Follow
Vinh-Thong Ta
Vinh-Thong Ta
Verified email at edgehill.ac.uk - Homepage
Title
Cited by
Cited by
Year
Secure vehicular communication systems: implementation, performance, and research challenges
F Kargl, P Papadimitratos, L Buttyan, M Müter, E Schoch, B Wiedersheim, ...
IEEE Communications magazine 46 (11), 110-118, 2008
3312008
Augmenting zero trust architecture to endpoints using blockchain: A state‐of‐the‐art review
L Alevizos, VT Ta, M Hashem Eiza
Security and Privacy, e191, 2021
522021
Face de-identification with expressions preservation
G Letournel, A Bugeau, VT Ta, JP Domenger
2015 IEEE International Conference on Image Processing (ICIP), 4366-4370, 2015
492015
A secure road traffic congestion detection and notification concept based on V2I communications
VT Ta, A Dvir
Vehicular Communications 25, 100283, 2020
262020
Consistency verification of stateful firewalls is not harder than the stateless case
L Buttyán, G Pék, TV Thong
Infocommunications Journal 64 (1), 2-8, 2009
202009
Exemplar-based colorization in RGB color space
F Pierre, JF Aujol, A Bugeau, N Papadakis, VT Ta
2014 IEEE International Conference on Image Processing (ICIP), 625-629, 2014
192014
Blockchain-enabled Intrusion Detection and Prevention System of APTs within Zero Trust Architecture
L Alevizos, MH Eiza, VT Ta, Q Shi, J Read
IEEE Access, 2022
172022
Formal verification of secure ad-hoc network routing protocols using deductive model-checking
L Buttyán, TV Thong
Periodica Polytechnica, Electrical Engineering Journal 55 (1-2), 31-43, 2011
152011
Formal verification of secure ad-hoc network routing protocols using deductive model-checking
L Buttyán, TV Thong
WMNC2010, 1-6, 2010
152010
Automated road traffic congestion detection and alarm systems: Incorporating V2I communications into atcss
VT Ta
arXiv preprint arXiv:1606.01010, 2016
132016
STWSN: A Novel Secure Distributed Transport Protocol for Wireless Sensor Networks
A Dvir, VT Ta, S Erlich, L Buttyan
International Journal of Communication Systems (IJCS Wiley), 1-28, 2018
112018
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains
A Dvir, L Buttyan, TV Thong
2013 IEEE International Conference on Communications (ICC), 2073-2078, 2013
112013
Privacy by design: On the conformance between protocols and architectures
VT Ta, T Antignac
Foundations and Practice of Security, 65-81, 2015
102015
Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment
M Hashem Eiza, R Izuchukwu Okeke, J Dempsey, VT Ta
International Journal on Cyber Situational Awareness (IJCSA), 2021
8*2021
Children designing privacy warnings: Informing a set of design guidelines
J Dempsey, G Sim, B Cassidy, VT Ta
International Journal of Child-Computer Interaction 31, 2022
72022
Formal Accountability for Biometric Surveillance: A Case Study
VT Ta, D Butin, D Le Métayer
Privacy Technologies and Policy (Annual Privacy Forum) 9484, 21-37, 2016
62016
Dataprove: Fully automated conformance verification between data protection policies and system architectures
VT Ta, MH Eiza
Proceedings on Privacy Enhancing Technologies (PoPETs) 2022 (1), 565-585, 2022
52022
On automating the verification of secure ad-hoc network routing protocols
TV Thong, L Buttyán
Telecommunication Systems 52, 2611-2635, 2013
52013
Secure Vehicular Communication Systems: Implementation
FP Kargal, P Buttyan, L Muter, M Schoch, E Wiedersheim, ...
Ulm Univiversity, 2008
5*2008
On formal and automatic security verification of wsn transport protocols
VT Ta, L Buttyán, A Dvir
International Scholarly Research Notices 2014, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20