Folgen
Hien Truong
Hien Truong
Elisa Corporation
Bestätigte E-Mail-Adresse bei elisa.fi
Titel
Zitiert von
Zitiert von
Jahr
Towards secure and decentralized sharing of IoT data
HTT Truong, M Almeida, G Karame, C Soriente
2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019
1002019
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
972014
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
International Conference on Financial Cryptography and Data Security, 349-364, 2014
942014
The company you keep: Mobile malware infection rates and inexpensive risk indicators
HTT Truong, E Lagerspetz, P Nurmi, AJ Oliner, S Tarkoma, N Asokan, ...
Proceedings of the 23rd international conference on World wide web, 39-50, 2014
882014
Sensor-based proximity detection in the face of active adversaries
B Shrestha, N Saxena, HTT Truong, N Asokan
IEEE Transactions on Mobile Computing 18 (2), 444-457, 2018
352018
Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
Pervasive and Mobile Computing 16, 187-204, 2015
292015
IoTCrawler: Browsing the internet of things
AF Skarmeta, J Santa, JA Martínez, JX Parreira, P Barnaghi, S Enshaeifar, ...
2018 Global Internet of Things Summit (GIoTS), 1-6, 2018
242018
Iotcrawler: Challenges and solutions for searching the internet of things
T Iggena, E Bin Ilyas, M Fischer, R Tönjes, T Elsaleh, R Rezvani, ...
Sensors 21 (5), 1559, 2021
202021
Contextual proximity detection in the face of context-manipulating adversaries
B Shrestha, N Saxena, HTT Truong, N Asokan
arXiv preprint arXiv:1511.00905, 2015
162015
DoubleEcho: Mitigating context-manipulation attacks in copresence verification
HTT Truong, J Toivonen, TD Nguyen, C Soriente, S Tarkoma, N Asokan
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
102019
MDoctor: A mobile malware prognosis application
E Lagerspetz, HTT Truong, S Tarkoma, N Asokan
2014 IEEE 34th international conference on distributed computing systems …, 2014
102014
Authenticating operation-based history in collaborative systems
HTT Truong, CL Ignat, P Molli
Proceedings of the 2012 ACM International Conference on Supporting Group …, 2012
102012
An efficient identity-based broadcast signcryption scheme
DT Hien, TN Tien, TTT Hien
2010 Second International Conference on Knowledge and Systems Engineering …, 2010
102010
[Retracted] Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts
H Truong, JL Hernandez-Ramos, JA Martinez, J Bernal Bernabe, W Li, ...
Security and Communication Networks 2022 (1), 1828747, 2022
72022
Proximity verification based on acoustic room impulse response
HTT Truong, J Toivonen, TD Nguyen, S Tarkoma, N Asokan
arXiv preprint arXiv:1803.07211, 2018
62018
An ontological approach to lifelog representation for disclosure control
TTT Hien, S Eitoku, T Yamada, S Muto, M Abe
2009 IEEE 13th International Symposium on Consumer Electronics, 932-936, 2009
62009
Log auditing for trust assessment in peer-to-peer collaboration
HTT Truong, CL Ignat
2011 10th International Symposium on Parallel and Distributed Computing, 207-214, 2011
52011
Collaborative editing with contract over friend-to-friend networks
HTT Truong, MR Bouguelia, CL Ignat, P Molli
42011
IoT European security and privacy projects: Integration, architectures and interoperability
E Ferrera, C Pastrone, PE Brun, R De Besombes, K Loupos, ...
Next Generation Internet of Things–Distributed Intelligence at the Edge and …, 2022
32022
On the security of randomized defenses against adversarial samples
K Sharad, GA Marson, HTT Truong, G Karame
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
32020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20