default search action
Phu Dung Le
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c52]Orhio Mark Creado, Phu Dung Le:
Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper). ISPEC 2017: 648-659 - [c51]Sepehr Minagar, Balasubramaniam Srinivasan, Phu Dung Le:
A Formal Model for an Ideal CFI. ISPEC 2017: 707-726 - 2016
- [c50]Saad Alsunbul, Phu Dung Le, Jefferson Tan, Bala Srinivasan:
A network defense system for detecting and preventing potential hacking attempts. ICOIN 2016: 449-454 - [c49]Saad Abdullah Alsunbul, Phu Dung Le, Jan Newmarch, Jefferson Tan:
A Dynamic Security Model for Addressing Hacking Risk Factors. ISD 2016 - 2015
- [c48]Orhio Mark Creado, Phu Dung Le, Jan Newmarch, Jefferson Tan:
An evolving trust paradigm for enforcing computing system security. CEC 2015: 2595-2602 - [c47]Orhio Mark Creado, Phu Dung Le, Jan Newmarch, Jefferson Tan:
A Structuring Concept for Securing Modern Day Computing Systems. ICCS 2015: 2764-2768 - [c46]Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Mohammed A. Alhabeeb, Waleed Alfehaid:
A Hybrid Mobile Authentication Model for Ubiquitous Networking. TrustCom/BigDataSE/ISPA (1) 2015: 360-367 - 2014
- [i3]Orhio Mark Creado, Bala Srinivasan, Phu Dung Le, Jefferson Tan:
An Explicit Trust Model Towards Better System Security. CoRR abs/1403.0282 (2014) - 2013
- [c45]Saad Alsunbul, Phu Dung Le, Jefferson Tan:
A Defense Security Approach for Infrastructures against Hacking. TrustCom/ISPA/IUCC 2013: 1600-1606 - 2012
- [c44]Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Campbell Wilson, Vishv Malhotra:
Analysis of mobile authentication protocols by SVO logic. SECURIT 2012: 126-134 - 2011
- [c43]Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique. ISPA 2011: 262-269 - [c42]Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model. ISPA 2011: 318-323 - [c41]Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks. NCA 2011: 285-288 - 2010
- [j5]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan:
Dynamic Key Cryptography and Applications. Int. J. Netw. Secur. 10(3): 161-174 (2010) - [j4]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Bala Srinivasan, Huamei Qi:
Novel Hybrid Group Key Agreement for Sensitive Information Systems. J. Convergence Inf. Technol. 5(1): 69-81 (2010) - [j3]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:
An Individual and Group Authentication Model for Wireless Network Services. J. Convergence Inf. Technol. 5(1): 82-94 (2010) - [c40]Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Information Security Threats Classification Pyramid. AINA Workshops 2010: 208-213 - [c39]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:
An Authentication Model for Wireless Network Services. AINA 2010: 996-1003 - [c38]Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. AINA 2010: 1047-1053 - [c37]Talal Alharbi, Abdullah Mohammed Almuhaideb, Phu Dung Le:
Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol. ICICS 2010: 126-139 - [c36]Minh Viet Le, Phu Dung Le, Balasubramaniam Srinivasan:
A Framework to Measure the Effectiveness of Image Representations. IPCV 2010: 41-46 - [c35]Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications. MobiQuitous 2010: 224-236 - [c34]Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention. ISA 2010: 249-264 - [c33]Mohammed A. Alhabeeb, Saad Alsunbul, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers. SNPD 2010: 49-54 - [c32]Abdullah Mohammed Almuhaideb, Talal Alharbi, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach. SNPD 2010: 143-148 - [i2]Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le:
Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping. CoRR abs/1002.3322 (2010) - [i1]Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens. CoRR abs/1003.5619 (2010)
2000 – 2009
- 2009
- [j2]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management. Int. J. Comput. Sci. Appl. 6(3): 57-74 (2009) - [c31]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson:
Package-Role Based Authorization Control Model for Wireless Network Services. ARES 2009: 475-480 - [c30]Yiling Wang, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan, Vishv Malhotra:
Multicasting Key Management in Wireless Networks. NBiS 2009: 234-239 - [c29]Huy Hoang Ngo, Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan, Vishv Malhotra:
A Membership-Oriented Group Key Management for Application Services. NBiS 2009: 240-245 - 2008
- [j1]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
Fraudulent Internet Banking Payments Prevention using Dynamic Key. J. Networks 3(1): 25-34 (2008) - [c28]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson:
A Method for Authentication Services in Wireless Networks. AMCIS 2008: 177 - [c27]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems. Security and Management 2008: 93-99 - [c26]Huy Hoang Ngo, Xianping Wu, Phu Dung Le:
A Group Authentication Model for Wireless Network Services Based on Group Key Management. ICEIS (3-2) 2008: 182-188 - [c25]Xianping Wu, Phu Dung Le, Balasubramaniam Srinivasan:
Dynamic Keys Based Sensitive Information System. ICYCS 2008: 1895-1901 - [c24]Minh Viet Le, Phu Dung Le, Balasubramaniam Srinivasan:
A Study of Wavelets-Based Image Representations and Their Effectiveness. IPCV 2008: 638-642 - 2007
- [c23]Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan:
Hybrid Group Key Management Scheme for Secure Wireless Multicast. ACIS-ICIS 2007: 346-351 - [c22]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection. ICEIS (4) 2007: 57-62 - [c21]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. ITNG 2007: 83-88 - [c20]Osama Dandash, Phu Dung Le, Bala Srinivasan:
Security Analysis for Internet Banking Models. SNPD (3) 2007: 1141-1146 - 2006
- [c19]Xianping Wu, Osama Dandash, Phu Dung Le, Bala Srinivasan:
The design and implementation of a wireless payment system. COMSWARE 2006 - [c18]Dhilak Damodaran, Rohit Singh, Phu Dung Le:
Group Key Management in Wireless Networks Using Session Keys. ITNG 2006: 402-407 - [c17]Yiling Wang, Dhilak Damodaran, Phu Dung Le:
Efficient Group Key Management in Wireless Networks. ITNG 2006: 432-439 - [c16]Xianping Wu, Osama Dandash, Phu Dung Le:
The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme. ITNG 2006: 458-463 - [c15]Wei Wu, Phu Dung Le:
An Efficient and Secure Code Sharing for Peer-to-Peer Communications. ITNG 2006: 476-481 - 2005
- [c14]Osama Dandash, Xianping Wu, Phu Dung Le:
Wireless Internet Payment System Using Smart Cards. ITCC (2) 2005: 16-21 - 2004
- [c13]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment. iiWAS 2004 - [c12]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
A Secure Account-Based Mobile Payment Protocol. ITCC (1) 2004: 35-39 - [c11]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
Accountability Logic for Mobile Payment Protocols. ITCC (1) 2004: 40-44 - [c10]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
A Secure Prepaid Wireless Micropayment Protocol. WOSIS 2004: 104-113 - [c9]Supakorn Kungpisdan, Phu Dung Le, Bala Srinivasan:
A Limited-Used Key Generation Scheme for Internet Transactions. WISA 2004: 302-316 - 2003
- [c8]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
Lightweight Mobile Credit-Card Payment Protocol. INDOCRYPT 2003: 295-308 - 2002
- [c7]David Abramson, Greg Watson, Phu Dung Le:
Guard: A Tool for Migrating Scientific Applications to the .NET Framework. International Conference on Computational Science (2) 2002: 834-843 - 2001
- [c6]Michael Tran, Siddheswar Ray, Phu Dung Le:
A Proposed Alternative for Layer 2 of Neocognitron. VIIP 2001: 554-559
1990 – 1999
- 1998
- [c5]Phu Dung Le, Bala Srinivasan, Santosh Kulkarni:
Multi Level Browsing for Efficient Image Transmission. DEXA Workshop 1998: 373-378 - [c4]Phu Dung Le, Bala Srinivasan, Salahadin Mohammed, Santosh Kulkarni, Campbell Wilson:
A measure for image quality. SAC 1998: 513-519 - 1996
- [c3]Nguyen Tran, Phu Dung Le, Bala Srinivasan, Bob Sier:
Performance Evaluation of Tree-Based Structures. DEXA 1996: 845-854 - [c2]Salahadin Mohammed, Balasubramaniam Srinivasan, M. Bozyigit, Phu Dung Le:
Novel parallel join algorithms for grid files. HiPC 1996: 144-149 - 1995
- [c1]Phu Dung Le, Bala Srinivasan:
A Tool for Resource and Load Sharing in Heterogeneous Environments. Parallel and Distributed Computing and Systems 1995: 187-192
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint