Follow
Xian Ping Wu
Xian Ping Wu
Verified email at monash.edu
Title
Cited by
Cited by
Year
Dynamic Key Cryptography and Applications.
HH Ngo, X Wu, PD Le, C Wilson, B Srinivasan
Int. J. Netw. Secur. 10 (3), 161-174, 2010
702010
An Individual and Group Authentication Model for Wireless Network Services.
HH Ngo, X Wu, PD Le, B Srinivasan
J. Convergence Inf. Technol. 5 (1), 82-94, 2010
352010
Security Architecture for sensitive information systems
X Wu, B Srinivasan, PD Le
INTECH Open Access Publisher, 2010
182010
The design and implementation of a smartphone payment system based on limited-used key generation scheme
X Wu, O Dandash, PD Le
Third International Conference on Information Technology: New Generations …, 2006
162006
Dynamic Keys Based Sensitive Information System
X Wu, PD Le, B Srinivasan
2008 The 9th International Conference for Young Computer Scientists, 1895-1901, 2008
142008
Probabilistic Encryption--A Comparative Analysis against RSA and ECC
OM Creado, X Wu, Y Wang, PD Le
2009 Fourth International Conference on Computer Sciences and Convergence …, 2009
122009
The design of cluster-based group key management system in wireless networks
YJ Chen, YL Wang, XP Wu, PD Le
2006 International Conference on Communication Technology, 1-4, 2006
112006
Attenuator for W-band folded waveguide TWT
J Cai, J Feng, Y Hu, X Wu, B Qu, S Ma, J Zhang, T Chen
2008 IEEE International Vacuum Electronics Conference, 20-21, 2008
92008
Probabilistic Encryption--A Practical Implementation
OM Creado, Y Wang, X Wu, PD Le
2009 Fourth International Conference on Computer Sciences and Convergence …, 2009
82009
Wireless internet payment system using smart cards
O Dandash, X Wu, PD Le
International Conference on Information Technology: Coding and Computing …, 2005
82005
Novel hybrid group key agreement for sensitive information systems
X Wu, HHH Ngo, PD Le, B Srinivasan, H Qi
Journal of Convergence Information Technology 5 (1), 69-81, 2010
72010
A method for Authentication services in wireless networks
HH Ngo, XP Wu, PD Le, C Wilson
72008
15.2: Investigation of THz regenerative oscillator
J Cai, J Feng, Y Hu, X Wu
2010 IEEE International Vacuum Electronics Conference (IVEC), 323-324, 2010
52010
Package-role based authorization control model for wireless network services
HH Ngo, X Wu, PD Le, C Wilson
2009 International Conference on Availability, Reliability and Security, 475-480, 2009
52009
A Novel Authentication Protocol for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management
X Wu, HH Ngo, PD Le, B Srinivasan
2008 Third International Conference on Convergence and Hybrid Information …, 2008
52008
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems.
X Wu, HH Ngo, PD Le, B Srinivasan
Security and Management, 93-99, 2008
52008
An Authentication Model for Wireless Network Services
HH Ngo, X Wu, PD Le, B Srinivasan
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
42010
A Group Authentication Model for Wireless Network Services Based on Group Key Management.
HH Ngo, X Wu, PD Le
ICEIS (3-2), 182-188, 2008
42008
Holistic approach for critical system security: Flooding prevention
M Alhabeeb, X Wu, A Almuhaideb, PD Le, B Srinivasan
INC2010: 6th International Conference on Networked Computing, 1-8, 2010
22010
Design & Implementation of a Secure Sensitive Information System for Wireless Mobile Devices
X Wu, HH Ngo, PD Le, B Srinivasan
2008 Australasian Telecommunication Networks and Applications Conference, 45-50, 2008
22008
The system can't perform the operation now. Try again later.
Articles 1–20