If you made any changes in Pure these will be visible here soon.

Research Output 1997 2017

Filter
Article
2015

Deterring hacking strategies via targeting scanning properties

Alsunbul, S., Le, P. D. & Tan, J., 2015, In : International Journal of Network Security and its Applications. 7, 4, p. 1 - 30 30 p.

Research output: Contribution to journalArticleResearchpeer-review

2010

An individual and group authentication model for wireless network services

Ngo, H. H. H., Wu, X., Le, P. D. & Srinivasan, B., 2010, In : Journal of Convergence Information Technology. 5, 1, p. 82 - 94 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Dynamic key cryptography and applications

Ngo, H. H. H., Wu, X., Le, P. D., Wilson, C. C. & Srinivasan, B., 2010, In : International Journal of Network Security. 10, 3, p. 161 - 174 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Flexible authentication technique for ubiquitous wireless communication using passport and visa tokens

Almuhaideb, A., Alhabeeb, M., Le, P. D. & Srinivasan, B., 2010, In : Journal of Telecommunications. 1, 2, p. 1 - 10 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Holistic approach for critical system security: Flooding prevention and malicious packet stopping

Alhabeeb, M., Almuhaideb, A. & Le, P. D., 2010, In : Journal of Telecommunications. 1, 1, p. 14 - 24 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Novel hybrid group key agreement for sensitive information systems

Wu, X., Ngo, H. H. H., Le, P. D., Srinivasan, B. & Qi, H., 2010, In : Journal of Convergence Information Technology. 5, 1, p. 69 - 81 13 p.

Research output: Contribution to journalArticleResearchpeer-review

2009
2008

Fraudulent Internet banking payments prevention using dynamic key

Dandash, O., Wang, Y., Le, P. D. & Srinivasan, B., 2008, In : Journal of Networks. 3, 1, p. 25 - 34 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Security analysis for Internet banking models

Dandash, O., Wu, X., Wang, Y., Le, P. D. & Srinivasan, B., 2008, In : ACIS International Journal of Computer & Information Science. 9, 2, p. 1 - 10 10 p.

Research output: Contribution to journalArticleResearchpeer-review

2005

Scalable multi-subgroup key management in wireless networks

Wang, Y., Le, P. D. & Srinivasan, B., 2005, In : International Journal of Computer Science and Network Security. 5, 11, p. 95 - 105 11 p.

Research output: Contribution to journalArticleResearchpeer-review

2002

Guard: a tool for migrating scientific applications to the .NET Framework

Abramson, D. A., Watson, G. & Le, P. D., 2002, In : Lecture Notes in Computer Science. 2330, p. 834 - 843 10 p.

Research output: Contribution to journalArticleResearchpeer-review

1997

A migration tool to support resoure and load sharing in heterogeneous computing environments

Le, P. D. & Srinivasan, B., 1997, In : Computer Communications. p. 361 - 375 15 p.

Research output: Contribution to journalArticleResearchpeer-review