近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
2018
KFan,JWang,XWang,HLi,YYang,Secure,efficientandrevocabledatasharingschemeforvehicularfogs,Peer-to-PeerNetworkingandApplications11(4),766-777,2018
KFan,WWang,WJiang,HLi,YYang,Secureultra-lightweightRFIDmutualauthenticationprotocolbasedontransparentcomputingforIoV,Peer-to-PeerNetworkingandApplications11(4),723-734,2018
QHan,CLi,HLi,Efficientandrobustattribute-basedencryptionsupportingaccesspolicyhidinginInternetofThings,FutureGenerationComputerSystems83,269-277,2018
SDing,CLi,HLi,ANovelEfficientPairing-freeCP-ABEBasedonEllipticCurveCryptographyforIoT,IEEEAccess,2018
KFan,XWang,KSuto,HLi,YYang,SecureandEfficientPrivacy-PreservingCiphertextRetrievalinConnectedVehicularCloudComputing,IEEENetwork32(3),52-57,2018
KFan,WJiang,HLi,YYang,LightweightRFIDProtocolforMedicalPrivacyProtectioninIoT,IEEETransactionsonIndustrialInformatics14(4),1656-1665,2018
XLiu,HZhu,RLu,HLi,Efficientprivacy-preservingonlinemedicalprimarydiagnosisschemeonnaivebayesianclassification,Peer-to-PeerNetworkingandApplications11(2),334-347,2018
FShan,HLi,FLi,YGuo,BNiu,HAC:HybridAccessControlforOnlineSocialNetworks,SecurityandCommunicationNetworks2018
2015
KaiFan,DengHai,LangWang,HuiLi,YinyangYang,Ciphertextretrievalinsuper-peerp2pnetwork,GLOBECOM2015
BoyangWang,MingLi,HaitaoWang,HuiLI,CircularRangeSearchonEncryptedSpatialData,IEEECNS2015
JinCao;HuiLi;MaodeMa,GAHAP:AGroup-basedAnonymityHandoverAuthenticationProtocolforMTCinLTE-ANetworks,ICC2015
JinCao;HuiLi;MaodeMa;FenghuaLi,UGHA:UniformGroup-basedHandoverAuthenticationforMTCwithinE-UTRANinLTE-ANetworks,ICC2015
ShunrongJiang;XiaoyanZhu;RipeiHao;HaotianChi;HuiLi;LiangminWangLightweightandPrivacy-PreservingAgentDataTransmissionforMobileHealthcare,ICC2015
WeihaoLi;BenNiu;HuiLi;FenghuaLi,Privacy-PreservingStrategiesinServiceQualityAwareLocation-BasedServices,ICC2015
WenhaiSun,XuefengLiu;WenjingLou,ThomasHou,HuiLi,CatchYouIfYouLietoMe:EfficientVerifiableConjunctiveKeywordSearchoverLargeDynamicEncryptedCloudData,IEEEINFOCOM2015
BenNiu;QinghuaLi;XiaoyanZhu;GuohongCao;HuiLi,EnhancingPrivacythroughCachinginLocation-BasedServices,IEEEINFOCOM2015
Niu,Ben;Zhu,Xiaoyan;Li,Weihao;Li,Hui;Wang,Yingjuan;Lu,ZongqingApersonalizedtwo-tiercloakingschemeforprivacy-awarelocation-basedservices,ICNC2015,p94-98,March26,2015
2014
1.BoyangWang,YantianHou,MingLi,HaitaoWang,HuiLi,Maple:scalablemulti-dimensionalrangesearchoverencryptedclouddatawithtree-basedindex,ASIACCS'14,Tokoyo,Japan
2.BoyangWang;MingLi;ShermanS.M.Chow;HuiLi,ATaleofTwoServers:EfficientPrivacy-PreservingComputationoverCloudDataunderMultipleKeys,2thIEEEConferenceonCommunicationsandNetworkSecurity,2014.10,SanFransico,USA
3.BoyangWang,YantianHou,MingLi,HaitaoWang,HuiLiandFenghuaLi.Tree-basedMulti-DimensionalRangeSearchonEncryptedDatawithEnhancedPrivacy,10thInternationalConferenceonSecurityandPrivacyinCommunicationNetworks,Beijing,China
4.Niu,Ben;Zhu,Xiaoyan;Weihao,Li,Li,Hui,EPcloak:AnEfficientandPrivacy-PreservingSpatialCloakingSchemeforLBSs,IEEEMASS2014,Philadelphia,USA,2014.10
5.Niu,Ben;Li,Qinghua;Zhu,Xiaoyan;Li,Hui,Afine-grainedspatialcloakingschemeforprivacy-awareusersinLocation-BasedServices,ICCCN,September25,2014,Shanghai,China
6.Zhu,Hui;Huang,Rong;Liu,Ximeng;Li,Hui,SPEMR:Anewsecurepersonalelectronicmedicalrecordschemewithprivilegeseparation,2014IEEEInternationalConferenceonCommunicationsWorkshops,ICC2014,p700-705,2014,
7.Zhu,Xiaoyan;Chi,Haotian;Jiang,Shunrong;Lei,Xiaosan;Li,Hui,Usingdynamicpseudo-IDstoprotectprivacyinlocation-basedservices,2014IEEEInternationalConferenceonCommunications,ICC2014,p2307-2312,2014,
8.Zhu,Hui;Huang,Cheng;Li,Hui,MPPM:MalwarepropagationandpreventionmodelinonlineSNS,2014IEEEInternationalConferenceonCommunicationsWorkshops,ICC2014,Sydney,NSW,Australia
9.Zhu,Xiaoyan;Liu,Jie;Jiang,Shunrong;Chen,Zengbao;Li,Hui,EfficientWeight-basedPrivateMatchingforproximity-basedmobilesocialnetworks,2014IEEEInternationalConferenceonCommunications,ICC2014,Sydney,NSW,Australia,2014
10.Lai,Chengzhe;Li,Hui;Lu,Rongxing;Jiang,Rong;Shen,Xuemin,SEGR:Asecureandefficientgrouproamingschemeformachinetomachinecommunicationsbetween3GPPandWiMAXnetworks,2014IEEEInternationalConferenceonCommunications,ICC2014,p1011-1016,2014
11.NiuB,ZhangZ,LiXandLiH,Privacy-AreaAwareDummyGenerationAlgorithmsforLocation-BasedServices,inProc.ofIEEEICC2014
12.SunW,YuS,LouW,HouTY,andLiH,ProtectingYourRight:Attribute-basedKeywordSearchwithFine-grainedOwner-enforcedSearchAuthorizationintheCloud,inProc.ofIEEEINFOCOM2014
13.NiuB,LiQ,ZhuX,CaoGandLiH,Achievingk-anonymityinPrivacy-AwareLocation-BasedServices,inProc.ofIEEEINFOCOM2014,Toronto,Canada
14.Zhang,Yinghui;Zheng,Dong;Chen,Xiaofeng;Li,Jin;Li,Hui,Computationallyefficientciphertext-policyattribute-basedencryptionwithconstant-sizeciphertexts,LectureNotesinComputerScience,v8782,p259-273,2014
2013
1.NiuB,ZhuX,LeiX,ZhangW,andLiH,EPS:Encounter-BasedPrivacy-PreservingSchemeforLocation-BasedServices,inProc.ofIEEEGLOBECOM2013
2.NiuB,ZhuX,LiuJ,LiZ,andLiH,Weight-awarePrivateMatchingSchemeforProximity-BasedMobileSocialNetworks,"inProc.ofIEEEGLOBECOM2013
3.ZhuX,ChiH,NiuB,ZhangW,LiZ,andLiH,Mobicache:Whenk-anonymitymeetscache,inProc.ofIEEEGLOBECOM2013
4.NiuB,ZhuX,ZhangT,ChiH,andLiH,P-match:Priority-awareFriendDiscoveryforProximity-BasedMobileSocialNetworks,inProc.ofIEEEMASS,pp.351-355,2013
5.BoyangWang,ShermanS.M.Chow,MingLi,HuiLi,StoringSharedDataontheCloudviaSecurity-Mediator,ICDCS2013
6.BoyangWang,HuiLi,MingLi,PrivacyPreservingPublicAuditingforSharedCloudDataSupportingGroupDynamics,ICC2013.
7.WenhaiSun,BingWang,NingCao,MingLi,WenjingLou,ThomasHouandHuiLi,Privacy-PreservingMulti-keywordTextSearchintheCloudSupportingSimilarity-basedRanking,ASIACCS2013
8.YinghuiZhang,XiaofengChen,JinLi,DuncanS.WongandHuiLi,AnonymousAttribute-BasedEncryptionSupportingEfficientDecryptionTest,ASIACCS2013,distinguishedpaperaward
9.BoyangWang,BaochunLi,HuiLi,PublicAuditingforSharedDatawithEfficientUserRevocationintheCloud,INFOCOM2013,Apr.15-19,Turin,Italia.
10.BenNiu,XiaoyanZhu,HuiLi,AnUltralightweightandPrivacy-PreservingAuthenticationProtocolforMobileRFIDSystems,IEEEWCNC2013
11.BenNiu,XiaoyanZhu,HaotianChi,HuiLi,plus:$Privacy-PreservingPseudo-LocationUpdatingSysteminLocation-BasedServices,IEEEWCNC2013
2012
1.JinCao,MaodeMa,HuiLi,UnifiedHandoverAuthenticationbetweenHeterogeneousAccessSystemsinLTENetworks,IEEEGlobeCom2012,Dec.3-7,CA,USA
2.JinCao,MaodeMa,HuiLi,AGroup-basedAuthenticationandKeyAgreementforMTCinLTENetworks,IEEEGlobeCom2012,Dec.3-7,CA,USA
3.BoyangWang,BaochunLi,HuiLi,Gmatch:SecureandPrivacy-PreservingGroupMatchinginSocialNetworks,IEEEGlobeCom2012,Dec.3-7,CA,USA
4.ZhaoXingwen,LiHui,Codesbasedtracingandrevokingschemewithconstantciphertext,LectureNotesinComputerScience,v7496LNCS,p318-335,2012,ProvableSecurity-6thInternationalConference,ProvSec2012,Proceedings
5.BoyangWang,BaochunLi,HuiLi,Knox:Privacy-PreservingAuditingforSharedDatawithLargeGroupsintheCloud,ACNS2012,LNCS7341,507-525,June26-29,Singapore
6.BoyangWang,BaochunLi,HuiLi,Oruta:Privacy-PreservingPublicAuditingforSharedDataintheCloud,IEEECloud2012,Honolulu,Hawaii,USA.June24-29,2012.
7.KaiFan,LibinZhao,XueminShermanShen,HuiLi,YintangYang,Smart-blockingFileStorageMethodinCloudComputing,IEEEICCC2012,Beijing,August15-18,2012.
2011
1.YinghuiZhang,XiaofengChen,HuiLi,JinCao,IdentityBasedConstructionforSecureandEfficientHandoffAuthenticationSchemesinWirelessNetworks,The2011FTRAWorldConvergenceConference,Korea,DEC12-15,2011
2.Sun,Yuhua;Wang,Zilong;Li,Hui;Yan,Tongjiang,Onthecross-correlationofaternarym-sequenceofperiod34k-1anditsdecimatedsequenceby(32k+1)2/20,Proceedingsofthe5thInternationalWorkshoponSignalDesignandItsApplicationsinCommunications,IWSDA'11,p48-51,2011,EI20121214883358
3.Li,Zhanhu;Fan,Kai;Li,Hui,ConcurrentsignatureprotocolonconiccurveoverringZn,Source:2011InternationalConferenceonElectronics,CommunicationsandControl,ICECC2011-Proceedings,p194-197,2011,EI20114714544163
4.Niu,Ben,Li,Hui;Zhu,Xiaoyan;Chao,Lv,SecurityanalysisofsomerecentauthenticationprotocolsforRFID,Proceedings-20117thInternationalConferenceonComputationalIntelligenceandSecurity,CIS2011,p665-669,2011,
2010
1.YongWang,HuiLiandXiyuanWang.PerformanceAnalysisofOptimalAntennaSchemeinTransmitDiversitySystems.The6thInternationalConferenceonNaturalComputation(ICNC'10),Yantai,August,2010,Vol.6,2793-2797.EI20104613380415
2.YongWang,HuiLi.FullRateandFullDiversitySTBCinDecode-and-ForwardRelaySystems.The2010InternationalConferenceonCommunicationsandIntelligenceInformationSecurity,Nanning,October,2010,135-138.
3.CanMo,HuiLi,HuiZhu,Asteampatternmatchingmethodfortrafficanalysis,ICSTE-Forensics2010,Shanghai
4.ChaoLv;MaodeMa,HuiLi,JianfengMa,Asecurityenhancedauthenticationandkeydistributionprotocolforwirelessnetworks,inIEEEGLOBECOM2010WorkshoponWebandPervasiveSecurity,2010.12,EI20110913697828
5.ChaoLv;MaodeMa,HuiLi,JianfengMa,AnEfficientThree-PartyAuthenticatedKeyExchangeProtocolwithOne-TimeKey,INFOCOMIEEEConferenceonComputerCommunicationsWorkshops,2010
2009
1.ZhouYejun,LiHui,MaJianfeng,SecureError-CorrectionNetworkCodinginaRandomizedSetting,ISA2009,LNCS5576,pp570-577
2.ZhuHui,LiHui,WangYumin.AnEfficientFastAuthenticationProtocol.IEEE2009InternationalConferenceonComputationalIntelligenceandSecurity.2009,12.
3.Li,Xiaoqing,LiHui,MaJianfengandZhangWeidong.AnEfficientAnonymousRoutingProtocolforMobileAdHocNetworks.The5thInternationalConferenceonInformationAssuranceandSecurity,VolumeII,pp.287–290,2009.
4.LvChao,LiHui,MaJianfeng.AnalysisthePropertiesofTLSBasedonTemporalLogicofKnowledge,TheFifthInternationalConferenceonInformationAssuranceandSecurity,2009.
2008andbefore
1.WangYing,LiHui,DuXinjun,WangYumin,Thedesignofoptimalperiodinterleaver,Proceedings-InternationalConferenceonAdvancedInformationNetworkingandApplications,AINA,Proceedings-22ndInternationalConferenceonAdvancedInformationNetworkingandApplicationsWorkshops/Symposia,AINA2008,2008,p413-415
2.WangYing,DuXinjun,LiHui,ZhuXiaoyan,Tail-bitingtheoryforturbocodes,IEEEWirelessandMicrowaveTechnologyConference,WAMICON2006,IEEEWirelessandMicrowaveTechnologyConference,WAMICON2006
3.LiHui,Shenqing,ATokenBasedSingleSign-onprotocol,CIS2005,PartII,LNAI3802,Springer-Verlag2005.12
4.WangMeng,LiHui,LiuZhijing,EfficientIdentityBasedProxy-SigncryptionSchemeswithForwardSecurityandPublicVerifiability,ICCNMC2005,LNCSSpringerVerlag2005.8.
JournalPaper
2015
Liu,X.;Sun,W.;Quan,H.;Lou,W.;Zhang,Y.;Li,H.PubliclyVerifiableInnerProductEvaluationoverOutsourcedDataStreamsunderMultipleKeys,IEEETransactionsonServicesComputing,online
Zhu,Hui;Huang,Cheng;Lu,Rongxing;Li,Hui,Modellinginformationdisseminationunderprivacyconcernsinsocialmedia,PhysicaA:StatisticalMechanicsanditsApplications,v449,p53-63,May1,2016
Zhu,Hui;Gao,Lijuan;Li,Hui,Secureandprivacy-preservingbodysensordatacollectionandqueryscheme,Sensors(Switzerland),v16,n2,February1,2016
Zhu,Hui;He,Xiaoying;Liu,Ximeng;Li,Hui,PTFA:Asecureandprivacy-preservingtrafficflowanalysisschemeforintelligenttransportationsystem,InternationalJournalofem[ant]beddedSystems,v8,n1,p78-86,2016
Niu,Ben;(Zhu,Xiaoyan;Li,Qinghua;Chen,Jie;Li,Hui*,Anovelattacktospatialcloakingschemesinlocation-basedservices,FUTUREGENERATIONCOMPUTERSYSTEMS-THEINTERNATIONALJOURNALOFGRIDCOMPUTINGANDESCIENCE,Vol.49,p125-132,2015
Wang,Yong;Wu,Hao;Tang,Liyang;Li,Hui,TheSolutionforCooperativeBeamformingDesigninMIMOMulti-wayRelayNetworks,KSIITRANSACTIONSONINTERNETANDINFORMATIONSYSTEMS,9(3):956-970,2015
Lv,Xixiang;Mu,Yi;Li,Hui,KeymanagementforSmartGridbasedonasymmetrickey-wrapping,INTERNATIONALJOURNALOFCOMPUTERMATHEMATICS,92(3):498-512,2015
Lai,Chengzhe;Li,Hui;Li,Xiaoqing;Cao,Jin,Anovelgroupaccessauthenticationandkeyagreementprotocolformachine-typecommunication,TRANSACTIONSONEMERGINGTELECOMMUNICATIONSTECHNOLOGIES26(3):414-431,2015
Li,Chen;Chen,Le;Lu,Rongxing;Li,Hui,Commenton"AnEfficientHomomorphicMACwithSmallKeySizeforAuthenticationinNetworkCoding",IEEETRANSACTIONSONCOMPUTERS,64(3):882-883,2015
Zhu,Hui;Xue,Yingfang;Chen,Xiaofeng;Li,Qiang;Li,Hui,V-MGSM:AMultilevelandGroupingSecurityVirtualizationModelforMobileInternetService,MOBILEINFORMATIONSYSTEMS,1-9,2015
WangB,LiB,LiH,Panda:PublicAuditingforSharedDatawithEfficientUserRevocationintheCloud,IEEETransactionsonServiceComputing,8(1):92-106,2015
2014
SunW,WangB,CaoN,LiM,LouW,YHouY,LiH,VerifiablePrivacy-PreservingMulti-keywordTextSearchintheCloudSupportingSimilarity-basedRanking,IEEETransactionsonParallelandDistributedSystems,IEEETRANSACTIONSONPARALLELANDDISTRIBUTEDSYSTEMS,25(11):3025-3035,2014
Wang,Boyang;Li,Hui;Liu,Xuefeng;Li,Fenghua;Li,Xiaoqing,EfficientPublicVerificationontheIntegrityofMulti-OwnerDataintheCloud,JOURNALOFCOMMUNICATIONSANDNETWORKS,16(6):592-599
Zhang,Yinghui;Chen,Xiaofeng;Li,Jin;Li,Hui,GenericconstructionforsecureandefficienthandoffauthenticationschemesinEAP-basedwirelessnetworks,COMPUTERNETWORKS,75:192-211,seriesA,2014
Li,Chen;Lu,Rongxing;Li,Hui;Chen,Le;Li,Xiaoqing,Commenton"ANovelHomomorphicMACSchemeforAuthenticationinNetworkCoding",IEEECOMMUNICATIONSLETTERS,18(12):2129-2132,2014
CaoJ,MaM,LiH,ZhangY,ASurveyonSecurityAspectsforLTEandLTE-ANetworks,IEEECommunicationsSurveys&Tutorials,Vol.16,No.1,pp.283-302,2014
Xiang,Xinyin;Li,Hui;Wang,Mingyu;Liu,Zhenhua,Hiddenattribute-basedsigncryptionschemeforlattice,SecurityandCommunicationNetworks,11(7):1780-1787,2014
WangB,LiB,LiH,Oruta:Privacy-PreservingPublicAuditingforSharedDataintheCloud,IEEETransactionsonCloudComputing,2(1):43-56,2014
LvX,MuY,LiH,Non-interactiveKeyEstablishmentforBundleSecurityProtocolofSpaceDTNs,IEEETransactionsonInformationForensicsandSecurity,9(1):5-13,2014
ChengzheLai;HuiLi;XiaohuiLiang;RongxingLu;KuanZhang;XueminShen,CPAL:aconditionalprivacy-preservingauthenticationwithaccesslinkabilityforroamingservice,IEEEInternetofThingsJournal,1(1):46-57,2014
Wang,Boyang;Li,Hui;Liu,Xuefeng,SecureMatch:Privacy-preservinggroupmatchinginsocialnetworksforlargegroups,JournalofComputationalInformationSystems,10(2):665-672,2014
Han,Qi;Zhang,Yinghui;Chen,Xiaofeng;Li,Hui;Quan,Jiaxiang,Efficientandrobustidentity-basedhandoffauthenticationforEAP-basedwirelessnetworks,ConcurrencyComputationPracticeandExperience,26(8):1561-1573,2014
Li,Xiaoqing;Li,Hui;AsurveyondatadisseminationinVANETs,CHINESESCIENCEBULLETIN,59(32):4190-4200
2013
Lv,Chao;Ma,Maode;Li,Hui;Ma,Jianfeng;Zhang,YaoyuAnnovelthree-partyauthenticatedkeyexchangeprotocolusingone-timekey,JournalofNetworkandComputerApplications,v36,n1,p498-503,January2013
LaiC,LiH,LuR,ShenXS,SE-AKA:AsecureandefficientgroupauthenticationandkeyagreementprotocolforLTEnetworks,ComputerNetworks,Vol.57,No.17,pp.3492-3510,2013
2012
YinghuiZhang,XiaofengChen,HuiLi,Key-EvolvingHierarchicalID-BasedSigncryption,theComputerJournal,accepted,TheComputerJournal(2012)doi:10.1093/comjnl/bxs154Firstpublishedonline:December2,2012,
JinCao,MaodeMa,HuiLi,YueyuZhang,ChengzheLai,AnUniformHandoverAuthenticationbetweenE-UTRANandNon-3GPPAccessNetworks,IEEETransactiononWirelessCommunication,Vol.11,No.10,2012,pp3644-3650
LvXixiang,LiHui,WangBaocang,Groupkeyagreementforsecuregroupcommunicationindynamicpeersystems,JournalofParallelandDistributedComputing,v72,n10,p1195-1200,October
JinCao,HuiLi,MaodeMa,YueyuZhang,ChengzheLai,AsimpleandrobusthandoverauthenticationbetweenHeNBandeNBinLTEnetworks,ComputerNetworks,56(8),2012,2119-2131
BoyangWang,HuiLi,JinCao,AnefficientMACschemeforsecurenetworkcodingwithprobabilisticdetection,FrontiersofComputerScienceVolume6,Number4(2012),429-441
C.Lv,M.Ma,H.Li,andJ.Ma,Asecurityenhancedauthenticationandkeydistributionprotocolforwirelessnetworks,SecurityandCommunicationNetworks,5(4):343-352(2012),
C.Lv,M.Ma,H.Li,J.Ma,andB.NiuSecurityenhancementofthecommunicationefficientAUTHMAC_DHprotocols,SecurityandCommunicationNetworks,5(6):674-680(2012)
ChengzheLai,HuiLi,YueyuZhang,JinCao:SecurityIssuesonMachinetoMachineCommunications.KSIITransactionsonInternetandInformationSystems,6(2):198-514(2012)
ChaoLv,HuiLi,JianfengMa,BenNiu:Vulnerabilityanalysisoflightweightsecuresearchprotocolsforlow-costRFIDsystems.InternationalJournalofRadioFrequencyIdentificationTechnologyandApplications,4(1):3-12(2012)
ZhituSu,ChunhuiSun,HuiLi,JianfengMa:AmethodforefficientparallelcomputationofTatepairing.InternationalJournalofGridandUtilityComputing3(1):43-52(2012)
2011
Lv,Xixiang;Li,Hui;Wang,Baocang,Identity-basedkeydistributionformobileAdHocnetworks,FRONTIERSOFCOMPUTERSCIENCEINCHINAvol.5.No.4,442-447,2011.12
Lv,Chao;Li,H;Ma,JF;Niu,B;VulnerabilityAnalysisofEllipticCurve-BasedRFIDProtocol,CHINACOMMUNICATIONS,Vol.8,No.4,pp153-158
Lai,Chengzhe;Li,Hui;Zhang,Yueyu;Cao,Jin,AfastseamlesshandoffschemebetweenIEEE802.11andEPSnetworksusingoptimizedproxymobileIPv6,InternationalJournalofDigitalContentTechnologyanditsApplications,v5,n8,p81-91,2011
SunChunhui,LiHui,Yangyang,ChenJie,Researchonfault-electromagneticattackonblockcipher,JournalofConvergenceInformationTechnology,Vol.6No.11,409-4172011.
Su,Zhitu;Sun,Chunhui;Li,Hui;Ma,Jianfeng,Fastcomputationoftatepairingusingellipticcurveswithprimesubgrouporderofprothform,AdvancesinInformationSciencesandServiceSciences,v3,n7,p384-393,August2011
Lv,Chao,LiHui,Ma,Jianfeng;Zhao,Meng,SecurityanalysisoftworecentlyproposedRFIDauthenticationprotocols,FrontiersofComputerScienceinChina,v5,n3,p335-340,September2011
YongWang,HuiLi,WeidongZhang.DesignofMultiuserIntermediateRelaySafetyCommunicationBasedonSharingSignalsSubspaceBeamforming.AdvancedScienceLetters,Vol.4.,Mo.2,pp606-609,2011.2.
SunYinxia,LiHui,ID-basedSigncryptionKEMtoMultipleRecipients,ChineseJournalofElectronics,Vol.20,No.2,317-322,2011
YongWang,HuiLi.ANovelConvexOptimizationforReceiveAntennaSelection.AppliedMechanicsandMaterials,v186,p611-615,2011,NewTrendsandApplicationsofComputer-AidedMaterialandEngineering
Lv,Chao;Li,Hui;Ma,Jianfeng;Niu,Ben;Jiang,Haiyang,Securityanalysisofaprivacy-preservingECC-basedgrouping-proofprotocol,JournalofConvergenceInformationTechnology,v6,n3,p113-119,March2011
YongWang,HuiLiandXiyuanWang.RobustnessofWeightingReceiveAntennaSelectionAlgorithm.WirelessPersonalCommunication,Vol.61,No.1,pp69-67,2011
2010andbefore
YongWang,HuiLi.ANovelAntennaSelectionSchemeforAmplify-and-ForwardMIMORelaySystems.JournalofElectromagneticWavesandApplications,2010,24(11/12).1530-1542.
XudongZhu,HuiLi,ZhijingLiu,BehaviorClusteringforAnomalyDetection,ChinaCommunications,2010:7(6).
ZhuHui,LiHui,MoCan,Asteampatternmatchingmethodfortrafficanalysis,ChinaCommunication,2010.No.6
Zhaobin,KouWeidong,LiHui,DangLanjun,ZhangJun,Effectivewatermarkingschemeintheencrypteddomainforbuyer-sellerwatermarkingprotocol,InformationSciences,v180,n23,p4672-4684,2010,
SunYinxia,LiHui,Short-ciphertextandBDH-basedCCA2securecertificatelessencryption,ScienceChinaInformationScience,2010,No.10,Vol.532005-2015
SunYinxia,LiHui.EfficientSigncryptionbetweenTPKCandIDPKCandItsMulti-ReceiverConstruction,ScienceChina-InformationSciences,2010.3
DangLanjun,KouWeidong,LiHui,ZhangJunwei,CaoXuefei,ZhaoBin,FanKai,EfficientID-basedRegistrationProtocolFeaturedwithUserAnonymityinMobileIPNetworks,IEEETransactiononWirelessCommunication,FEB,2010,VoL9,No.2pp594-604
XixiangLv,HuiLi.ID-basedauthenticatedgroupkeyagreementfrombilinearmaps.Front.Comput.Sci.China,2010.2
ZHOUYe-jun,LIHui,MAJian-feng,SecureNetworkCodingAgainsttheContaminationandEavesdroppingAdversaries,ChineseJournalofElectronics,2009.7