Dr Nan Li

Dr Nan Li

Lecturer

School of Electrical Engineering and Computing

Career Summary

Biography

Nan Li received his Ph.D. degree from the University of Wollongong (UOW) in 2015. He worked as a research assistant and casual lecturer in UOW from 2014 to 2015, for the security of lightweight authentication protocols. Before joining the University of Newcastle, he was a full-time Post-Doctoral Fellow in Data61, Commonwealth Scientific and Industrial Research Organisation (CSIRO). He worked with different industrial partners, such as Boeing, in IoT security. Currently, he is a lecturer of the School of Electrical Engineering and Computing at the University of Newcastle. He has high-quality publications on international conferences and journals, such as IEEE ICDCS, ACNS, and The Computer Journal. Dr. Li also served as a reviewer and PC member of many international conferences. His research interests include IoT security, RFID security, lightweight authentication protocols, and applied cryptography. Recently, he also works in the trust management systems and privacy protection.

Qualifications

  • Doctor of Philosophy, University of Wollongong

Keywords

  • Applied cryptography
  • Authentication protocols
  • IoT security
  • Privacy protection
  • Trust management system

Languages

  • Mandarin (Mother)
  • English (Fluent)

Fields of Research

Code Description Percentage
080303 Computer System Security 80
080402 Data Encryption 20

Professional Experience

UON Appointment

Title Organisation / Department
Lecturer University of Newcastle
School of Electrical Engineering and Computing
Australia
Edit

Publications

For publications that are currently unpublished or in-press, details are shown in italics.


Journal article (3 outputs)

Year Citation Altmetrics Link
2018 Wei J, Wang X, Li N, Yang G, Mu Y, 'A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks', IEEE Access, 6 43776-43784 (2018)
DOI 10.1109/ACCESS.2018.2861430
Citations Scopus - 3Web of Science - 3
2015 Li N, Mu Y, Susilo W, Varadharajan V, 'Shared RFID ownership transfer protocols', COMPUTER STANDARDS & INTERFACES, 42 95-104 (2015) [C1]
DOI 10.1016/j.csi.2015.05.003
Citations Scopus - 7Web of Science - 4
Co-authors Vijay Varadharajan
2015 Li N, Mu Y, Susilo W, Guo F, Varadharajan V, 'Vulnerabilities of an ECC-based RFID authentication scheme', SECURITY AND COMMUNICATION NETWORKS, 8 3262-3270 (2015) [C1]
DOI 10.1002/sec.1250
Citations Scopus - 4Web of Science - 4
Co-authors Vijay Varadharajan

Conference (11 outputs)

Year Citation Altmetrics Link
2019 Chow YW, Susilo W, Wang J, Buckland R, Baek J, Kim J, Li N, 'Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes', Machine Learning for Cyber Security. Second International Conference, ML4CS 2019. Proceedings, Xi'an, China (2019) [E1]
DOI 10.1007/978-3-030-30619-9_23
2019 Wei J, Li N, 'Privacy-preserving and undeniable authentication for mobile RFID tags', 20th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2019, Washington, DC (2019) [E1]
DOI 10.1109/WoWMoM.2019.8792990
2019 Kim J, Susilo W, Guo F, Baek J, Li N, 'A new encoding framework for predicate encryption with non-linear structures in prime order groups', Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Columbia (2019) [E1]
DOI 10.1007/978-3-030-21568-2_20
2018 Tian Y, Li Y, Zhang Y, Li N, Yang G, Yu Y, 'DSH: Deniable secret handshake framework', Information Security Practice and Experience. 14th International Conference, ISPEC 2018. Proceedings, Tokyo, Japan (2018) [E1]
DOI 10.1007/978-3-319-99807-7_21
Citations Scopus - 1Web of Science - 1
2018 Tian Y, Li Y, Chen R, Li N, Liu X, Chang B, Yu X, 'Privacy-preserving biometric-based remote user authentication with leakage resilience', Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore (2018) [E1]
DOI 10.1007/978-3-030-01701-9_7
2017 Li N, Guo F, Mu Y, Susilo W, Nepal S, 'Fuzzy Extractors for Biometric Identification', Proceedings - International Conference on Distributed Computing Systems, Atlanta, Georgia (2017)
DOI 10.1109/ICDCS.2017.107
Citations Scopus - 5Web of Science - 3
2015 Li N, Mu Y, Susilo W, Varadharajan V, 'Anonymous yoking-group proofs', ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (2015) [E1]

Copyright © 2015 ACM. Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned ... [more]

Copyright © 2015 ACM. Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags can be proved to be scanned simultaneously. Grouping-proof, which is an extension of yoking-proofs, allows multiple tags to be proved together, while existing protocols cannot support multiple groups. In this paper, we introduce a novel concept called "yoking-group proofs". Additionally, we propose an anonymous yoking-proof protocol and an anonymous yoking-group proof protocol and prove their security in Universal Composability framework.

DOI 10.1145/2714576.2714609
Citations Scopus - 4
Co-authors Vijay Varadharajan
2014 Li N, Mu Y, Susilo W, Guo F, Varadharajan V, 'Privacy-Preserving Authorized RFID Authentication Protocols', RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, St Annes Coll, Oxford, ENGLAND (2014) [E1]
DOI 10.1007/978-3-319-13066-8_7
Citations Scopus - 9Web of Science - 3
Co-authors Vijay Varadharajan
2013 Li N, Mu Y, Susilo W, Varadharajan V, 'Secure RFID ownership transfer protocols', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013) [E1]

An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of... [more]

An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validity of the current tag ownership and the originality of supplier are most important. In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership. However, it is insufficient against an active attacker, since tags are usually lack of tamper-proof protections. Ownership transfer relies on a successful verification of tag's supplier and current ownership. In this paper, we formally define the security model of ownership transfer protocols and propose a secure ownership transfer protocol. In our scheme, current owner provides a new owner with the evidence of transfer and a proof of tag origin. Key management becomes easy in our system, since the one asymmetric verification key of the owner can be used to verify multiple tags that belong to the owner. © 2013 Springer-Verlag.

DOI 10.1007/978-3-642-38033-4_14
Citations Scopus - 3
Co-authors Vijay Varadharajan
2012 Li N, Mu Y, Susilo W, 'Efficient self-certified signatures with batch verification', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2012)

To eliminate the need of public-key certificates from Public Key Infrastructure (PKI) and the problem of key escrow in identity-based cryptography, the concept of self-certified p... [more]

To eliminate the need of public-key certificates from Public Key Infrastructure (PKI) and the problem of key escrow in identity-based cryptography, the concept of self-certified public key was put forth by Girault. In this paper, we propose an efficient and novel self-certified signature scheme, which requires only one modular multiplication in signing with pre-computation. One of features of our scheme lies in its batch verification in both single-signer and multi-signer settings. Pairing computations in the batch verification are independent from the number of signatures. Our scheme is proven secure in the random oracle model. © 2012 Springer-Verlag Berlin Heidelberg.

DOI 10.1007/978-3-642-34704-7-14
Citations Scopus - 3
2011 Li N, Mu Y, Susilo W, Guo F, 'Self-certified ring signatures', Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 (2011)

We present a new notion, Self-certified Ring Signature (SCRS), to provide an alternative solution to the certificate management problem in ring signatures and eliminate private ke... [more]

We present a new notion, Self-certified Ring Signature (SCRS), to provide an alternative solution to the certificate management problem in ring signatures and eliminate private key escrow problem in identity based ring signatures. Our scheme captures all features of ring signatures and exhibit- s the advantages such as low storage, communication and computation cost. The main contribution of this paper is a precise definition of self-certified ring signatures along with a concrete construction. We also provide a security model of SCRS and a security proof of our scheme. Copyright 2011 ACM.

DOI 10.1145/1966913.1966966
Citations Scopus - 3
Show 8 more conferences
Edit

Grants and Funding

Summary

Number of grants 1
Total funding $93,875

Click on a grant title below to expand the full details for that specific grant.


20171 grants / $93,875

Security and Trust in IoT Infrastructures$93,875

Funding body: CSIRO - Commonwealth Scientific and Industrial Research Organisation

Funding body CSIRO - Commonwealth Scientific and Industrial Research Organisation
Project Team Professor Vijay Varadharajan, Doctor Nan Li
Scheme Research Grant
Role Investigator
Funding Start 2017
Funding Finish 2020
GNo G1701323
Type Of Funding C2110 - Aust Commonwealth - Own Purpose
Category 2110
UON Y
Edit

Dr Nan Li

Position

Lecturer
Cyber Security
School of Electrical Engineering and Computing
Faculty of Engineering and Built Environment

Contact Details

Email nan.li@newcastle.edu.au
Phone 02 49 216503

Office

Room ES222
Location Engineering Precinct CALLAGHAN CAMPUS

,
Edit