Dynamic Key Cryptography and Applications. HH Ngo, X Wu, PD Le, C Wilson, B Srinivasan Int. J. Netw. Secur. 10 (3), 161-174, 2010 | 71 | 2010 |
An Individual and Group Authentication Model for Wireless Network Services. HH Ngo, X Wu, PD Le, B Srinivasan J. Convergence Inf. Technol. 5 (1), 82-94, 2010 | 35 | 2010 |
Security Architecture for sensitive information systems X Wu, B Srinivasan, PD Le INTECH Open Access Publisher, 2010 | 18 | 2010 |
The design and implementation of a smartphone payment system based on limited-used key generation scheme X Wu, O Dandash, PD Le Third International Conference on Information Technology: New Generations …, 2006 | 16 | 2006 |
Dynamic Keys Based Sensitive Information System X Wu, PD Le, B Srinivasan 2008 The 9th International Conference for Young Computer Scientists, 1895-1901, 2008 | 14 | 2008 |
Probabilistic Encryption--A Comparative Analysis against RSA and ECC OM Creado, X Wu, Y Wang, PD Le 2009 Fourth International Conference on Computer Sciences and Convergence …, 2009 | 12 | 2009 |
The design of cluster-based group key management system in wireless networks YJ Chen, YL Wang, XP Wu, PD Le 2006 International Conference on Communication Technology, 1-4, 2006 | 11 | 2006 |
Attenuator for W-band folded waveguide TWT J Cai, J Feng, Y Hu, X Wu, B Qu, S Ma, J Zhang, T Chen 2008 IEEE International Vacuum Electronics Conference, 20-21, 2008 | 9 | 2008 |
Probabilistic Encryption--A Practical Implementation OM Creado, Y Wang, X Wu, PD Le 2009 Fourth International Conference on Computer Sciences and Convergence …, 2009 | 8 | 2009 |
Wireless internet payment system using smart cards O Dandash, X Wu, PD Le International Conference on Information Technology: Coding and Computing …, 2005 | 8 | 2005 |
Novel hybrid group key agreement for sensitive information systems X Wu, HHH Ngo, PD Le, B Srinivasan, H Qi Journal of Convergence Information Technology 5 (1), 69-81, 2010 | 7 | 2010 |
A method for Authentication services in wireless networks HH Ngo, XP Wu, PD Le, C Wilson | 7 | 2008 |
15.2: Investigation of THz regenerative oscillator J Cai, J Feng, Y Hu, X Wu 2010 IEEE International Vacuum Electronics Conference (IVEC), 323-324, 2010 | 5 | 2010 |
Package-role based authorization control model for wireless network services HH Ngo, X Wu, PD Le, C Wilson 2009 International Conference on Availability, Reliability and Security, 475-480, 2009 | 5 | 2009 |
A Novel Authentication Protocol for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management X Wu, HH Ngo, PD Le, B Srinivasan 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 5 | 2008 |
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems. X Wu, HH Ngo, PD Le, B Srinivasan Security and Management, 93-99, 2008 | 5 | 2008 |
An Authentication Model for Wireless Network Services HH Ngo, X Wu, PD Le, B Srinivasan 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 4 | 2010 |
A Group Authentication Model for Wireless Network Services Based on Group Key Management. HH Ngo, X Wu, PD Le ICEIS (3-2), 182-188, 2008 | 4 | 2008 |
Holistic approach for critical system security: Flooding prevention M Alhabeeb, X Wu, A Almuhaideb, PD Le, B Srinivasan INC2010: 6th International Conference on Networked Computing, 1-8, 2010 | 2 | 2010 |
Design & Implementation of a Secure Sensitive Information System for Wireless Mobile Devices X Wu, HH Ngo, PD Le, B Srinivasan 2008 Australasian Telecommunication Networks and Applications Conference, 45-50, 2008 | 2 | 2008 |