The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Phu Dung Le: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xianping Wu, Osama Dandash, Phu Dung Le, Bala Srinivasan
    The design and implementation of a wireless payment system. [Citation Graph (0, 0)][DBLP]
    COMSWARE, 2006, pp:- [Conf]
  2. Nguyen Tran, Phu Dung Le, Bala Srinivasan, Bob Sier
    Performance Evaluation of Tree-Based Structures. [Citation Graph (0, 0)][DBLP]
    DEXA, 1996, pp:845-854 [Conf]
  3. Phu Dung Le, Bala Srinivasan, Santosh Kulkarni
    Multi Level Browsing for Efficient Image Transmission. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:373-378 [Conf]
  4. David Abramson, Greg Watson, Phu Dung Le
    Guard: A Tool for Migrating Scientific Applications to the .NET Framework. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2002, pp:834-843 [Conf]
  5. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  6. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    Lightweight Mobile Credit-Card Payment Protocol. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:295-308 [Conf]
  7. Osama Dandash, Xianping Wu, Phu Dung Le
    Wireless Internet Payment System Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:16-21 [Conf]
  8. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    A Secure Account-Based Mobile Payment Protocol. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:35-39 [Conf]
  9. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    Accountability Logic for Mobile Payment Protocols. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:40-44 [Conf]
  10. Dhilak Damodaran, Rohit Singh, Phu Dung Le
    Group Key Management in Wireless Networks Using Session Keys. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:402-407 [Conf]
  11. Yiling Wang, Dhilak Damodaran, Phu Dung Le
    Efficient Group Key Management in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:432-439 [Conf]
  12. Xianping Wu, Osama Dandash, Phu Dung Le
    The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:458-463 [Conf]
  13. Wei Wu, Phu Dung Le
    An Efficient and Secure Code Sharing for Peer-to-Peer Communications. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:476-481 [Conf]
  14. Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan
    A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:83-88 [Conf]
  15. Phu Dung Le, Bala Srinivasan
    A Tool for Resource and Load Sharing in Heterogeneous Environments. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Systems, 1995, pp:187-192 [Conf]
  16. Phu Dung Le, Bala Srinivasan, Salahadin Mohammed, Santosh Kulkarni, Campbell Wilson
    A measure for image quality. [Citation Graph (0, 0)][DBLP]
    SAC, 1998, pp:513-519 [Conf]
  17. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    A Secure Prepaid Wireless Micropayment Protocol. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:104-113 [Conf]
  18. Michael Tran, Siddheswar Ray, Phu Dung Le
    A Proposed Alternative for Layer 2 of Neocognitron. [Citation Graph (0, 0)][DBLP]
    VIIP, 2001, pp:554-559 [Conf]
  19. Supakorn Kungpisdan, Phu Dung Le, Bala Srinivasan
    A Limited-Used Key Generation Scheme for Internet Transactions. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:302-316 [Conf]
  20. Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan
    Hybrid Group Key Management Scheme for Secure Wireless Multicast. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:346-351 [Conf]

  21. Package-Role Based Authorization Control Model for Wireless Network Services. [Citation Graph (, )][DBLP]


  22. Information Security Threats Classification Pyramid. [Citation Graph (, )][DBLP]


  23. An Authentication Model for Wireless Network Services. [Citation Graph (, )][DBLP]


  24. Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. [Citation Graph (, )][DBLP]


  25. A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems. [Citation Graph (, )][DBLP]


  26. A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection. [Citation Graph (, )][DBLP]


  27. A Group Authentication Model for Wireless Network Services Based on Group Key Management. [Citation Graph (, )][DBLP]


  28. Security Analysis for Internet Banking Models. [Citation Graph (, )][DBLP]


  29. Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach. [Citation Graph (, )][DBLP]


  30. A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers. [Citation Graph (, )][DBLP]


  31. A Study of Wavelets-Based Image Representations and Their Effectiveness. [Citation Graph (, )][DBLP]


  32. A Membership-Oriented Group Key Management for Application Services. [Citation Graph (, )][DBLP]


  33. Multicasting Key Management in Wireless Networks. [Citation Graph (, )][DBLP]


  34. Dynamic Keys Based Sensitive Information System. [Citation Graph (, )][DBLP]


  35. Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping [Citation Graph (, )][DBLP]


  36. Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens [Citation Graph (, )][DBLP]


Search in 0.042secs, Finished in 0.043secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002