University of Oxford Logo University of OxfordDepartment of Computer Science - Home
Linked in
Linked in
Follow us on twitter
Twitter
On Facebook
Facebook
Instagram
Instagram

Long Nguyen : Publications

By dateBy titleBy typeBibtex

[1]

A new bound for t−wise almost universal hash functions

L.H. Nguyen and A.W. Roscoe

No. RR−10−24. OUCL. November, 2010.

[2]

Authenticating ad hoc networks by comparison of short digests

Long H. Nguyen and Andrew W. Roscoe

In Information and Computation (an international journal). Vol. 206‚ Issues 2−4. Pages 250−271. Feb-Apr 2008.

[3]

Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey

Long Hoang Nguyen and Andrew William Roscoe

In Journal of Computer Security. Vol. Volume 19‚ Number 1 / 2011. Pages 139−201. 2011.

[4]

Authentication protocols in pervasive computing

Nguyen Hoang Long

PhD Thesis 2010.

[5]

CSP files

Toby Smyth A.W. Roscoe and Long Nguyen

2011.

[6]

CSP files for payment protocols

Bill Roscoe‚ Chen Bangdao and Long Nguyen

2011.

[7]

Efficient group authentication protocol based on human interaction

Long H. Nguyen and Andrew W. Roscoe

In Proceedings of FCS−ARSPA 2006 (Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis). 2006.

[8]

HCBK Brochure

Bangdao Chen and Bill Roscoe

2010.

[9]

ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer

ISO

In ISO. No. ISO/IEC 9798−6. Pages 35. 2010.

[10]

List of presentations

Long Nguyen

2008.

[11]

Model checking cryptographic protocols subject to combinatorial attack.

T. Smyth A.W. Roscoe and L.H. Nguyen.

2011.

[12]

On the construction of digest functions for manual authentication protocols

Long Hoang Nguyen and Andrew William Roscoe

In Under preparation. 2011.

[13]

Partially Interactive Threshold RSA Signatures

Long Hoang Nguyen

2005, Oxford computing technical report.

[14]

RSA Threshold Signature

Long Hoang Nguyen

2005, Undergraduate Thesis at Bristol University.

[15]

Rational authentication protocols

Long Nguyen

2011.

[16]

Rational distance−bounding protocols over noisy channels

Long Hoang Nguyen

In The 4th International Conference on Security of Information and Networks SIN 2011. 2011.

[17]

Reverse Authentication in Financial Transactions and Identity Management

Bangdao Chen‚ Long Nguyen and A.W. Roscoe

In Mobile Networks and Applications. Pages 1−16. 2012.

10.1007/s11036−012−0366−2

[18]

Reverse authentication in financial transactions

With A.W. Roscoe and C. Bangdao

In Proceeding of the second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use (IWSSI/SPMU). 2010.

[19]

Separating two roles of hashing in one−way message authentication

[20]

Short−output universal hash functions and their use in fast and secure message authentication

[21]

Side Channel Attack By Using Hidden Markov Model

Long Hoang Nguyen

2004, Technical report for the Nuffield Foundation Science Research Bursary.

[22]

Simple construction of biased distribution

Long Nguyen and Bill Roscoe

2011.

[23]

Software Implementation of digest function

Long Nguyen

2012.

[24]

Teaching subjects

Long Nguyen

2008.

[25]

The Missing Link: Human Interactive Security Protocols in Mobile Payment

R. Kainda With C. Bangdao A.W. Roscoe

In Proceedings of the 5th International Workshop on Security‚ IWSEC. 2010.

[26]

research description

Long Nguyen

2010.