Search the dblp DataBase
Tri Van Le :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mike Burmester , Tri Van Le , Breno de Medeiros Towards Provable Security for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:295-312 [Conf ] Mike Burmester , Tri Van Le , Alec Yasinsac Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2004, pp:96-107 [Conf ] Tri Van Le , Rüdiger Sparr , Ralph Wernsdorf , Yvo Desmedt Complementation-Like and Cyclic Properties of AES Round Functions. [Citation Graph (0, 0)][DBLP ] AES Conference, 2004, pp:128-141 [Conf ] Tri Van Le , Khanh Quoc Nguyen , Vijay Varadharajan How to Prove That a Committed Number Is Prime. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:208-218 [Conf ] Yvo Desmedt , Tri Van Le Moiré cryptography. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:116-124 [Conf ] Tri Van Le , Mike Burmester , Breno de Medeiros Universally composable and forward-secure RFID authentication and authenticated key exchange. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:242-252 [Conf ] Tri Van Le , Yvo Desmedt Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:213-225 [Conf ] Yvo Desmedt , Tri Van Le , Jean-Jacques Quisquater Nonbinary Audio Cryptography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:478-489 [Conf ] Yvo Desmedt , Kaoru Kurosawa , Tri Van Le Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:396-407 [Conf ] Tri Van Le , Mike Burmester , Jiangyi Hu Short c-Secure Fingerprinting Codes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:422-427 [Conf ] Mike Burmester , Tri Van Le Secure Multipath Communication in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:405-409 [Conf ] Tri Van Le , Kaoru Kurosawa Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:297-313 [Conf ] Mike Burmester , Tri Van Le , Alec Yasinsac Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:3, pp:313-323 [Journal ] Search in 0.002secs, Finished in 0.002secs