Long Nguyen : Publications
-
[1]
Authenticating ad hoc networks by comparison of short digests
Long H. Nguyen and Andrew W. Roscoe
In Information and Computation (an international journal). Vol. 206‚ Issues 2−4. Pages 250−271. Feb-Apr 2008.
Details about Authenticating ad hoc networks by comparison of short digests | BibTeX data for Authenticating ad hoc networks by comparison of short digests | Download (pdf) of Authenticating ad hoc networks by comparison of short digests
-
[2]
Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey
Long Hoang Nguyen and Andrew William Roscoe
In Journal of Computer Security. Vol. Volume 19‚ Number 1 / 2011. Pages 139−201. 2011.
Details about Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey | BibTeX data for Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey | Download (pdf) of Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey | Link to Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey
-
[3]
ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer
ISO
In ISO. No. ISO/IEC 9798−6. Pages 35. 2010.
Details about ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer | BibTeX data for ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer | Link to ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer
-
[4]
Separating two roles of hashing in one−way message authentication
Details about Separating two roles of hashing in one−way message authentication | BibTeX data for Separating two roles of hashing in one−way message authentication | Download (pdf) of Separating two roles of hashing in one−way message authentication
-
[5]
Efficient group authentication protocol based on human interaction
Long H. Nguyen and Andrew W. Roscoe
In Proceedings of FCS−ARSPA 2006 (Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis). 2006.
Details about Efficient group authentication protocol based on human interaction | BibTeX data for Efficient group authentication protocol based on human interaction | Download (pdf) of Efficient group authentication protocol based on human interaction | Link to Efficient group authentication protocol based on human interaction
-
[6]
A new bound for t−wise almost universal hash functions
L.H. Nguyen and A.W. Roscoe
No. RR−10−24. OUCL. November, 2010.
Details about A new bound for t−wise almost universal hash functions | BibTeX data for A new bound for t−wise almost universal hash functions | Download (pdf) of A new bound for t−wise almost universal hash functions
-
[7]
RSA Threshold Signature
Long Hoang Nguyen
2005, Undergraduate Thesis at Bristol University.
Details about RSA Threshold Signature | BibTeX data for RSA Threshold Signature | Download (pdf) of RSA Threshold Signature | Download (pdf) of RSA Threshold Signature
-
[8]
Partially Interactive Threshold RSA Signatures
Long Hoang Nguyen
2005, Oxford computing technical report.
Details about Partially Interactive Threshold RSA Signatures | BibTeX data for Partially Interactive Threshold RSA Signatures | Download (ps) of Partially Interactive Threshold RSA Signatures | Download (pdf) of Partially Interactive Threshold RSA Signatures
-
[9]
Authentication protocols in pervasive computing
Nguyen Hoang Long
PhD Thesis 2010.
Details about Authentication protocols in pervasive computing | BibTeX data for Authentication protocols in pervasive computing | Download (pdf) of Authentication protocols in pervasive computing
-
[10]
Reverse authentication in financial transactions
With A.W. Roscoe and C. Bangdao
In Proceeding of the second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use (IWSSI/SPMU). 2010.
Details about Reverse authentication in financial transactions | BibTeX data for Reverse authentication in financial transactions
-
[11]
The Missing Link: Human Interactive Security Protocols in Mobile Payment
R. Kainda With C. Bangdao A.W. Roscoe
In Proceedings of the 5th International Workshop on Security‚ IWSEC. 2010.
Details about The Missing Link: Human Interactive Security Protocols in Mobile Payment | BibTeX data for The Missing Link: Human Interactive Security Protocols in Mobile Payment
-
[12]
Side Channel Attack By Using Hidden Markov Model
Long Hoang Nguyen
2004, Technical report for the Nuffield Foundation Science Research Bursary.
Details about Side Channel Attack By Using Hidden Markov Model | BibTeX data for Side Channel Attack By Using Hidden Markov Model | Download (pdf) of Side Channel Attack By Using Hidden Markov Model | Download (pdf) of Side Channel Attack By Using Hidden Markov Model
-
[13]
On the construction of digest functions for manual authentication protocols
Long Hoang Nguyen and Andrew William Roscoe
In Under preparation. 2011.
Details about On the construction of digest functions for manual authentication protocols | BibTeX data for On the construction of digest functions for manual authentication protocols | Download (pdf) of On the construction of digest functions for manual authentication protocols
-
[14]
Rational authentication protocols
Long Nguyen
2011.
Details about Rational authentication protocols | BibTeX data for Rational authentication protocols | Download (pdf) of Rational authentication protocols | Link to Rational authentication protocols
-
[15]
Rational distance−bounding protocols over noisy channels
Long Hoang Nguyen
In The 4th International Conference on Security of Information and Networks SIN 2011. 2011.
Details about Rational distance−bounding protocols over noisy channels | BibTeX data for Rational distance−bounding protocols over noisy channels | Download of Rational distance−bounding protocols over noisy channels
-
[16]
Simple construction of biased distribution
Long Nguyen and Bill Roscoe
2011.
Details about Simple construction of biased distribution | BibTeX data for Simple construction of biased distribution | Download (pdf) of Simple construction of biased distribution
-
[1717]
CSP files
Toby Smyth A.W. Roscoe and Long Nguyen
2011.
Details about CSP files | BibTeX data for CSP files | Download of CSP files
-
[18]
Model checking cryptographic protocols subject to combinatorial attack.
T. Smyth A.W. Roscoe and L.H. Nguyen.
2011.
Details about Model checking cryptographic protocols subject to combinatorial attack. | BibTeX data for Model checking cryptographic protocols subject to combinatorial attack. | Download (pdf) of Model checking cryptographic protocols subject to combinatorial attack.
-
[19]
CSP files for payment protocols
Bill Roscoe‚ Chen Bangdao and Long Nguyen
2011.
Details about CSP files for payment protocols | BibTeX data for CSP files for payment protocols | Download of CSP files for payment protocols
-
[20]
Reverse Authentication in Financial Transactions and Identity Management
Bangdao Chen‚ Long Nguyen and A.W. Roscoe
In Mobile Networks and Applications. Pages 1−16. 2012.
10.1007/s11036−012−0366−2
Details about Reverse Authentication in Financial Transactions and Identity Management | BibTeX data for Reverse Authentication in Financial Transactions and Identity Management | Link to Reverse Authentication in Financial Transactions and Identity Management
-
[21]
Short−output universal hash functions and their use in fast and secure message authentication
Details about Short−output universal hash functions and their use in fast and secure message authentication | BibTeX data for Short−output universal hash functions and their use in fast and secure message authentication | Download (pdf) of Short−output universal hash functions and their use in fast and secure message authentication
-
[22]
Software Implementation of digest function
Long Nguyen
2012.
Details about Software Implementation of digest function | BibTeX data for Software Implementation of digest function | Download of Software Implementation of digest function