default search action
Nan Li 0007
Person information
- affiliation: University of Newcastle, School of Electrical Engineering and Computing, Marsfield, NSW, Australia
- affiliation (former): CSIRO, DATA61, Marsfield, NSW, Australia
- affiliation (former): University of Wollongong, School of Computing and Information Technology, Australia
Other persons with the same name
- Nan Li — disambiguation page
- Nan Li 0001 — Carnegie Mellon University, Computer Science Department, Pittsburgh, PA, USA
- Nan Li 0002 — Northwestern Polytechnical University, School of Automation, Xi'an, China (and 1 more)
- Nan Li 0003 — Beijing Institute of Technology, School of Automation, China
- Nan Li 0004 — University of International Business and Economics, School of Information Technology and Management, Beijing, China
- Nan Li 0005 — Nanjing University of Information Science and Technology, School of Atmospheric Physics, China
- Nan Li 0006 — Dalian University of Technology, School of Mathematical Sciences, China
- Nan Li 0008 — Medidata Solutions, New York, NY, USA (and 1 more)
- Nan Li 0009 — Chinese Academy of Sciences, Academy of Mathematics and Systems Science, Beijing, China
- Nan Li 0010 — Northeastern University, Qinhuangdao Branch Campus, China
- Nan Li 0011 — Royal Institute of Technology, Stockholm, Sweden
- Nan Li 0012 — Shandong University, School of Electrical Engineering, Jinan, China
- Nan Li 0013 — Tianjin University, Center for Applied Mathematics, China (and 1 more)
- Nan Li 0014 — Tsinghua University, Department of Construction Management, Beijing, China
- Nan Li 0015 (aka: Nan I. Li) — University of Michigan, Department of Aerospace Engineering, Ann Arbor, MI, USA
- Nan Li 0016 — Southwestern University of Finance and Economics, School of Public Finance and Taxation, Chengdu, China
- Nan Li 0017 — Fujian Agriculture and Forestry University, College of Computer and Information Sciences, Fuzhou, China
- Nan Li 0018 — Royal Institute of Technology, Stockholm, Sweden
- Nan Li 0019 — Microsoft, STC-Asia, Suzhou, China (and 2 more)
- Nan Li 0020 — National University of Defense Technology, College of Electronic Science and Technology, Changsha, China
- Nan Li 0021 — Temple University, Department of Computer and Information Sciences, Philadelphia, PA, USA
- Nan Li 0022 — University of Nottingham, School of Physics, UK (and 2 more)
- Nan Li 0023 — Zhengzhou University of Light Industry, School of Electrics and Information Engineering, China
- Nan Li 0024 — Nanjing Forestry University, College of Biology and Environment Sciences, China
- Nan Li 0025 — University of Chinese Academy of Sciences, Technology and Engineering Center for Space Utilization, Beijing, China
- Nan Li 0026 — Chongqing University, School of Automation, China
- Nan Li 0027 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, Guangdong Provincial Key Laboratory of Robotics and Intelligent System, China (and 1 more)
- Nan Li 0028 — Northeast Electric Power University, MoE Key Laboratory of Modern Power System Simulation and Control and Renewable Energy Technology, Jilin, China (and 1 more)
- Nan Li 0029 — Polytechnic Institute of Paris, Palaiseau, France
- Nan Li 0030 — EPFL, Switzerland
- Nan Li 0031 — Beijing Technology and Business University, School of Computer Science and Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Yangguang Tian, Yingjiu Li, Robert H. Deng, Guomin Yang, Nan Li:
Policy-Based Remote User Authentication From Multi-Biometrics. Comput. J. 67(5): 1814-1825 (2024) - [j13]Jinguang Han, Willy Susilo, Nan Li, Xinyi Huang:
OLBS: Oblivious Location-Based Services. IEEE Trans. Inf. Forensics Secur. 19: 2231-2243 (2024) - [c19]Cody Lewis, Vijay Varadharajan, Nasimul Noman, Udaya Kiran Tupakula, Nan Li:
Mitigation of Gradient Inversion Attacks in Federated Learning with Private Adaptive Optimization. ICDCS 2024: 833-845 - [c18]Amin Sakzad, David J. Paul, Judithe Sheard, Ljiljana Brankovic, Matthew P. Skerritt, Nan Li, Sepehr Minagar, Simon, William Billingsley:
Diverging assessments: What, Why, and Experiences. SIGCSE (1) 2024: 1161-1167 - 2023
- [j12]Yangguang Tian, Atsuko Miyaji, Koki Matsubara, Hui Cui, Nan Li:
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting. Comput. J. 66(10): 2365-2378 (2023) - [j11]Cody Lewis, Nan Li, Vijay Varadharajan:
Targeted Context-Based Attacks on Trust Management Systems in IoT. IEEE Internet Things J. 10(14): 12186-12203 (2023) - [j10]Yang-Wai Chow, Willy Susilo, Yannan Li, Nan Li, Chau Nguyen:
Visualization and Cybersecurity in the Metaverse: A Survey. J. Imaging 9(1): 11 (2023) - [c17]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. CANS 2023: 516-537 - 2022
- [j9]Fariza Sabrina, Nan Li, Shaleeza Sohail:
A Blockchain Based Secure IoT System Using Device Identity Management. Sensors 22(19): 7535 (2022) - 2021
- [j8]Yang-Wai Chow, Willy Susilo, Jianfeng Wang, Richard Buckland, Joonsang Baek, Jongkil Kim, Nan Li:
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning. J. Netw. Comput. Appl. 173: 102834 (2021) - [i3]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. IACR Cryptol. ePrint Arch. 2021: 1483 (2021) - 2020
- [j7]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang:
A New Construction for Linkable Secret Handshake. Comput. J. 63(4): 536-548 (2020) - [j6]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Pengfei Wu, Anyi Liu:
A new framework for privacy-preserving biometric-based remote user authentication. J. Comput. Secur. 28(4): 469-498 (2020) - [j5]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su:
Leakage-resilient biometric-based remote user authentication with fuzzy extractors. Theor. Comput. Sci. 814: 223-233 (2020) - [c16]Yangguang Tian, Nan Li, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. ACSAC 2020: 813-828 - [c15]Nan Li, Dongxi Liu, Surya Nepal, Guangyu Pei:
A Needle in a Haystack: Finding a Suitable Lightweight IoT Authentication Protocol and Improving Its Usability. TPS-ISA 2020: 46-54
2010 – 2019
- 2019
- [c14]Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups. ACNS 2019: 406-425 - [c13]Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Yong Yu:
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion. CANS 2019: 512-524 - [c12]Nan Li, Vijay Varadharajan, Surya Nepal:
Context-Aware Trust Management System for IoT Applications with Multiple Domains. ICDCS 2019: 1138-1148 - [c11]Yang-Wai Chow, Willy Susilo, Jianfeng Wang, Richard Buckland, Joonsang Baek, Jongkil Kim, Nan Li:
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes. ML4CS 2019: 320-335 - [c10]Jiannan Wei, Nan Li:
Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags. WOWMOM 2019: 1-6 - [i2]Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups. IACR Cryptol. ePrint Arch. 2019: 1479 (2019) - 2018
- [j4]Jiannan Wei, Xiaojie Wang, Nan Li, Guomin Yang, Yi Mu:
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks. IEEE Access 6: 43776-43784 (2018) - [c9]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c8]Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu:
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience. SecureComm (1) 2018: 112-132 - 2017
- [j3]Nan Li, Dongxi Liu, Surya Nepal:
Lightweight Mutual Authentication for IoT and Its Applications. IEEE Trans. Sustain. Comput. 2(4): 359-370 (2017) - [c7]Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal:
Fuzzy Extractors for Biometric Identification. ICDCS 2017: 667-677 - [i1]Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal:
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication. IACR Cryptol. ePrint Arch. 2017: 685 (2017) - 2015
- [j2]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Shared RFID ownership transfer protocols. Comput. Stand. Interfaces 42: 95-104 (2015) - [j1]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Vulnerabilities of an ECC-based RFID authentication scheme. Secur. Commun. Networks 8(17): 3262-3270 (2015) - [c6]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Anonymous Yoking-Group Proofs. AsiaCCS 2015: 615-620 - 2014
- [c5]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Privacy-Preserving Authorized RFID Authentication Protocols. RFIDSec 2014: 108-122 - 2013
- [c4]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Secure RFID Ownership Transfer Protocols. ISPEC 2013: 189-203 - [c3]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
On RFID Authentication Protocols with Wide-Strong Privacy. RFIDSec Asia 2013: 3-16 - 2011
- [c2]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo:
Self-certified ring signatures. AsiaCCS 2011: 396-400 - [c1]Nan Li, Yi Mu, Willy Susilo:
Efficient Self-certified Signatures with Batch Verification. Inscrypt 2011: 179-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint