Dr Phu Le - Researcher Profile

Phu Le

Address

Faculty of Information Technology
Level 6, Building H, Caulfield

Contact Details

Tel: +61 3 990 32399

Fax: +61 3 990 31077

Email: Phu.Dung.Le@monash.edu


Biography

Phu works in the Faculty of Information Technology at Monash University as a Lecturer.

Keywords

Computer Systems Security, Data encryption, Denial of Service, Filtering, Flexible Authentication Technique, Packet filtering, Passport (identification token), Token Filter Technique (TFT), Ubiquitous Wireless Communication, Visa (authorisation token)

Qualifications

DOCTOR OF PHILOSOPHY
Institution: Monash University
Year awarded: 1999

Publications

Book Chapters

Wu, X., Le, P.D., Srinivasan, B., 2010, Security architecture for sensitive information systems, in Convergence and Hybrid Information Technologies, eds Marius Crisan, InTech, Vukovar Croatia, pp. 239-266.

Wang, Y., Le, P.D., 2007, Efficient and scalable group key management in wireless networks, in Encyclopedia of Mobile Computing and Commerce, eds David Taniar, Information Science Publishing, Hershey PA USA, pp. 227-232.

Wang, Y., Le, P.D., 2007, Secure group communications in wireless networks, in Encyclopedia of Mobile Computing and Commerce, eds David Taniar, Information Science Publishing, Hershey PA USA, pp. 832-838.

Journal Articles

Ngo, H.H.H., Wu, X., Le, P.D., Srinivasan, B., 2010, An individual and group authentication model for wireless network services, Journal of Convergence Information Technology [P], vol 5, issue 1, Advanced Institute of Convergence Information Technology (AICIT), Gyeongbuk Korea, pp. 82-94.

Ngo, H.H.H., Wu, X., Le, P.D., Wilson, C.C., Srinivasan, B., 2010, Dynamic key cryptography and applications, International Journal of Network Security [P], vol 10, issue 3, Femto Technique Co., Taiwan Republic of China, pp. 161-174.

Almuhaideb, A., Alhabeeb, M., Le, P.D., Srinivasan, B., 2010, Flexible authentication technique for ubiquitous wireless communication using passport and visa tokens, Journal of Telecommunications [E], vol 1, issue 2, Journal of Telecommunications, London UK, pp. 1-10.

Alhabeeb, M., Almuhaideb, A., Le, P.D., 2010, Holistic approach for critical system security: Flooding prevention and malicious packet stopping, Journal of Telecommunications [E], vol 1, issue 1, Journal of Telecommunications, London UK, pp. 14-24.

Wu, X., Ngo, H.H.H., Le, P.D., Srinivasan, B., Qi, H., 2010, Novel hybrid group key agreement for sensitive information systems, Journal of Convergence Information Technology [P], vol 5, issue 1, Advanced Institute of Convergence Information Technology (AICIT), Gyeongbuk Korea, pp. 69-81.

Wu, X., Ngo, H.H.H., Le, P.D., Srinivasan, B., 2009, Novel authentication & authorization management for sensitive information privacy protection using dynamic key based group key management, International Journal of Computer Science & Applications [E], vol 6, issue 3, Technomathematics Research Foundation, Kolhapur India, pp. 57-74.

Dandash, O., Wang, Y., Le, P.D., Srinivasan, B., 2008, Fraudulent Internet banking payments prevention using dynamic key, Journal of Networks, vol 3, issue 1, Acadmy Publisher, Oulu Finland, pp. 25-34.

Dandash, O., Wu, X., Wang, Y., Le, P.D., Srinivasan, B., 2008, Security analysis for Internet banking models, International Journal of Computer & Information Science, vol 9, issue 2, The International Association for Computer & Information Science (ACIS), Mt Pleasant MI USA, pp. 1-10.

Wang, Y., Le, P.D., Srinivasan, B., 2005, Scalable multi-subgroup key management in wireless networks, International Journal of Computer Science and Network Security, vol 5, issue 11, Sang Hoon Lee IJCSNS, Seoul Korea, pp. 95-105.

Abramson, D.A., Watson, G., Le, P.D., 2002, Guard: a tool for migrating scientific applications to the .NET Framework, Lecture Notes in Computer Science, vol 2330, Springer-Verlag, Berlin Germany, pp. 834-843.

Le, P.D., Srinivasan, B., 1997, A migration tool to support resoure and load sharing in heterogeneous computing environments, Computer Communications, vol 20, Elsevier, Amsterdam Netherlands, pp. 361-375.

Conference Proceedings

Alhabeeb, M., Le, P.D., Srinivasan, B., 2011, Evaluating the functionality of the token filtering technique in filtering denial of service packets using a new formal evaluation model, Proceedings of the Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications, 26 May 2011 to 28 May 2011, IEEE Computer Society, Los Alamitos CA USA, pp. 318-323.

Ngo, H.H.H., Dandash, O., Le, P.D., Srinivasan, B., Wilson, C.C., 2011, Formal verification of a secure mobile banking protocol, Proceedings of the First International Conference on Computer Science and Information Technology, Part II, 02 January 2011 to 04 January 2011, Springer-Verlag, Berlin Germany, pp. 410-421.

Alhabeeb, M., Le, P.D., Srinivasan, B., 2011, Preventing denial of service attacks in government e-services using a new efficient packet filtering technique, Proceedings of the Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications, 26 May 2011 to 28 May 2011, IEEE Computer Society, Los Alamitos CA USA, pp. 262-269.

Almuhaideb, A., Le, P., Srinivasan, B., 2011, Two-party mobile authentication protocols for wireless roaming networks, Proceedings of the 2011 IEEE International Symposium on Network Computing and Applications, 25 August 2011 to 27 August 2011, IEEE Computer Society, Los Alamitos CA USA, pp. 285-288.

Le, M.V., Le, P.D., Srinivasan, B., 2010, A framework to measure the effectiveness of image representations, Proceedings of the 2010 International Conference on Image Processing, Computer Vision and Pattern Recognition, 12 July 2010 to 15 July 2010, CSREA Press, USA, pp. 41-46.

Alhabeeb, M., Alsunbul, S., Almuhaideb, A., Le, P.D., Srinivasan, B., 2010, A novel security approach for critical information systems: Preventing flooding in the non-authenticated client area using a new service from local network service providers, Proceedings of the 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 09 June 2010 to 11 June 2010, IEEE Computer Society, Los Alamitos CA USA, pp. 49-54.

Ngo, H.H.H., Wu, X., Le, P.D., Srinivasan, B., 2010, An authentication model for wireless network services, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 20 April 2010 to 23 April 2010, IEEE Computer Society, Los Alamitos CA USA, pp. 996-1003.

Alhabeeb, M., Almuhaideb, A., Le, P.D., Srinivasan, B., 2010, An new holistic security approach for government critical systems: Flooding prevention, Proceedings of the 4th International Conference on Information Security and Assurance, 23 June 2010 to 25 June 2010, Springer-Verlag, Berlin Germany, pp. 249-264.

Almuhaideb, A., Alhabeeb, M., Le, P.D., Srinivasan, B., 2010, Beyond fixed key size: Classifications toward a balance between security and performance, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 20 April 2010 and 23 April 2010, IEEE Computer Society, Los Alamitos CA USA, pp. 1047-1053.

Alhabeeb, M., Wu, X., Almuhaideb, A., Le, P.D., Srinivasan, B., 2010, Holistic approach for critical system security: Flooding prevention, Proceedings of the 6th International Conference on Networked Computing, 11 May 2010 to 13 May 2010, IEEE, Los Alamitos CA USA, pp. 196-203.

Alhabeeb, M., Almuhaideb, A., Le, P.D., Srinivasan, B., 2010, Information security threats classification pyramid, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 20 April 2010 to 23 April 2010, IEEE Computer Society, Los Alamitos CA USA, pp. 208-213.

Almuhaideb, A., Alhabeeb, M., Le, P.D., Srinivasan, B., 2010, Passport-Visa based authentication mechanism for ubiquitous mobile communication, Proceedings of the 6th International Conference on Networked Computing, 11 May 2010 to 13 May 2010, IEEE, Los Alamitos CA USA, pp. 204-209.

Almuhaideb, A., Alharbi, T., Alhabeeb, M., Le, P.D., Srinivasan, B., 2010, Toward a ubiquitous mobile access model: A roaming agreement-less approach, Proceedings of the 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 09 June 2010 to 11 June 2010, IEEE Computer Society, Los Alamitos CA USA, pp. 143-148.

Ngo, H.H.H., Wang, Y., Le, P.D., Srinivasan, B., Malhotra, V.M., 2009, A membership oriented group key management for application services, Proceedings of the 12th International Conference on Network-Based Information Systems, 19 August 2009 to 21 August 2009, IEEE Computer Society, Los Alamitos CA USA, pp. 240-245.

Wang, Y., Ngo, H.H.H., Le, P.D., Srinivasan, B., Malhotra, V.M., 2009, Multicasting key management in wireless networks, Proceedings of the 12th International Conference on Network-Based Information Systems, 19 August 2009 to 21 August 2009, IEEE Computer Society, Los Alamitos CA USA, pp. 234-239.

Ngo, H.H.H., Wu, X., Le, P.D., Wilson, C.C., 2009, Package-role based authorization control model for wireless network services, Proceedings of the International Conference on Availability, Reliability and Security, 16 March 2009 to 19 March 2009, IEEE Computer Society, Los Alamitos CA USA, pp. 475-480.

Creado, O.M., Wu, X., Wang, Y., Le, P.D., 2009, Probabilistic encryption - A comparative analysis against RSA and ECC, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology, 24 November 2009 to 26 November 2009, IEEE Computer Society, Los Alamitos CA USA, pp. 1123-1129.

Creado, O.M., Wang, Y., Wu, X., Le, P.D., 2009, Probabilistic encryption - A practical implementation, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology, 24 November 2009 to 26 November 2009, IEEE Computer Society, Los Alamitos CA USA, pp. 1130-1136.

Wang, X., Wu, X., Wang, Y., Le, P.D., 2009, The design and implementation of a sensitive information system, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology, 24 November 2009 to 26 November 2009, IEEE Computer Society, Los Alamitos CA USA, pp. 1174-1179.

Ngo, H., Wu, X., Le, P.D., 2008, A group authentication model for wireless network services based on group key management, Proceedings of the Tenth International Conference on Enterprise Information Systems, 12 June 2008 to 16 June 2008, Institute for Systems and Technologies of Information, Control and Communication, Setubul Portugal, pp. 182-188.

Ngo, H., Wu, X., Le, P.D., Wilson, C.C., 2008, A method for authentication services in wireless networks, Proceedings of the 14th Americas Conference on Information Systems, 14 August 2008 to 17 August 2008, Association of Information Systems, Toronto ON Canada, pp. 1-9.

Wu, X., Ngo, H., Le, P.D., Srinivasan, B., 2008, A novel authentication protocol for sensitive information privacy protection using dynamic key based group key management, Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, 11 November 2008 to 13 November 2008, IEEE Computer Society, Los Alamitos CA USA, pp. 1113-1119.

Wu, X., Ngo, H., Le, P.D., Srinivasan, B., 2008, A novel group key management scheme for privacy protection sensitive information systems, Proceedings of the 2008 International Conference on Security & Management, 14 July 2008 to 17 July 2008, CSREA Press, USA, pp. 93-99.

Le Viet, M., Le, P.D., Srinivasan, B., 2008, A study of wavelets-based image representations and their effectiveness, Proceedings of the 2008 International Conference on Image Processing, Computer Vision and Pattern Recognition, 14 July 2008 to 17 July 2008, CSREA Press, Las Vegas NV USA, pp. 638-642.

Wu, X., Ngo, H., Le, P.D., Srinivasan, B., 2008, Design & implementation of a secure sensitive information system for wireless mobile devices, Proceedings of the 2008 Australasian Telecommunication Networks and Applications Conference, 07 December 2008 to 10 December 2008, IEEE, New York NY USA, pp. 45-50.

Wu, X., Le, P.D., Srinivasan, B., 2008, Dynamic keys based sensitive information system, Proceedings of the 9th International Conference for Young Computer Scientists, 18 November 2008 to 21 November 2008, IEEE Computer Society, Los Alamitos CA USA, pp. 1895-1901.

Wang, Y., Le, P.D., Srinivasan, B., 2008, Efficient key management for secure wireless multicast, Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, 11 November 2008 to 13 November 2008, IEEE Computer Society, Los Alamitos CA USA, pp. 1131-1136.

Le Viet, M., Le, P.D., Srinivasan, B., 2007, A methodology for deriving objective image comparison metrics, Proceedings of the Ninth IASTED International Conference Signal and Image Processing, 20 August 2007 to 22 August 2007, ACTA Press, Anaheim CA USA, pp. 89-94.

Dandash, O., Wang, Y., Le, P.D., Srinivasan, B., 2007, A new dynamic key generation scheme for fraudulent internet payment prevention, Proceedings of the Fourth International Conference on Information Technology: New Generations, 2 April 2007 to 4 April 2007, IEEE Computer Society, Los Alamitos CA USA, pp. 83-88.

Dandash, O., Wang, Y., Le, P.D., Srinivasan, B., 2007, A new group key management structure for fraudulent internet banking payments detection, Proceedings of Ninth International Conference on Enterprise Information Systems: Software Agents and Internet Computing, 12 June 2007 to 16 June 2007, Institute for Systems and Technologies of Information, Control and Communication, Portugal, pp. 57-62.

Wang, Y., Le, P.D., Srinivasan, B., 2007, Hybrid group key management scheme for secure wireless multicast, Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11 July 2007 to 13 July 2007, IEEE Computer Society, Los Alamitos CA USA, pp. 346-351.

Dandash, O., Le, P.D., Srinivasan, B., 2007, Security analysis for internet banking models, Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 30 July 2007 to 1 August 2007, IEEE Computer Society, Los Alamitos CA USA, pp. 1141-1146.

Wu, W., Le, P.D., 2006, An efficient and secure code sharing for peer-to-peer communications, Proceedings of the Third International Conference on Information Technology: New Generations, 10 April 2006 to 12 April 2006, IEEE Computer Society, Los Alamitos CA USA, pp. 476-481.

Wang, Y., Damodaran, D., Le, P.D., 2006, Efficient group key management in wireless networks, Proceedings of the Third International Conference on Information Technology: New Generations, 10 April 2006 to 12 April 2006, IEEE Computer Society, Los Alamitos CA USA, pp. 432-439.

Damodaran, D., Singh, R., Le, P.D., 2006, Group key management in wireless networks using session keys, Proceedings of the Third International Conference on Information Technology: New Generations, 10 April 2006 to 12 April 2006, IEEE Computer Society, Los Alamitos CA USA, pp. 402-407.

Wu, X.P., Dandash, O., Le, P.D., Srinivasan, B., 2006, The design & implementation of a wireless payment system, Proceedings of the First International Conference on Communication System Software and Middleware, 08 January 2006 to 12 January 2006, Institute of Electrical and Electronics Engineers, New Delhi India, pp. 1-5.

Wu, X., Dandash, O., Le, P.D., 2006, The design and implementation of a smartphone payment system based on limited-used key generation scheme, Proceedings of the Third International Conference on Information Technology: New Generations, 10 April 2006 to 12 April 2006, IEEE Computer Society, Los Alamitos CA USA, pp. 458-463.

Chen, Y.J., Wang, Y., Wu, X.P., Le, P.D., 2006, The design of cluster-based group key management system in wireless networks, Proceedings of the 2006 10th International Conference on Communication Technology, 27 November 2006 to 30 November 2006, Institute of Electrical and Electronics Engineers, Inc., Beijing China, pp. 209-212.

Viet Le, M., Le, P.D., Srinivasan, B., 2005, A comparative study of image comparison methods embedded by smart surveillance systems, Proceedings of the 2005 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 24 July 2005 to 28 July 2005, The Institute of Electrical and Electronics Engineers (IEEE), Monterey CA USA, pp. 82-87.

Kungpisdan, S., Le, P.D., Srinivasan, B., 2005, A limited-used key generation scheme for internet transactions, Proceedings of the 5th International Workshop in Information Security Applications (WISA 2004), 23 August 2004 to 25 August 2004, Springer-Verlag, Berlin Germany, pp. 302-316.

Wang, Y., Le, P.D., 2005, Secure group communications in wireless networks, Proceedings of the Third International Conference on Advances in Mobile Mutimedia, 19 September 2005 to 21 September 2005, Austrian Computer Society (Oesterreichische Computer Gesellschaft), Vienna Austria, pp. 241-252.

Dandash, O., Wu, X., Le, P.D., 2005, Wireless Internet Payment System using Smart Cards, Proceedings of the International Conference on Information Technology: Coding and Computing, 04 April 2005 to 06 April 2005, IEEE Computer Society, Los Alamitos USA, pp. 16-21.

Singh, R., Damodaran, D., Le, P.D., 2005, Wireless client-server application model using limited key generation technique, Proceedings of the Third International Conference on Advances in Mobile Multimedia, 19 September 2005 to 21 September 2005, Austrian Computer Society (Oesterreichische Computer Gesellschaft), Vienna Austria, pp. 253-263.

Kungpisdan, S., Srinivasan, B., Le, P.D., 2004, A secure account-based mobile payment protocol, Proceedings of the ITCC 2004 International Conference on Information Technology: Coding and Computing, 05 April 2004 to 07 April 2004, IEEE Computer Society, Los Alamitos USA, pp. 35-39.

Kungpisdan, S., Srinivasan, B., Le, P.D., 2004, A secure prepaid wireless micropayment protocol, Security in Information Systems: Proceedings of the 2nd International Workshop on Security in Information Systems, 13 April 2004 to 14 April 2004, INSTICC Press, Portugal, pp. 104-113.

Kungpisdan, S., Srinivasan, B., Le, P.D., 2004, A secure wireless prepaid micropayment protocol with extension to postpaid micropayment, Proceedings of the Sixth International Conference on Information Integration and Web-based Applications & Services, 27 September 2004 to 29 September 2004, Austrian Computer Society, Indonesia, pp. 517-526.

Chan, W.C., Le Viet, M., Le, P.D., 2004, A wavelet and Canny based image comparison, Proceedings of the 2004 IEEE Conference on Cybernetics and Intelligent Systems, 01 December 2004 to 03 December 2004, IEEE Computer Society, Los Alamitos CA USA, pp. 329-333.

Kungpisdan, S., Srinivasan, B., Le, P.D., 2004, Accountability logic for mobile payment protocols, Proceedings of the ITCC 2004 International Conference on Information Technology: Coding and Computing, 05 April 2004 to 07 April 2004, IEEE Computer Society, Los Alamitos USA, pp. 40-44.

Kungpisdan, S., Srinivasan, B., Le, P.D., 2004, An integrated framework for payment transactions in wireless environments, Proceedings of The 2004 International Conference on Information and Communication Technologies, 18 November 2004 to 19 November 2004, Assumption University, Bangkok Thailand, pp. 158-168.

Toh, B.T.S., Kungpisdan, S., Le, P.D., 2004, KSL protocol: design and implementation, Proceedings of the 2004 IEEE Conference on Cybernetics and Intelligent Systems, 01 December 2004 to 03 December 2004, IEEE, Singapore, pp. 544-549.

Kungpisdan, S., Srinivasan, B., Le, P.D., 2003, A practical framework for mobile set payment, Proceedings of the IADIS International Conference: e-Society 2003, 03 June 2003 to 06 June 2003, IADIS Press, Lisbon PORTUGAL, pp. 321-328.

Kungpisdan, S., Srinivasan, B., Le, P.D., 2003, Lightweight mobile credit-card payment protocol, Proceedings of the 4th International Conference on Cryptology in India: Progress in Cryptology (INDOCRYPT 2003), 8 December 2003 to 10 December 2003, Springer-Verlag, Berlin Germany, pp. 295-308.

Chan, P.L., Srinivasan, B., Le, P.D., 2002, A generic algorithm for task allocation, Proceedings of the IASTED International Conference on Applied Modelling and Simulation, 04 November 2002 to 06 November 2002, ACTA Press, Anaheim USA, pp. 134-139.

Viet Le, M., Le, P.D., Srinivasan, B., 2002, New image quality measure based on wavelet transform, Proceedings of the IASTED International Conference on Applied Modelling and Simulation, 04 November 2002 to 06 November 2002, ACTA Press, Anaheim USA, pp. 28-33.

Tran, M., Ray, S., Le, P.D., 2001, A proposed alternative for a layer 2 of neocognitron, Visualization, Imaging, and Image Processing: Proceedings of the IASTED International Conference (VIIP 2001), 03 September 2001 to 05 September 2001, ACTA Press, CA USA, pp. 554-559.

Le, P.D., Srinivasan, B., 2000, Quality- based Fractal Image Compression, Proceedings of the 4th International Conference on Advances in Pattern Recognition and Digital Techniques (ICAPRDT 1999), Calcutta INDIA, 27 - 29 December 1999, Narosa Publishing House, New Delhi India, pp. 180-183.

Le, P.D., Srinivasan, B., Mohammed, S., Kulkarni, S., Wilson, C., 1998, A Measure for Image Quality, Proceedings of the 1998 ACM Symp. on Applied Computing, Atlanta USA, 27 February-1 March 1998, Association for Computing Machinery Inc., New York NY USA, pp. 513-519.

Le, P.D., Srinivasan, B., Le, H., Price, R., Mohammed, S., 1997, Abstract ticket engine to support mobile users, Proceedings of the 2nd Australian Workshop on Mobile Computing and Databases and Applications, Melbourne 27-28 November, Monash University, Melbourne Vic Australia, pp. 102-107.

Teaching Commitment

Dr Phu Le is the Chief Examiner for the following units in the Faculty of IT;

  • FIT3056 - Secure and trusted software systems
  • FIT3105 - Security and identity management
  • FIT4033 - Object oriented application programming in C++
  • FIT5044 - Network security
  • FIT5037 - Advanced network security

Phu teaches the following units in the Faculty of IT;

 

  • FIT3056 - Secure and trusted software systems
  • FIT3105 - Security and identity management
  • FIT5044 - Network security
  • FIT5037 - Advanced network security

 

 

 

 

Postgraduate Research Supervisions

Current Supervision

Program of Study:
(DOCTORATE BY RESEARCH).
Thesis Title:
Biometrics authentication for enhancing online banking and payment system by using smart phone.
Supervisors:
Le, P (Main), Srinivasan, B (Associate).
Program of Study:
(DOCTORATE BY RESEARCH).
Thesis Title:
Hypervisor-based OS Vulnerability Scanner.
Supervisors:
Le, P (Joint-co), Srinivasan, B (Joint).
Program of Study:
(DOCTORATE BY RESEARCH).
Thesis Title:
Secure mobile authentication in ubiquitous networking environments.
Supervisors:
Le, P (Joint-co), Srinivasan, B (Joint).
Program of Study:
(DOCTORATE BY RESEARCH).
Thesis Title:
Strong Authentication for Online Banking and E-Commerce Transaction Processing.
Supervisors:
Le, P (Main), Tan, J (Associate).

Completed Supervision

Student:
Dandash, O.
Program of Study:
Secure Internet Payment with Smart Cards. 2005.
Supervisors:
Le, P (Main).
Student:
Dandash, O.
Program of Study:
Secure architecture for internet banking system frauds. (PHD) 2011.
Supervisors:
Le, P (Joint-Co), Srinivasan, B (Joint).
Student:
Kungpisdan, S.
Program of Study:
MODELLING, DESIGN AND ANALYSIS OF SECURE MOBILE PAYMENT SYSTEMS. (PHD) 2005.
Supervisors:
Le, P (Joint), Srinivasan, B (Joint-Co).
Student:
Le, M.
Program of Study:
A framework for measuring the effectiveness of image representations. (PHD) 2011.
Supervisors:
Le, P (Joint), Srinivasan, B (Joint-Co).
Student:
Le, M.
Program of Study:
Wavelet-based perceptual image quality measure. (Masters) 2003.
Supervisors:
Le, P (Main), Srinivasan, B (Associate).
Student:
Ngo, H.
Program of Study:
Dynamic group-based authentication in wireless networks. (PHD) 2010.
Supervisors:
Le, P (Joint), Srinivasan, B (Joint-Co), Wilson, C (Associate).
Student:
Wang, Y.
Program of Study:
Key management for secure group applications in wireless networks. (PHD) 2008.
Supervisors:
Le, P (Main), Srinivasan, B (Associate).
Student:
Wu, X.
Program of Study:
Security architecture for sensitive information systems. (PHD) 2009.
Supervisors:
Le, P (Main), Srinivasan, B (Associate).