2007 |
13 | EE | Tri Van Le,
Mike Burmester,
Breno de Medeiros:
Universally composable and forward-secure RFID authentication and authenticated key exchange.
ASIACCS 2007: 242-252 |
12 | EE | Mike Burmester,
Tri Van Le,
Alec Yasinsac:
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks.
Ad Hoc Networks 5(3): 313-323 (2007) |
2006 |
11 | EE | Mike Burmester,
Tri Van Le,
Breno de Medeiros:
Towards Provable Security for Ubiquitous Applications.
ACISP 2006: 295-312 |
10 | EE | Tri Van Le,
Kaoru Kurosawa:
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks.
Information Hiding 2006: 297-313 |
2004 |
9 | EE | Mike Burmester,
Tri Van Le,
Alec Yasinsac:
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks.
ADHOC-NOW 2004: 96-107 |
8 | EE | Tri Van Le,
Rüdiger Sparr,
Ralph Wernsdorf,
Yvo Desmedt:
Complementation-Like and Cyclic Properties of AES Round Functions.
AES Conference 2004: 128-141 |
7 | EE | Mike Burmester,
Tri Van Le:
Secure Multipath Communication in Mobile Ad hoc Networks.
ITCC (2) 2004: 405-409 |
2003 |
6 | EE | Yvo Desmedt,
Kaoru Kurosawa,
Tri Van Le:
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes.
ISC 2003: 396-407 |
5 | EE | Tri Van Le,
Mike Burmester,
Jiangyi Hu:
Short c-Secure Fingerprinting Codes.
ISC 2003: 422-427 |
2002 |
4 | EE | Tri Van Le,
Yvo Desmedt:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.
Information Hiding 2002: 213-225 |
2000 |
3 | EE | Yvo Desmedt,
Tri Van Le:
Moiré cryptography.
ACM Conference on Computer and Communications Security 2000: 116-124 |
1999 |
2 | | Tri Van Le,
Khanh Quoc Nguyen,
Vijay Varadharajan:
How to Prove That a Committed Number Is Prime.
ASIACRYPT 1999: 208-218 |
1 | | Yvo Desmedt,
Tri Van Le,
Jean-Jacques Quisquater:
Nonbinary Audio Cryptography.
Information Hiding 1999: 478-489 |