https://dblp.org/rec/journals/ijahuc/QiLLL15Thu, 01 Jan 2015 00:00:00 +0100
Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs.https://doi.org/10.1155/2015/356382, , , :
Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs. Int. J. Distributed Sens. Networks 11: 356382:1-356382:16 ()]]>
https://dblp.org/rec/journals/ijdsn/LuHLH15Thu, 01 Jan 2015 00:00:00 +0100
Improved perception-based spiking neuron learning rule for real-time user authentication.https://doi.org/10.1016/j.neucom.2014.09.034, , , , :
Improved perception-based spiking neuron learning rule for real-time user authentication. Neurocomputing 151: 310-318 ()]]>
https://dblp.org/rec/journals/ijon/QuXLZL15Thu, 01 Jan 2015 00:00:00 +0100
Vulnerability aware graphs for RFID protocol security benchmarking.https://doi.org/10.1016/j.jcss.2014.12.015, , , , :
Vulnerability aware graphs for RFID protocol security benchmarking. J. Comput. Syst. Sci. 81(6): 1027-1041 ()]]>
https://dblp.org/rec/journals/jcss/ChangLLSY15Thu, 01 Jan 2015 00:00:00 +0100
From Interest to Location: Neighbor-Based Friend Recommendation in Social Media.https://doi.org/10.1007/s11390-015-1593-3, , :
From Interest to Location: Neighbor-Based Friend Recommendation in Social Media. J. Comput. Sci. Technol. 30(6): 1188-1200 ()]]>
https://dblp.org/rec/journals/jcst/ZhuLM15Thu, 01 Jan 2015 00:00:00 +0100
Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics.https://doi.org/10.1109/TCSS.2016.2517648, :
Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics. IEEE Trans. Comput. Soc. Syst. 2(3): 53-64 ()]]>
https://dblp.org/rec/journals/tcss/LuL15Thu, 01 Jan 2015 00:00:00 +0100
TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices.https://doi.org/10.1109/TWC.2015.2400440, , :
TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices. IEEE Trans. Wirel. Commun. 14(6): 3076-3085 ()]]>
https://dblp.org/rec/journals/twc/HussainLZ15Thu, 01 Jan 2015 00:00:00 +0100
RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile.https://doi.org/10.1109/MASS.2015.43, , , :
RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile. MASS : 434-442]]>
https://dblp.org/rec/conf/mass/SongWLL15Thu, 01 Jan 2015 00:00:00 +0100
FastID: An undeceived router for real-time identification of WiFi terminals.https://doi.org/10.1109/IFIPNetworking.2015.7145328, , , , , :
FastID: An undeceived router for real-time identification of WiFi terminals. Networking : 1-9]]>
https://dblp.org/rec/conf/networking/LuWDMCZ15Thu, 01 Jan 2015 00:00:00 +0100
Wireless firmware execution control in computational RFID systems.https://doi.org/10.1109/RFID.2015.7113083, , , :
Wireless firmware execution control in computational RFID systems. IEEE RFID : 129-136]]>
https://dblp.org/rec/conf/rfid/YangWHL15Thu, 01 Jan 2015 00:00:00 +0100
WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems.https://doi.org/10.1109/Trustcom.2015.412, , :
WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems. TrustCom/BigDataSE/ISPA (1) : 499-506]]>
https://dblp.org/rec/conf/trustcom/LuHZ15Thu, 01 Jan 2015 00:00:00 +0100
Real-time and passive wormhole detection for wireless sensor networks.https://doi.org/10.1109/PADSW.2014.7097858, , , :
Real-time and passive wormhole detection for wireless sensor networks. ICPADS : 592-599]]>
https://dblp.org/rec/conf/icpads/LuoHLH14Wed, 01 Jan 2014 00:00:00 +0100
COLLECTOR: A secure RFID-enabled batch recall protocol.https://doi.org/10.1109/INFOCOM.2014.6848086, , , , :
COLLECTOR: A secure RFID-enabled batch recall protocol. INFOCOM : 1510-1518]]>
https://dblp.org/rec/conf/infocom/QiZLLL14Wed, 01 Jan 2014 00:00:00 +0100
POST: Exploiting dynamic sociality for mobile advertising in vehicular networks.https://doi.org/10.1109/INFOCOM.2014.6848114, , , , , :
POST: Exploiting dynamic sociality for mobile advertising in vehicular networks. INFOCOM : 1761-1769]]>
https://dblp.org/rec/conf/infocom/QinZZLXL14Wed, 01 Jan 2014 00:00:00 +0100
Partial Probing for Scaling Overlay Routing.https://doi.org/10.1109/TPDS.2012.326, , , , , , :
Partial Probing for Scaling Overlay Routing. IEEE Trans. Parallel Distributed Syst. 24(11): 2261-2272 ()]]>
https://dblp.org/rec/journals/tpds/GuoJCWLLZ13Tue, 01 Jan 2013 00:00:00 +0100
Random Graph Based Benchmarking Methodology for RFID Security Protocols.https://doi.org/10.1109/ICEBE.2013.28, , , , :
Random Graph Based Benchmarking Methodology for RFID Security Protocols. ICEBE : 184-191]]>
https://dblp.org/rec/conf/icebe/ChangSLYQ13Tue, 01 Jan 2013 00:00:00 +0100
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.https://doi.org/10.1155/2012/153912, , , :
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. Int. J. Distributed Sens. Networks 8 ()]]>
https://dblp.org/rec/journals/ijdsn/LuHHN12Sun, 01 Jan 2012 00:00:00 +0100
BEST: A Bidirectional Efficiency-Privacy Transferable Authentication Protocol for RFID-Enabled Supply Chain.https://doi.org/10.1109/ICPADS.2012.65, , , :
BEST: A Bidirectional Efficiency-Privacy Transferable Authentication Protocol for RFID-Enabled Supply Chain. ICPADS : 424-431]]>
https://dblp.org/rec/conf/icpads/QiLLL12Sun, 01 Jan 2012 00:00:00 +0100
Analysis on Token-Controlled Public Key Encryption.https://doi.org/10.1109/MSN.2012.18, , , :
Analysis on Token-Controlled Public Key Encryption. MSN : 87-91]]>
https://dblp.org/rec/conf/msn/LinLSL12Sun, 01 Jan 2012 00:00:00 +0100
Security Analysis of an Improved MFE Public Key Cryptosystem.https://doi.org/10.1007/978-3-642-25513-7_9, , , :
Security Analysis of an Improved MFE Public Key Cryptosystem. CANS : 118-125]]>
https://dblp.org/rec/conf/cans/NieXLL11Sat, 01 Jan 2011 00:00:00 +0100
Refresh: Weak Privacy Model for RFID Systems.https://doi.org/10.1109/INFCOM.2010.5462153, , :
Refresh: Weak Privacy Model for RFID Systems. INFOCOM : 704-712]]>
https://dblp.org/rec/conf/infocom/LuLL10Fri, 01 Jan 2010 00:00:00 +0100
ACTION: Breaking the Privacy Barrier for RFID Systems.https://doi.org/10.1109/INFCOM.2009.5062117, , , :
ACTION: Breaking the Privacy Barrier for RFID Systems. INFOCOM : 1953-1961]]>
https://dblp.org/rec/conf/infocom/LuHXL09Thu, 01 Jan 2009 00:00:00 +0100
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.https://doi.org/10.1109/TPDS.2008.15, , , , , , :
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps. IEEE Trans. Parallel Distributed Syst. 19(10): 1325-1337 ()]]>
https://dblp.org/rec/journals/tpds/LuHLHHNM08Tue, 01 Jan 2008 00:00:00 +0100
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.https://doi.org/10.1109/IPDPS.2007.370284, , , , , :
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. IPDPS : 1-10]]>
https://dblp.org/rec/conf/ipps/LuHHHLN07Mon, 01 Jan 2007 00:00:00 +0100
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.https://doi.org/10.1109/PERCOM.2007.13, , , , :
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. PerCom : 13-22]]>
https://dblp.org/rec/conf/percom/LuHHLN07Mon, 01 Jan 2007 00:00:00 +0100
Storage-Awareness: RFID Private Authentication based on Sparse Tree.https://doi.org/10.1109/SECPERU.2007.13, , , :
Storage-Awareness: RFID Private Authentication based on Sparse Tree. SECPerU : 61-66]]>
https://dblp.org/rec/conf/secperu/Wang0HL07Mon, 01 Jan 2007 00:00:00 +0100
Privacy-preserving authentication with low computational overhead for RFID systems.https://doi.org/10.1109/SECCOM.2007.4550319, , , :
Privacy-preserving authentication with low computational overhead for RFID systems. SecureComm : 127-132]]>
https://dblp.org/rec/conf/securecomm/LiuHLW07Mon, 01 Jan 2007 00:00:00 +0100
Pairing-Based Multi-Recipient Public Key Encryption.https://dblp.org/pid/49/2793-1.html, :
Pairing-Based Multi-Recipient Public Key Encryption. Security and Management : 159-165]]>
https://dblp.org/rec/conf/csreaSAM/LuH06Sun, 01 Jan 2006 00:00:00 +0100
A Random Walk Based Anonymous Peer-to-Peer Protocol Design.https://doi.org/10.1007/11534310_17, , , , :
A Random Walk Based Anonymous Peer-to-Peer Protocol Design. ICCNMC : 143-152]]>
https://dblp.org/rec/conf/iccnmc/HanLLHP05Sat, 01 Jan 2005 00:00:00 +0100