Follow
Nan Li
Nan Li
Verified email at uow.edu.au
Title
Cited by
Cited by
Year
Lightweight mutual authentication for IoT and its applications
N Li, D Liu, S Nepal
IEEE Transactions on Sustainable Computing 2 (4), 359-370, 2017
1602017
A privacy-preserving fog computing framework for vehicular crowdsensing networks
J Wei, X Wang, N Li, G Yang, Y Mu
IEEE Access 6, 43776-43784, 2018
552018
Fuzzy extractors for biometric identification
N Li, F Guo, Y Mu, W Susilo, S Nepal
2017 IEEE 37th International conference on distributed computing systems …, 2017
482017
Policy-based chameleon hash for blockchain rewriting with black-box accountability
Y Tian, N Li, Y Li, P Szalachowski, J Zhou
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
402020
Visualization and cybersecurity in the metaverse: A survey
YW Chow, W Susilo, Y Li, N Li, C Nguyen
Journal of Imaging 9 (1), 11, 2022
292022
Context-aware trust management system for IoT applications with multiple domains
N Li, V Varadharajan, S Nepal
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
262019
Privacy-preserving authorized RFID authentication protocols
N Li, Y Mu, W Susilo, F Guo, V Varadharajan
Radio Frequency Identification: Security and Privacy Issues: 10th …, 2014
172014
A blockchain based secure IoT system using device identity management
F Sabrina, N Li, S Sohail
Sensors 22 (19), 7535, 2022
162022
Compact-LWE: Enabling practically lightweight public key encryption for leveled IoT device authentication
D Liu, N Li, J Kim, S Nepal
Cryptology ePrint Archive, 2017
152017
Shared RFID ownership transfer protocols
N Li, Y Mu, W Susilo, V Varadharajan
Computer Standards & Interfaces 42, 95-104, 2015
132015
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
YW Chow, W Susilo, J Wang, R Buckland, J Baek, J Kim, N Li
Journal of Network and Computer Applications 173, 102834, 2021
102021
Vulnerabilities of an ECC‐based RFID authentication scheme
N Li, Y Mu, W Susilo, F Guo, V Varadharajan
Security and Communication Networks 8 (17), 3262-3270, 2015
102015
DSH: deniable secret handshake framework
Y Tian, Y Li, Y Zhang, N Li, G Yang, Y Yu
Information Security Practice and Experience: 14th International Conference …, 2018
92018
Secure RFID ownership transfer protocols
N Li, Y Mu, W Susilo, V Varadharajan
International Conference on Information Security Practice and Experience …, 2013
82013
Leakage-resilient biometric-based remote user authentication with fuzzy extractors
Y Tian, Y Li, B Sengupta, N Li, C Su
Theoretical computer science 814, 223-233, 2020
72020
Targeted context based attacks on trust management systems in IoT
C Lewis, N Li, V Varadharajan
IEEE Internet of Things Journal, 2023
52023
Anonymous yoking-group proofs
N Li, Y Mu, W Susilo, V Varadharajan
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
42015
A new construction for linkable secret handshake
Y Tian, Y Li, RH Deng, N Li, G Yang, Z Yang
The Computer Journal 63 (4), 536-548, 2020
32020
On RFID authentication protocols with wide-strong privacy
N Li, Y Mu, W Susilo, F Guo, V Varadharajan
32013
Efficient self-certified signatures with batch verification
N Li, Y Mu, W Susilo
Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012
32012
The system can't perform the operation now. Try again later.
Articles 1–20