University of Oxford Logo University of OxfordDepartment of Computer Science - Home
On Facebook
Facebook
Follow us on twitter
Twitter
Linked in
Linked in
Flickr
Flickr
Google plus
Google plus
Digg
Digg
Pinterest
Pinterest
Stumble Upon
Stumble Upon

Long Nguyen : Publications

By dateBy titleBy typeBibtex

[1]

Authenticating ad hoc networks by comparison of short digests

Long H. Nguyen and Andrew W. Roscoe

In Information and Computation (an international journal). Vol. 206‚ Issues 2−4. Pages 250−271. Feb-Apr 2008.

[2]

Short−output universal hash functions and their use in fast and secure message authentication

[3]

Reverse Authentication in Financial Transactions and Identity Management

Bangdao Chen‚ Long Nguyen and A.W. Roscoe

In Mobile Networks and Applications. Pages 1−16. 2012.

10.1007/s11036−012−0366−2

[4]

Software Implementation of digest function

Long Nguyen

2012.

[5]

Model checking cryptographic protocols subject to combinatorial attack.

T. Smyth A.W. Roscoe and L.H. Nguyen.

2011.

[6]

CSP files

Toby Smyth A.W. Roscoe and Long Nguyen

2011.

[7]

Rational distance−bounding protocols over noisy channels

Long Hoang Nguyen

In The 4th International Conference on Security of Information and Networks SIN 2011. 2011.

[8]

Rational authentication protocols

Long Nguyen

2011.

[9]

On the construction of digest functions for manual authentication protocols

Long Hoang Nguyen and Andrew William Roscoe

In Under preparation. 2011.

[10]

Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey

Long Hoang Nguyen and Andrew William Roscoe

In Journal of Computer Security. Vol. Volume 19‚ Number 1 / 2011. Pages 139−201. 2011.

[11]

CSP files for payment protocols

Bill Roscoe‚ Chen Bangdao and Long Nguyen

2011.

[12]

Simple construction of biased distribution

Long Nguyen and Bill Roscoe

2011.

[13]

A new bound for t−wise almost universal hash functions

L.H. Nguyen and A.W. Roscoe

No. RR−10−24. OUCL. November, 2010.

[14]

The Missing Link: Human Interactive Security Protocols in Mobile Payment

R. Kainda With C. Bangdao A.W. Roscoe

In Proceedings of the 5th International Workshop on Security‚ IWSEC. 2010.

[15]

Reverse authentication in financial transactions

With A.W. Roscoe and C. Bangdao

In Proceeding of the second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use (IWSSI/SPMU). 2010.

[16]

ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer

ISO

In ISO. No. ISO/IEC 9798−6. Pages 35. 2010.

[17]

Authentication protocols in pervasive computing

Nguyen Hoang Long

PhD Thesis 2010.

[18]

research description

Long Nguyen

2010.

[19]

HCBK Brochure

Bangdao Chen and Bill Roscoe

2010.

[20]

Separating two roles of hashing in one−way message authentication

[21]

Teaching subjects

Long Nguyen

2008.

[22]

List of presentations

Long Nguyen

2008.

[23]

Efficient group authentication protocol based on human interaction

Long H. Nguyen and Andrew W. Roscoe

In Proceedings of FCS−ARSPA 2006 (Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis). 2006.

[24]

RSA Threshold Signature

Long Hoang Nguyen

2005, Undergraduate Thesis at Bristol University.

[25]

Partially Interactive Threshold RSA Signatures

Long Hoang Nguyen

2005, Oxford computing technical report.

[26]

Side Channel Attack By Using Hidden Markov Model

Long Hoang Nguyen

2004, Technical report for the Nuffield Foundation Science Research Bursary.