Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework
P Peris-Lopez, TL Lim, T Li - 2008 IEEE/IFIP International …, 2008 - ieeexplore.ieee.org
… In the first attack, Lim and Li showed how a passive attacker can perform correlations
over the eavesdropped information to recover the access password from only a single …
over the eavesdropped information to recover the access password from only a single …
[PDF][PDF] Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
P Peris-Lopez, T Li, TL Lim… - … on RFID Security, 2008 - s239656364.mialojamiento.es
… Tong-Lee Lim2 Julio C. Hernandez-Castro1 … TL Lim, and T. Li, “Addressing the Weakness
in a Lightweight RFID Tag-Reader Mutual Authentication Scheme”, in Proceedings of the …
in a Lightweight RFID Tag-Reader Mutual Authentication Scheme”, in Proceedings of the …
Randomized bit encoding for stronger backward channel protection in RFID systems
TL Lim, T Li, SL Yeo - 2008 Sixth Annual IEEE International …, 2008 - ieeexplore.ieee.org
In this paper, we introduce a randomized bit encoding scheme that can strengthen the
privacy protection on RFID tags. This scheme is used together with the backward channel …
privacy protection on RFID tags. This scheme is used together with the backward channel …
CDK7-dependent transcriptional addiction in triple-negative breast cancer
Y Wang, T Zhang, N Kwiatkowski, BJ Abraham, TI Lee… - Cell, 2015 - cell.com
Triple-negative breast cancer (TNBC) is a highly aggressive form of breast cancer that
exhibits extremely high levels of genetic complexity and yet a relatively uniform transcriptional …
exhibits extremely high levels of genetic complexity and yet a relatively uniform transcriptional …
Secure RFID identification and authentication with triggered hash chain variants
In this paper, we propose two RFID identification and authentication schemes based on the
previously proposed triggered hash chain scheme by Henrici and Muller. The schemes are …
previously proposed triggered hash chain scheme by Henrici and Muller. The schemes are …
A cross-layer framework for privacy enhancement in RFID systems
TL Lim, T Li, SL Yeo - Pervasive and Mobile Computing, 2008 - Elsevier
In this paper, we introduce a cross-layer framework for enhancing privacy in RFID systems.
The framework relies on mechanisms in the physical (PHY) layer, as well as the medium …
The framework relies on mechanisms in the physical (PHY) layer, as well as the medium …
Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme
TL Lim, T Li - IEEE GLOBECOM 2007-IEEE Global …, 2007 - ieeexplore.ieee.org
A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme
was recently proposed as an improvement over the original authentication protocol …
was recently proposed as an improvement over the original authentication protocol …
Skin prick test reactivity to common aeroallergens in asthmatic patients with and without rhinitis
…, CMEEM WONG, KIMH LIM, TC LEE - …, 2002 - Wiley Online Library
Objective: The aim of this study was to investigate the prevalence of skin prick test (SPT)
reactivity to common aeroallergens among Malaysian asthmatic patients with and without rhinitis…
reactivity to common aeroallergens among Malaysian asthmatic patients with and without rhinitis…
Synthesis of ultrasensitive magnetic resonance contrast agents for cancer imaging using PEG-fatty acid
…, TI Lee, J Lee, EK Lim, W Hyung, CH Lee… - Chemistry of …, 2007 - ACS Publications
Diagnosis of cancer in the early stages requires sensitive magnetic resonance (MR) probes
to detect low concentrations of magnetic substances. In this study, ultrasensitive magnetic …
to detect low concentrations of magnetic substances. In this study, ultrasensitive magnetic …
A temporal logic specification interface for automata-theoretic finitary control synthesis
KT Seow, M Gai, TL Lim - Proceedings of the 2005 IEEE …, 2005 - ieeexplore.ieee.org
This paper presents a correct and complete algorithm that translates propositional linear
time temporal logic (PTL) formulae to event-based automata for finitary control synthesis. It …
time temporal logic (PTL) formulae to event-based automata for finitary control synthesis. It …