Lightweight mutual authentication for IoT and its applications N Li, D Liu, S Nepal IEEE Transactions on Sustainable Computing 2 (4), 359-370, 2017 | 161 | 2017 |
A privacy-preserving fog computing framework for vehicular crowdsensing networks J Wei, X Wang, N Li, G Yang, Y Mu IEEE Access 6, 43776-43784, 2018 | 55 | 2018 |
Fuzzy extractors for biometric identification N Li, F Guo, Y Mu, W Susilo, S Nepal 2017 IEEE 37th International conference on distributed computing systems …, 2017 | 50 | 2017 |
Policy-based chameleon hash for blockchain rewriting with black-box accountability Y Tian, N Li, Y Li, P Szalachowski, J Zhou Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 40 | 2020 |
Visualization and cybersecurity in the metaverse: A survey YW Chow, W Susilo, Y Li, N Li, C Nguyen Journal of Imaging 9 (1), 11, 2022 | 30 | 2022 |
Context-aware trust management system for IoT applications with multiple domains N Li, V Varadharajan, S Nepal 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 26 | 2019 |
A blockchain based secure IoT system using device identity management F Sabrina, N Li, S Sohail Sensors 22 (19), 7535, 2022 | 17 | 2022 |
Privacy-preserving authorized RFID authentication protocols N Li, Y Mu, W Susilo, F Guo, V Varadharajan Radio Frequency Identification: Security and Privacy Issues: 10th …, 2014 | 17 | 2014 |
Compact-LWE: Enabling practically lightweight public key encryption for leveled IoT device authentication D Liu, N Li, J Kim, S Nepal Cryptology ePrint Archive, 2017 | 15 | 2017 |
Shared RFID ownership transfer protocols N Li, Y Mu, W Susilo, V Varadharajan Computer Standards & Interfaces 42, 95-104, 2015 | 13 | 2015 |
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning YW Chow, W Susilo, J Wang, R Buckland, J Baek, J Kim, N Li Journal of Network and Computer Applications 173, 102834, 2021 | 10 | 2021 |
Vulnerabilities of an ECC‐based RFID authentication scheme N Li, Y Mu, W Susilo, F Guo, V Varadharajan Security and Communication Networks 8 (17), 3262-3270, 2015 | 10 | 2015 |
DSH: deniable secret handshake framework Y Tian, Y Li, Y Zhang, N Li, G Yang, Y Yu Information Security Practice and Experience: 14th International Conference …, 2018 | 9 | 2018 |
Secure RFID ownership transfer protocols N Li, Y Mu, W Susilo, V Varadharajan International Conference on Information Security Practice and Experience …, 2013 | 8 | 2013 |
Leakage-resilient biometric-based remote user authentication with fuzzy extractors Y Tian, Y Li, B Sengupta, N Li, C Su Theoretical computer science 814, 223-233, 2020 | 7 | 2020 |
Targeted context based attacks on trust management systems in IoT C Lewis, N Li, V Varadharajan IEEE Internet of Things Journal, 2023 | 5 | 2023 |
Anonymous yoking-group proofs N Li, Y Mu, W Susilo, V Varadharajan Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 4 | 2015 |
A new construction for linkable secret handshake Y Tian, Y Li, RH Deng, N Li, G Yang, Z Yang The Computer Journal 63 (4), 536-548, 2020 | 3 | 2020 |
Privacy-preserving and undeniable authentication for mobile RFID tags J Wei, N Li 2019 IEEE 20th International Symposium on" A World of Wireless, Mobile and …, 2019 | 3 | 2019 |
On RFID authentication protocols with wide-strong privacy N Li, Y Mu, W Susilo, F Guo, V Varadharajan | 3 | 2013 |