| 2007 |
| 13 | EE | Tri Van Le,
Mike Burmester,
Breno de Medeiros:
Universally composable and forward-secure RFID authentication and authenticated key exchange.
ASIACCS 2007: 242-252 |
| 12 | EE | Mike Burmester,
Tri Van Le,
Alec Yasinsac:
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks.
Ad Hoc Networks 5(3): 313-323 (2007) |
| 2006 |
| 11 | EE | Mike Burmester,
Tri Van Le,
Breno de Medeiros:
Towards Provable Security for Ubiquitous Applications.
ACISP 2006: 295-312 |
| 10 | EE | Tri Van Le,
Kaoru Kurosawa:
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks.
Information Hiding 2006: 297-313 |
| 2004 |
| 9 | EE | Mike Burmester,
Tri Van Le,
Alec Yasinsac:
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks.
ADHOC-NOW 2004: 96-107 |
| 8 | EE | Tri Van Le,
Rüdiger Sparr,
Ralph Wernsdorf,
Yvo Desmedt:
Complementation-Like and Cyclic Properties of AES Round Functions.
AES Conference 2004: 128-141 |
| 7 | EE | Mike Burmester,
Tri Van Le:
Secure Multipath Communication in Mobile Ad hoc Networks.
ITCC (2) 2004: 405-409 |
| 2003 |
| 6 | EE | Yvo Desmedt,
Kaoru Kurosawa,
Tri Van Le:
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes.
ISC 2003: 396-407 |
| 5 | EE | Tri Van Le,
Mike Burmester,
Jiangyi Hu:
Short c-Secure Fingerprinting Codes.
ISC 2003: 422-427 |
| 2002 |
| 4 | EE | Tri Van Le,
Yvo Desmedt:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection.
Information Hiding 2002: 213-225 |
| 2000 |
| 3 | EE | Yvo Desmedt,
Tri Van Le:
Moiré cryptography.
ACM Conference on Computer and Communications Security 2000: 116-124 |
| 1999 |
| 2 | | Tri Van Le,
Khanh Quoc Nguyen,
Vijay Varadharajan:
How to Prove That a Committed Number Is Prime.
ASIACRYPT 1999: 208-218 |
| 1 | | Yvo Desmedt,
Tri Van Le,
Jean-Jacques Quisquater:
Nonbinary Audio Cryptography.
Information Hiding 1999: 478-489 |