Long Nguyen : Publications
Journal papers
[1] |
Reverse Authentication in Financial Transactions and Identity Management Bangdao Chen‚ Long Nguyen and A.W. Roscoe In Mobile Networks and Applications. Pages 1−16. 2012. 10.1007/s11036−012−0366−2 |
[2] |
Model checking cryptographic protocols subject to combinatorial attack. T. Smyth A.W. Roscoe and L.H. Nguyen. 2011. |
[3] |
CSP files Toby Smyth A.W. Roscoe and Long Nguyen 2011. |
[4] |
Rational distance−bounding protocols over noisy channels Long Hoang Nguyen In The 4th International Conference on Security of Information and Networks SIN 2011. 2011. |
[5] |
Rational authentication protocols Long Nguyen 2011. Details | BibTeX | Download (pdf) | Link |
[6] |
On the construction of digest functions for manual authentication protocols Long Hoang Nguyen and Andrew William Roscoe In Under preparation. 2011. |
[7] |
The Missing Link: Human Interactive Security Protocols in Mobile Payment R. Kainda With C. Bangdao A.W. Roscoe In Proceedings of the 5th International Workshop on Security‚ IWSEC. 2010. |
[8] |
Reverse authentication in financial transactions With A.W. Roscoe and C. Bangdao In Proceeding of the second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use (IWSSI/SPMU). 2010. |
[9] |
ISO/IEC 9798−6. Information technology – Security techniques – Entity authentication – Part 6: Mechanisms using manual data transfer ISO In ISO. No. ISO/IEC 9798−6. Pages 35. 2010. |
[10] |
Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey Long Hoang Nguyen and Andrew William Roscoe In Journal of Computer Security. Vol. Volume 19‚ Number 1 / 2011. Pages 139−201. 2011. Details | BibTeX | Download (pdf) | Link |
[11] |
Authenticating ad hoc networks by comparison of short digests Long H. Nguyen and Andrew W. Roscoe In Information and Computation (an international journal). Vol. 206‚ Issues 2−4. Pages 250−271. Feb-Apr 2008. |
Conference papers
[1] |
Efficient group authentication protocol based on human interaction Long H. Nguyen and Andrew W. Roscoe In Proceedings of FCS−ARSPA 2006 (Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis). 2006. Details | BibTeX | Download (pdf) | Link |
Conference proceedings
[1] |
Short−output universal hash functions and their use in fast and secure message authentication
|
[2] |
Separating two roles of hashing in one−way message authentication
|
Technical reports
[1] |
A new bound for t−wise almost universal hash functions L.H. Nguyen and A.W. Roscoe No. RR−10−24. OUCL. November, 2010. |
[2] |
Partially Interactive Threshold RSA Signatures Long Hoang Nguyen 2005, Oxford computing technical report. |
[3] |
Side Channel Attack By Using Hidden Markov Model Long Hoang Nguyen 2004, Technical report for the Nuffield Foundation Science Research Bursary. |
Theses
[1] |
Authentication protocols in pervasive computing Nguyen Hoang Long PhD Thesis 2010. |
Miscellaneous
[1] |
Software Implementation of digest function Long Nguyen 2012. |
[2] |
CSP files for payment protocols Bill Roscoe‚ Chen Bangdao and Long Nguyen 2011. |
[3] |
Simple construction of biased distribution Long Nguyen and Bill Roscoe 2011. |
[4] |
Teaching subjects Long Nguyen 2008. |
[5] |
List of presentations Long Nguyen 2008. |
[6] |
research description Long Nguyen 2010. |
[7] |
HCBK Brochure Bangdao Chen and Bill Roscoe 2010. |
[8] |
RSA Threshold Signature Long Hoang Nguyen 2005, Undergraduate Thesis at Bristol University. |