Name
Affiliation
Papers
PHU DUNG LE
Monash Univ, Sch Network Comp, Clayton, Vic 3168, Australia
53
Collaborators
Citations 
PageRank 
33
161
24.04
Referers 
Referees 
References 
275
625
448
Search Limit
100625
Title
Citations
PageRank
Year
A Dynamic Security Model for Addressing Hacking Risk Factors.00.342016
A Structuring Concept For Securing Modern Day Computing Systems00.342015
A Hybrid Mobile Authentication Model for Ubiquitous Networking00.342015
An Evolving Trust Paradigm For Enforcing Computing System Security00.342015
An Explicit Trust Model Towards Better System Security.10.372014
Analysis of mobile authentication protocols by SVO logic10.352012
Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model20.372011
Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique20.372011
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks20.362011
Information Security Threats Classification Pyramid70.742010
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention.00.342010
An Authentication Model for Wireless Network Services00.342010
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers20.372010
Dynamic Key Cryptography and Applications50.652010
A Framework to Measure the Effectiveness of Image Representations00.342010
Novel Hybrid Group Key Agreement for Sensitive Information Systems00.342010
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications.30.392010
Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping20.372010
An Individual and Group Authentication Model for Wireless Network Services120.982010
Securing mobile access in ubiquitous networking via non-roaming agreement protocol10.362010
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance20.412010
Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach20.372010
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens20.392010
Multicasting Key Management in Wireless Networks00.342009
A Membership-Oriented Group Key Management for Application Services10.372009
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management10.462009
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems00.342008
A Study of Wavelets-Based Image Representations and Their Effectiveness00.342008
A Method for Authentication Services in Wireless Networks.30.432008
Fraudulent Internet Banking Payments Prevention using Dynamic Key70.562008
Dynamic Keys Based Sensitive Information System50.452008
A methodology for deriving objective image comparison metrics00.342007
Security Analysis for Internet Banking Models50.472007
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention10.372007
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection10.362007
The design & implementation of a wireless payment system10.352006
The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme00.342006
Group Key Management in Wireless Networks Using Session Keys50.482006
Efficient Group Key Management in Wireless Networks20.392006
An Efficient and Secure Code Sharing for Peer-to-Peer Communications00.342006
Wireless Internet Payment System Using Smart Cards30.452005
A limited-used key generation scheme for internet transactions120.742004
A Secure Account-Based Mobile Payment Protocol271.602004
A Secure Prepaid Wireless Micropayment Protocol00.342004
Accountability Logic for Mobile Payment Protocols80.642004
A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment00.342004
Lightweight Mobile Credit-Card Payment Protocol271.462003
Guard: A Tool for Migrating Scientific Applications to the .NET Framework30.422002
A Proposed Alternative for Layer 2 of Neocognitron00.342001
A measure for image quality00.341998
  • 1
  • 2