Hien Truong
Hien Truong
Vahvistettu sähköpostiosoite verkkotunnuksessa neclab.eu
Nimike
Viittaukset
Viittaukset
Vuosi
The company you keep: Mobile malware infection rates and inexpensive risk indicators
HTT Truong, E Lagerspetz, P Nurmi, AJ Oliner, S Tarkoma, N Asokan, ...
Proceedings of the 23rd international conference on World wide web, 39-50, 2014
722014
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
International Conference on Financial Cryptography and Data Security, 349-364, 2014
682014
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
642014
Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
Pervasive and Mobile Computing 16, 187-204, 2015
232015
Contextual proximity detection in the face of context-manipulating adversaries
B Shrestha, N Saxena, HTT Truong, N Asokan
arXiv preprint arXiv:1511.00905, 2015
112015
IoTCrawler: Browsing the internet of things
AF Skarmeta, J Santa, JA Martínez, JX Parreira, P Barnaghi, S Enshaeifar, ...
2018 Global Internet of Things Summit (GIoTS), 1-6, 2018
102018
Sensor-based proximity detection in the face of active adversaries
B Shrestha, N Saxena, HTT Truong, N Asokan
IEEE Transactions on Mobile Computing 18 (2), 444-457, 2018
102018
Towards secure and decentralized sharing of IoT data
HTT Truong, M Almeida, G Karame, C Soriente
2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019
92019
MDoctor: A mobile malware prognosis application
E Lagerspetz, HTT Truong, S Tarkoma, N Asokan
2014 IEEE 34th international conference on distributed computing systems …, 2014
82014
An efficient identity-based broadcast signcryption scheme
DT Hien, TN Tien, TTT Hien
2010 Second International Conference on Knowledge and Systems Engineering …, 2010
72010
Authenticating operation-based history in collaborative systems
HTT Truong, CL Ignat, P Molli
Proceedings of the 17th ACM international conference on Supporting group …, 2012
62012
Proximity verification based on acoustic room impulse response
HTT Truong, J Toivonen, TD Nguyen, S Tarkoma, N Asokan
arXiv preprint arXiv:1803.07211, 2018
52018
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
HTT Truong, J Toivonen, TD Nguyen, C Soriente, S Tarkoma, N Asokan
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
42019
An ontological approach to lifelog representation for disclosure control
TTT Hien, S Eitoku, T Yamada, S Muto, M Abe
2009 IEEE 13th International Symposium on Consumer Electronics, 932-936, 2009
42009
IoT European security and privacy projects: Integration, architectures and interoperability
E Ferrera, C Pastrone, PE Brun, R De Besombes, K Loupos, ...
Next Generation Internet of Things. Distributed Intelligence at the Edge and …, 2018
32018
Log auditing for trust assessment in peer-to-peer collaboration
HTT Truong, CL Ignat
2011 10th International Symposium on Parallel and Distributed Computing, 207-214, 2011
22011
Collaborative editing with contract over friend-to-friend networks
HTT Truong, MR Bouguelia, CL Ignat, P Molli
22011
A Contract-based and Trust-aware Collaboration Model
HTT Truong
12012
A contract-extended push-pull-clone model for multi-synchronous collaboration
HTT Truong, CL Ignat, P Molli
International Journal of Cooperative Information Systems 21 (03), 221-262, 2012
12012
A contract-extended push-pull-clone model
HTT Truong, CL Ignat, MR Bouguelia, P Molli
7th International Conference on Collaborative Computing: Networking …, 2011
12011
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20