Phu Dung Le
According to our database1,
Phu Dung Le
authored at least 60 papers
between 1995 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
2016
Proceedings of the Information Systems Development: Complexity in Information Systems Development, 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the International Conference on Computational Science, 2015
Proceedings of the IEEE Congress on Evolutionary Computation, 2015
2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
2011
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011
Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
2010
J. Convergence Inf. Technol., 2010
J. Convergence Inf. Technol., 2010
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens
CoRR, 2010
Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping
CoRR, 2010
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
A Framework to Measure the Effectiveness of Image Representations.
Proceedings of the 2010 International Conference on Image Processing, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management.
Int. J. Comput. Sci. Appl., 2009
Proceedings of the NBiS 2009, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
A Study of Wavelets-Based Image Representations and Their Effectiveness.
Proceedings of the 2008 International Conference on Image Processing, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
A Group Authentication Model for Wireless Network Services Based on Group Key Management.
Proceedings of the ICEIS 2008, 2008
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems.
Proceedings of the 2008 International Conference on Security & Management, 2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection.
Proceedings of the ICEIS 2007, 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
The design and implementation of a wireless payment system.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006
2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
A Secure Prepaid Wireless Micropayment Protocol.
Proceedings of the Security In Information Systems, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment.
Proceedings of the iiWAS'2004, 2004
2003
Proceedings of the Progress in Cryptology, 2003
2002
Proceedings of the Computational Science - ICCS 2002, 2002
2001
A Proposed Alternative for Layer 2 of Neocognitron.
Proceedings of the IASTED International Conference on Visualization, 2001
1998
Proceedings of the 1998 ACM symposium on Applied Computing, 1998
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998
1996
Proceedings of the 3rd International Conference on High Performance Computing, 1996
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996
1995
A Tool for Resource and Load Sharing in Heterogeneous Environments.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995