default search action
Tri Van Le
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c14]Tuyen Phong Truong, Thang Lu Tat, Tri Van Le, Van-Muot Nguyen:
Resonance Frequency-Based Desulfator Design for Lead-Acid Batteries. ICECC 2023: 232-238
2000 – 2009
- 2009
- [j2]Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik:
Universally Composable RFID Identification and Authentication Protocols. ACM Trans. Inf. Syst. Secur. 12(4): 21:1-21:33 (2009) - 2007
- [j1]Mike Burmester, Tri Van Le, Alec Yasinsac:
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. Ad Hoc Networks 5(3): 313-323 (2007) - [c13]Tri Van Le, Mike Burmester, Breno de Medeiros:
Universally composable and forward-secure RFID authentication and authenticated key exchange. AsiaCCS 2007: 242-252 - [i6]Tri Van Le, Mike Burmester, Breno de Medeiros:
Forward-secure RFID Authentication and Key Exchange. IACR Cryptol. ePrint Arch. 2007: 51 (2007) - 2006
- [c12]Mike Burmester, Tri Van Le, Breno de Medeiros:
Towards Provable Security for Ubiquitous Applications. ACISP 2006: 295-312 - [c11]Tri Van Le, Kaoru Kurosawa:
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. Information Hiding 2006: 297-313 - [c10]Mike Burmester, Tri Van Le, Breno de Medeiros:
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. SecureComm 2006: 1-9 - [i5]Mike Burmester, Tri Van Le, Breno de Medeiros:
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. IACR Cryptol. ePrint Arch. 2006: 131 (2006) - [i4]Tri Van Le, Mike Burmester, Breno de Medeiros:
Universally Composable and Forward Secure RFID Authentication and Key Exchange. IACR Cryptol. ePrint Arch. 2006: 448 (2006) - 2004
- [c9]Mike Burmester, Tri Van Le, Alec Yasinsac:
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. ADHOC-NOW 2004: 96-107 - [c8]Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Yvo Desmedt:
Complementation-Like and Cyclic Properties of AES Round Functions. AES Conference 2004: 128-141 - [c7]Mike Burmester, Tri Van Le:
Secure Multipath Communication in Mobile Ad hoc Networks. ITCC (2) 2004: 405-409 - 2003
- [c6]Yvo Desmedt, Kaoru Kurosawa, Tri Van Le:
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. ISC 2003: 396-407 - [c5]Tri Van Le, Mike Burmester, Jiangyi Hu:
Short c-Secure Fingerprinting Codes. ISC 2003: 422-427 - [i3]Tri Van Le:
Novel Cyclic and Algebraic Properties of AES. IACR Cryptol. ePrint Arch. 2003: 108 (2003) - [i2]Tri Van Le:
Efficient Provably Secure Public Key Steganography. IACR Cryptol. ePrint Arch. 2003: 156 (2003) - [i1]Tri Van Le, Kaoru Kurosawa:
Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks. IACR Cryptol. ePrint Arch. 2003: 244 (2003) - 2002
- [c4]Tri Van Le, Yvo Desmedt:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. Information Hiding 2002: 213-225 - 2000
- [c3]Yvo Desmedt, Tri Van Le:
Moiré cryptography. CCS 2000: 116-124
1990 – 1999
- 1999
- [c2]Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan:
How to Prove That a Committed Number Is Prime. ASIACRYPT 1999: 208-218 - [c1]Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater:
Nonbinary Audio Cryptography. Information Hiding 1999: 478-489
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint