| 2008 |
| 27 | | Huy Hoang Ngo,
Xianping Wu,
Phu Dung Le:
A Group Authentication Model for Wireless Network Services Based on Group Key Management.
ICEIS (3-2) 2008: 182-188 |
| 26 | EE | Xianping Wu,
Phu Dung Le,
Balasubramaniam Srinivasan:
Dynamic Keys Based Sensitive Information System.
ICYCS 2008: 1895-1901 |
| 25 | | Minh Viet Le,
Phu Dung Le,
Balasubramaniam Srinivasan:
A Study of Wavelets-Based Image Representations and Their Effectiveness.
IPCV 2008: 638-642 |
| 24 | | Xianping Wu,
Huy Hoang Ngo,
Phu Dung Le,
Balasubramaniam Srinivasan:
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems.
Security and Management 2008: 93-99 |
| 23 | EE | Osama Dandash,
Yiling Wang,
Phu Dung Le,
Bala Srinivasan:
Fraudulent Internet Banking Payments Prevention using Dynamic Key.
JNW 3(1): 25-34 (2008) |
| 2007 |
| 22 | EE | Yiling Wang,
Phu Dung Le,
Balasubramaniam Srinivasan:
Hybrid Group Key Management Scheme for Secure Wireless Multicast.
ACIS-ICIS 2007: 346-351 |
| 21 | | Osama Dandash,
Yiling Wang,
Phu Dung Le,
Bala Srinivasan:
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection.
ICEIS (4) 2007: 57-62 |
| 20 | EE | Osama Dandash,
Yiling Wang,
Phu Dung Le,
Bala Srinivasan:
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention.
ITNG 2007: 83-88 |
| 19 | EE | Osama Dandash,
Phu Dung Le,
Bala Srinivasan:
Security Analysis for Internet Banking Models.
SNPD (3) 2007: 1141-1146 |
| 2006 |
| 18 | | Xianping Wu,
Osama Dandash,
Phu Dung Le,
Bala Srinivasan:
The design and implementation of a wireless payment system.
COMSWARE 2006 |
| 17 | EE | Dhilak Damodaran,
Rohit Singh,
Phu Dung Le:
Group Key Management in Wireless Networks Using Session Keys.
ITNG 2006: 402-407 |
| 16 | EE | Yiling Wang,
Dhilak Damodaran,
Phu Dung Le:
Efficient Group Key Management in Wireless Networks.
ITNG 2006: 432-439 |
| 15 | EE | Xianping Wu,
Osama Dandash,
Phu Dung Le:
The Design and Implementation of a Smartphone Payment System based on Limited-used Key Generation Scheme.
ITNG 2006: 458-463 |
| 14 | EE | Wei Wu,
Phu Dung Le:
An Efficient and Secure Code Sharing for Peer-to-Peer Communications.
ITNG 2006: 476-481 |
| 2005 |
| 13 | EE | Osama Dandash,
Xianping Wu,
Phu Dung Le:
Wireless Internet Payment System Using Smart Cards.
ITCC (2) 2005: 16-21 |
| 2004 |
| 12 | EE | Supakorn Kungpisdan,
Bala Srinivasan,
Phu Dung Le:
A Secure Account-Based Mobile Payment Protocol.
ITCC (1) 2004: 35-39 |
| 11 | EE | Supakorn Kungpisdan,
Bala Srinivasan,
Phu Dung Le:
Accountability Logic for Mobile Payment Protocols.
ITCC (1) 2004: 40-44 |
| 10 | EE | Supakorn Kungpisdan,
Phu Dung Le,
Bala Srinivasan:
A Limited-Used Key Generation Scheme for Internet Transactions.
WISA 2004: 302-316 |
| 9 | | Supakorn Kungpisdan,
Bala Srinivasan,
Phu Dung Le:
A Secure Prepaid Wireless Micropayment Protocol.
WOSIS 2004: 104-113 |
| 8 | | Supakorn Kungpisdan,
Bala Srinivasan,
Phu Dung Le:
A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment.
iiWAS 2004 |
| 2003 |
| 7 | EE | Supakorn Kungpisdan,
Bala Srinivasan,
Phu Dung Le:
Lightweight Mobile Credit-Card Payment Protocol.
INDOCRYPT 2003: 295-308 |
| 2002 |
| 6 | EE | David Abramson,
Greg Watson,
Phu Dung Le:
Guard: A Tool for Migrating Scientific Applications to the .NET Framework.
International Conference on Computational Science (2) 2002: 834-843 |
| 2001 |
| 5 | | Michael Tran,
Siddheswar Ray,
Phu Dung Le:
A Proposed Alternative for Layer 2 of Neocognitron.
VIIP 2001: 554-559 |
| 1998 |
| 4 | | Phu Dung Le,
Bala Srinivasan,
Santosh Kulkarni:
Multi Level Browsing for Efficient Image Transmission.
DEXA Workshop 1998: 373-378 |
| 3 | EE | Phu Dung Le,
Bala Srinivasan,
Salahadin Mohammed,
Santosh Kulkarni,
Campbell Wilson:
A measure for image quality.
SAC 1998: 513-519 |
| 1996 |
| 2 | | Nguyen Tran,
Phu Dung Le,
Bala Srinivasan,
Bob Sier:
Performance Evaluation of Tree-Based Structures.
DEXA 1996: 845-854 |
| 1995 |
| 1 | | Phu Dung Le,
Bala Srinivasan:
A Tool for Resource and Load Sharing in Heterogeneous Environments.
Parallel and Distributed Computing and Systems 1995: 187-192 |