LI LU

 

 

 

Post Doctoral Fellow,
Department of Computer Science
Hong Kong University of Science and Technology
Tel: (+852)6907-1801    Email: luli@cse.ust.hk  Office: 2602

Ph.D. Chinese Academy of Sciences
M.S.     Zhejiang University
B.S.      Zhejiang University

Li Lu received his BS and MS degrees at Zhejiang University in 2000 and 2003, respectively. He earned his Ph.D. degree in Information Security from Chinese Academy of Sciences in 2007. He is now a Post-doctoral Fellow in the Department of Computer Science and Engineering at Hong Kong University of Science and Technology. He is a member of the IEEE Computer Society.

   

 

Research Interests

     

      Applied cryptography, Network security, Pervasive computing and Sensor networks.

Selected Refereed Publications

  Recent Journals:

  1. Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng HuaiLionel M Ni, and Jian Ma, "Pseudo Trust: Zero-Knowledge Authentication in Anonymous Peer-to-Peer Protocols", IEEE Transactions on Parallel and Distributed Systems (TPDS),Vol 19, No. 10, October 2008, Pages 1325-1337.(PDF)
  2. Li Lu, Lei Hu, “Pairing-Based Multi-Recipient Public Key Encryption”, Journal of Software, Vol. 19, No. 8, Pages 2159-2166 (in Chinese).
  3. Jianyu Li, Lei Hu, Li Lu, Weijia Wang, “A Voting-based File Authentication Protocol”, Journal of Computer Science, Vol. 33, No. 8, 2006 (in Chinese).
  4. Lei Hu, Xuejun Li, Li Lu, “The Identity-based Cryptography System and the Tate Pairing of Elliptic Curve”, Journal of Netinfo Security, No. 4, 2005 (in Chinese).
  5. Li Lu, Lei Hu, “Improved ID-Based Encryption”, Journal of the Graduate School of the Chinese Academy of Sciences, Vol. 22, No. 6, 2005 (in Chinese).
  6. Li Lu, Gangfeng Yan, “A New Algorithm of Automatic Color Permutation Based on Color Quantization and Its Applications”, Journal of Computer Engineering and Applications, Vol. 39, No. 20, 2003 (in Chinese).
  Recent Conferences: 
  1. Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu, “ACTION: Breaking the Privacy Barrier for RFID Systems”, The 28th Conference on Computer Communications (Infocom'09), Rio de Janeiro, Brazil, 2009. (PDF)
  2. Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jianyu Li, Lionel M. Ni, “Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols”, the 21st IEEE International Parallel & Distributed Processing Symposium (IPDPS’07), Long Beach, USA, March, 2007.(PDF,PPT)
  3. Li Lu, Yunhao Liu, Lei Hu, Jinsong Han, Lionel. M. Ni, “A Dynamic Key-Updating Private Authentication Protocol for RFID Systems”, the fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom’07), New York, USA, March, 2007.(PDF,PPT)
  4. Li Lu, Lei Hu, “Pairing-Based Multi-Recipient Public Key Encryption”, The 2006 International Conference on Security & Management (SAM’06), Las Vegas, Nevada, USA, June, 2006.(PDF)
  5. Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, and Abhishsek Patil, '' A Random Walk Based Anonymous Peer-to-Peer Protocol Design'', International Conference on Computer Networks and Mobile Computing (ICCNMC’05), Zhangjiajie, China, August, 2005.
  6. Nigang Sun, Lei Hu, Li Lu, Xuyun Nie. A New Prime-Phase Sequence Family with Low Correlation and Large Size. Proceedings of International Workshop on Signal Design and Its Applications in Communications, 2007, Chengdu: IEEE Press, pp. 79--83.
  7. Fen Liu, Lei Hu, Li Lu, Weijia Wang, "Privacy-preserving Authentication with Low Computational Overhead for RFID Systems", In proceedings of  International Workshop on Secure and Multimodal Pervasive Environments, SMPE workshop of Conference on Security and Privacy in Communication Networks 2007.

Patent

  • Li Lu, Yunhao Liu, Jinsong Han, “RFID Privacy-Preserving Authentication System and Method”, US provisional Patent, Application No. 61/136, 257 (Ref.: TTC.PA.0391).
  • Lei Hu, Li Lu, Jinsong Han, Yunhao Liu, Lionel M. Ni, “A Private Authentication Method in Radio Frequency Identification Systems”, China Patent, No. 200710003363.0

Book Chapters

·         Li Lu, Lei Hu, “Mathematical Background”, Book Chapter, Handbook of Applied Cryptography, Publishing House of Electronics Industry, 2005.

·         Li Lu, Lei Hu, “Number-Theoretic Reference Problems”, Book Chapter, Handbook of Applied Cryptography, Publishing House of Electronics Industry, 2005.

Professional Activities

·         Postdoctoral Fellow in Department of Computer Science and Engineering, Hong Kong University of Science and Technology, from 09-2007 to 09-2009.

·         Visiting Scholar in Department of Computer Science and Engineering, Hong Kong University of Science and Technology, from 04-2006 to 07-2006.

·         Technical Program Committee Member for IEEE The 4th International Conference on Communications, Circuits and Systems (ICCCAS2006)

·         Student Member, IEEE Computer Society and Communications Society (2007 – Present)

·         Reviewer for Journals:

Journal of Pervasive and Mobile Computing

Journal of Computer Science and Technology

Journal of Software

IEEE Transactions on Parallel and Distributed Systems

Frontiers of Computer Science in China

Wireless Communications and Mobile Computing

·         Reviewer for Conferences and Proposals:

Research Grant Committee, Hong Kong.

Mobihoc 08 09

IEEE ICDCS 07

IEEE INFOCOM 07 08

IEEE PerCom 07 08 09

IEEE SUTC 06 08

ICPP 08

Thesis

The Provable Privacy-Preserving and Private Authentication in Distributed Networks

Awards:

October 2001       Guanghua Fellowship, Zhejiang Unverisity, P.R. China

Webstats4U - Free web site statistics