Tri Van Le

Orcid: 0009-0002-3717-9123

According to our database1, Tri Van Le authored at least 21 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Resonance Frequency-Based Desulfator Design for Lead-Acid Batteries.
Proceedings of the 6th International Conference on Electronics, 2023

2009
Universally Composable RFID Identification and Authentication Protocols.
ACM Trans. Inf. Syst. Secur., 2009

2007
Forward-secure RFID Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2007

Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks.
Ad Hoc Networks, 2007

Universally composable and forward-secure RFID authentication and authenticated key exchange.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Universally Composable and Forward Secure RFID Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2006

Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols.
IACR Cryptol. ePrint Arch., 2006

Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Towards Provable Security for Ubiquitous Applications.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2004
Secure Multipath Communication in Mobile Ad hoc Networks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Complementation-Like and Cyclic Properties of AES Round Functions.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

2003
Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks.
IACR Cryptol. ePrint Arch., 2003

Efficient Provably Secure Public Key Steganography.
IACR Cryptol. ePrint Arch., 2003

Novel Cyclic and Algebraic Properties of AES.
IACR Cryptol. ePrint Arch., 2003

Short c-Secure Fingerprinting Codes.
Proceedings of the Information Security, 6th International Conference, 2003

Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes.
Proceedings of the Information Security, 6th International Conference, 2003

2002
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2000
Moiré cryptography.
Proceedings of the CCS 2000, 2000

1999
Nonbinary Audio Cryptography.
Proceedings of the Information Hiding, Third International Workshop, 1999

How to Prove That a Committed Number Is Prime.
Proceedings of the Advances in Cryptology, 1999


  Loading...