Hien Truong
Hien Truong
Vahvistettu sähköpostiosoite verkkotunnuksessa neclab.eu
Nimike
Viittaukset
Viittaukset
Vuosi
The company you keep: Mobile malware infection rates and inexpensive risk indicators
HTT Truong, E Lagerspetz, P Nurmi, AJ Oliner, S Tarkoma, N Asokan, ...
Proceedings of the 23rd international conference on World wide web, 39-50, 2014
702014
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
International Conference on Financial Cryptography and Data Security, 349-364, 2014
632014
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
612014
Using contextual co-presence to strengthen zero-interaction authentication: Design, integration and usability
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
Pervasive and Mobile Computing 16, 187-204, 2015
232015
Contextual proximity detection in the face of context-manipulating adversaries
B Shrestha, N Saxena, HTT Truong, N Asokan
arXiv preprint arXiv:1511.00905, 2015
112015
MDoctor: A mobile malware prognosis application
E Lagerspetz, HTT Truong, S Tarkoma, N Asokan
2014 IEEE 34th international conference on distributed computing systems …, 2014
92014
IoTCrawler: Browsing the internet of things
AF Skarmeta, J Santa, JA Martínez, JX Parreira, P Barnaghi, S Enshaeifar, ...
2018 Global Internet of Things Summit (GIoTS), 1-6, 2018
82018
Sensor-based proximity detection in the face of active adversaries
B Shrestha, N Saxena, HTT Truong, N Asokan
IEEE Transactions on Mobile Computing 18 (2), 444-457, 2018
82018
Authenticating operation-based history in collaborative systems
HTT Truong, CL Ignat, P Molli
Proceedings of the 17th ACM international conference on Supporting group …, 2012
62012
An efficient identity-based broadcast signcryption scheme
DT Hien, TN Tien, TTT Hien
2010 Second International Conference on Knowledge and Systems Engineering …, 2010
62010
Proximity verification based on acoustic room impulse response
HTT Truong, J Toivonen, TD Nguyen, S Tarkoma, N Asokan
arXiv preprint arXiv:1803.07211, 2018
52018
An ontological approach to lifelog representation for disclosure control
TTT Hien, S Eitoku, T Yamada, S Muto, M Abe
2009 IEEE 13th International Symposium on Consumer Electronics, 932-936, 2009
42009
IoT European Security and Privacy Projects: Integration, Architectures and Interoperability
E Ferrera, C Pastrone, PE Brun, R De Besombes, K Loupos, ...
Next Generation Internet of Things. Distributed Intelligence at the Edge and …, 2018
32018
Towards Secure and Decentralized Sharing of IoT Data
HTT Truong, M Almeida, G Karame, C Soriente
2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019
22019
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
HTT Truong, J Toivonen, TD Nguyen, C Soriente, S Tarkoma, N Asokan
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
22019
Log auditing for trust assessment in peer-to-peer collaboration
HTT Truong, CL Ignat
2011 10th International Symposium on Parallel and Distributed Computing, 207-214, 2011
22011
Collaborative editing with contract over friend-to-friend networks
HTT Truong, MR Bouguelia, CL Ignat, P Molli
22011
A Contract-based and Trust-aware Collaboration Model
HTT Truong
12012
A contract-extended push-pull-clone model for multi-synchronous collaboration
HTT Truong, CL Ignat, P Molli
International Journal of Cooperative Information Systems 21 (03), 221-262, 2012
12012
A contract-extended push-pull-clone model
HTT Truong, CL Ignat, MR Bouguelia, P Molli
7th International Conference on Collaborative Computing: Networking …, 2011
12011
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20