Long Nguyen : Publications
Click here to download all publications in a single bibtex file
@article{Authentication protocol,
title = "Authenticating ad hoc networks by comparison of short digests",
author = "Long H. Nguyen and Andrew W. Roscoe",
year = "Feb-Apr 2008",
booktitle = "Special Issue of Information and Computation on Computer Security: Foundations and Automated Reasoning",
journal = "{Information and Computation (an international journal)}",
pages = "250-271",
publisher = "Elsiver",
volume = "206, Issues 2-4",
}
@proceedings{digest,
title = "Short-output universal hash functions and their use in fast and secure message authentication",
author = "Long Nguyen and Bill Roscoe",
year = "Fast Software Encryption FSE - 2012",
booktitle = "Proceedings of the Fast Software Encryption Workshop 2012",
journal = "Fast Software Encryption 2012",
}
@article{springerlink:10.1007/s11036-012-0366-2,
title = "Reverse Authentication in Financial Transactions and Identity Management",
author = "Chen, Bangdao and Nguyen, Long and Roscoe, A.W.",
year = "2012",
affiliation = "Department of Computer Science, Oxford University, Oxford, UK",
issn = "1383-469X",
journal = "Mobile Networks and Applications",
note = "10.1007/s11036-012-0366-2",
pages = "1-16",
publisher = "Springer Netherlands",
url = "http://dx.doi.org/10.1007/s11036-012-0366-2",
}
@misc{Implementation,
title = "Software Implementation of digest function",
author = "Long Nguyen",
year = "2012",
}
@article{CSP HCBK,
title = "Model checking cryptographic protocols subject to combinatorial attack.",
author = "A.W. Roscoe, T. Smyth and L.H. Nguyen.",
year = "2011",
}
@article{guess,
title = "CSP files",
author = "A.W. Roscoe, Toby Smyth and Long Nguyen",
year = "2011",
}
@article{loss,
title = "Rational distance-bounding protocols over noisy channels",
author = "Long Hoang Nguyen",
year = "2011",
journal = "The 4th International Conference on Security of Information and Networks SIN 2011",
series = "The International Conference Proceedings Series by the ACM",
}
@article{rational,
title = "Rational authentication protocols",
author = "Long Nguyen",
year = "2011",
url = "http://eprint.iacr.org/2011/070",
}
@article{digest paper,
title = "On the construction of digest functions for manual authentication protocols",
author = "Long Hoang Nguyen and Andrew William Roscoe",
year = "2011",
address = "Oxford University Computing Laboratory",
journal = "Under preparation",
}
@article{Survey paper,
title = "Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey",
author = "Long Hoang Nguyen and Andrew William Roscoe",
year = "2011",
address = "Oxford University Computing Laboratory",
journal = "Journal of Computer Security",
pages = "139-201",
publisher = "IOS Press",
url = "http://iospress.metapress.com/content/y12221481181x146/?p=596ef23449cc4e8a91f6c4a7a3018fff&pi=4",
volume = "Volume 19, Number 1 / 2011",
}
@unpublished{CSP Payment protocols,
title = "CSP files for payment protocols",
author = "Bill Roscoe and Chen Bangdao and Long Nguyen",
year = "2011",
}
@unpublished{rlfsr,
title = "Simple construction of biased distribution",
author = "Long Nguyen and Bill Roscoe",
year = "2011",
}
@techreport{3969,
title = "A new bound for t-wise almost universal hash functions",
author = "L.H. Nguyen and A.W. Roscoe",
year = "2010",
institution = "OUCL",
month = "November",
number = "RR-10-24",
pages = "4",
}
@article{a,
title = "The Missing Link: Human Interactive Security Protocols in Mobile Payment",
author = "With C. Bangdao, A.W. Roscoe, R. Kainda",
year = "2010",
journal = "Proceedings of the 5th International Workshop on Security, IWSEC",
}
@article{Reverse authentication in financial transactions,
title = "Reverse authentication in financial transactions",
author = "With A.W. Roscoe and C. Bangdao",
year = "2010",
journal = "Proceeding of the second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use (IWSSI/SPMU)",
}
@article{ISO,
title = "ISO/IEC 9798-6. Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer",
author = "ISO",
year = "2010",
copyright = "ISO",
editor = "Long Hoang Nguyen",
institution = "Oxford University Computing Laboratory",
journal = "ISO",
number = "ISO/IEC 9798-6",
organization = "ISO",
pages = "35",
price = "CHF 130,00",
publisher = "ISO",
url = "http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=54529",
}
@phdthesis{thesis,
title = "Authentication protocols in pervasive computing",
author = "Nguyen Hoang Long",
year = "2010",
}
@misc{research,
title = "research description",
author = "Long Nguyen",
year = "2010",
}
@booklet{HCBK Brochure,
title = "HCBK Brochure",
author = "Bangdao Chen and Bill Roscoe",
year = "2010",
}
@proceedings{Seperation of security concerns,
title = "Separating two roles of hashing in one-way message authentication",
author = "Long Hoang Nguyen and Andrew William Roscoe",
year = "2008",
booktitle = "FCS-ARSPA-WITS'08",
journal = "In proceedings of FCS-ARSPA-WITS'08 workshop",
}
@misc{4047,
title = "Teaching subjects",
author = "Long Nguyen",
year = "2008",
}
@misc{4046,
title = "List of presentations",
author = "Long Nguyen",
year = "2008",
}
@inproceedings{ARSPA,
title = "Efficient group authentication protocol based on human interaction",
author = "Long H. Nguyen and Andrew W. Roscoe",
year = "2006",
booktitle = "{Proceedings of FCS-ARSPA 2006 (Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis)}",
url = "http://www.easychair.org/FLoC-06/FCS-ARSPA-day226.html",
}
@misc{RSA Threshold Signature,
title = "RSA Threshold Signature",
author = "Long Hoang Nguyen",
year = "2005, Undergraduate Thesis at Bristol University",
booktitle = "Undergraduate Thesis at Bristol University",
journal = "Undergraduate Thesis at Bristol University",
url = "http://www.comlab.ox.ac.uk/people/long.nguyen/Thesis.pdf",
}
@techreport{RSA Threshold Signature,
title = "Partially Interactive Threshold RSA Signatures",
author = "Long Hoang Nguyen",
year = "2005, Oxford computing technical report",
booktitle = "Oxford computing technical report, URL: http://web.comlab.ox.ac.uk/oucl/publications/tr/",
journal = "Oxford computing technical report",
url = "http://www.comlab.ox.ac.uk/people/long.nguyen/Threshold.pdf",
}
@techreport{Hidden Markov Model,
title = "Side Channel Attack By Using Hidden Markov Model",
author = "Long Hoang Nguyen",
year = "2004, Technical report for the Nuffield Foundation Science Research Bursary",
booktitle = "Nuffield Foundation Science Research Bursary",
journal = "Technical report for the Nuffield Foundation Science Research Bursary",
url = "http://www.comlab.ox.ac.uk/people/long.nguyen/NuffieldReport.pdf",
}