The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tri Van Le: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mike Burmester, Tri Van Le, Breno de Medeiros
    Towards Provable Security for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:295-312 [Conf]
  2. Mike Burmester, Tri Van Le, Alec Yasinsac
    Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2004, pp:96-107 [Conf]
  3. Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Yvo Desmedt
    Complementation-Like and Cyclic Properties of AES Round Functions. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:128-141 [Conf]
  4. Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan
    How to Prove That a Committed Number Is Prime. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:208-218 [Conf]
  5. Yvo Desmedt, Tri Van Le
    Moiré cryptography. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:116-124 [Conf]
  6. Tri Van Le, Mike Burmester, Breno de Medeiros
    Universally composable and forward-secure RFID authentication and authenticated key exchange. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:242-252 [Conf]
  7. Tri Van Le, Yvo Desmedt
    Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:213-225 [Conf]
  8. Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater
    Nonbinary Audio Cryptography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:478-489 [Conf]
  9. Yvo Desmedt, Kaoru Kurosawa, Tri Van Le
    Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:396-407 [Conf]
  10. Tri Van Le, Mike Burmester, Jiangyi Hu
    Short c-Secure Fingerprinting Codes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:422-427 [Conf]
  11. Mike Burmester, Tri Van Le
    Secure Multipath Communication in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:405-409 [Conf]
  12. Tri Van Le, Kaoru Kurosawa
    Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:297-313 [Conf]
  13. Mike Burmester, Tri Van Le, Alec Yasinsac
    Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:3, pp:313-323 [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002