Phu Dung Le

According to our database1, Phu Dung Le authored at least 60 papers between 1995 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A Formal Model for an Ideal CFI.
Proceedings of the Information Security Practice and Experience, 2017

Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

2016
A Dynamic Security Model for Addressing Hacking Risk Factors.
Proceedings of the Information Systems Development: Complexity in Information Systems Development, 2016

A network defense system for detecting and preventing potential hacking attempts.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
A Hybrid Mobile Authentication Model for Ubiquitous Networking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Structuring Concept for Securing Modern Day Computing Systems.
Proceedings of the International Conference on Computational Science, 2015

An evolving trust paradigm for enforcing computing system security.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

2014
An Explicit Trust Model Towards Better System Security.
CoRR, 2014

2013
A Defense Security Approach for Infrastructures against Hacking.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Analysis of mobile authentication protocols by SVO logic.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

2010
Novel Hybrid Group Key Agreement for Sensitive Information Systems.
J. Convergence Inf. Technol., 2010

An Individual and Group Authentication Model for Wireless Network Services.
J. Convergence Inf. Technol., 2010

Dynamic Key Cryptography and Applications.
Int. J. Netw. Secur., 2010

Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens
CoRR, 2010

Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping
CoRR, 2010

Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010

A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010

A New Holistic Security Approach for Government Critical Systems: Flooding Prevention.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A Framework to Measure the Effectiveness of Image Representations.
Proceedings of the 2010 International Conference on Image Processing, 2010

Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

An Authentication Model for Wireless Network Services.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Information Security Threats Classification Pyramid.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management.
Int. J. Comput. Sci. Appl., 2009

Multicasting Key Management in Wireless Networks.
Proceedings of the NBiS 2009, 2009

A Membership-Oriented Group Key Management for Application Services.
Proceedings of the NBiS 2009, 2009

Package-Role Based Authorization Control Model for Wireless Network Services.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Fraudulent Internet Banking Payments Prevention using Dynamic Key.
J. Networks, 2008

A Study of Wavelets-Based Image Representations and Their Effectiveness.
Proceedings of the 2008 International Conference on Image Processing, 2008

Dynamic Keys Based Sensitive Information System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Group Authentication Model for Wireless Network Services Based on Group Key Management.
Proceedings of the ICEIS 2008, 2008

A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems.
Proceedings of the 2008 International Conference on Security & Management, 2008

A Method for Authentication Services in Wireless Networks.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Security Analysis for Internet Banking Models.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection.
Proceedings of the ICEIS 2007, 2007

Hybrid Group Key Management Scheme for Secure Wireless Multicast.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
An Efficient and Secure Code Sharing for Peer-to-Peer Communications.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Efficient Group Key Management in Wireless Networks.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Group Key Management in Wireless Networks Using Session Keys.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

The design and implementation of a wireless payment system.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
Wireless Internet Payment System Using Smart Cards.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
A Limited-Used Key Generation Scheme for Internet Transactions.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Secure Prepaid Wireless Micropayment Protocol.
Proceedings of the Security In Information Systems, 2004

Accountability Logic for Mobile Payment Protocols.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Secure Account-Based Mobile Payment Protocol.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment.
Proceedings of the iiWAS'2004, 2004

2003
Lightweight Mobile Credit-Card Payment Protocol.
Proceedings of the Progress in Cryptology, 2003

2002
Guard: A Tool for Migrating Scientific Applications to the .NET Framework.
Proceedings of the Computational Science - ICCS 2002, 2002

2001
A Proposed Alternative for Layer 2 of Neocognitron.
Proceedings of the IASTED International Conference on Visualization, 2001

1998
A measure for image quality.
Proceedings of the 1998 ACM symposium on Applied Computing, 1998

Multi Level Browsing for Efficient Image Transmission.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1996
Novel parallel join algorithms for grid files.
Proceedings of the 3rd International Conference on High Performance Computing, 1996

Performance Evaluation of Tree-Based Structures.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996

1995
A Tool for Resource and Load Sharing in Heterogeneous Environments.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995


  Loading...