Suivre
Tran Viet Xuan Phuong
Tran Viet Xuan Phuong
Adresse e-mail validée de odu.edu - Page d'accueil
Titre
Citée par
Citée par
Année
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1482014
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
1432015
GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning.
Q Zhang, C Wang, H Wu, C Xin, TV Phuong
IJCAI, 3933-3939, 2018
632018
Puncturable attribute-based encryption for secure data delivery in internet of things
TVX Phuong, R Ning, C Xin, H Wu
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1511-1519, 2018
262018
Attribute based broadcast encryption with short ciphertext and decryption key
TVX Phuong, G Yang, W Susilo, X Chen
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
242015
An efficient privacy preserving message authentication scheme for internet-of-things
J Wei, TVX Phuong, G Yang
IEEE Transactions on Industrial Informatics 17 (1), 617-626, 2020
162020
Efficient hidden vector encryption with constant-size ciphertext
TVX Phuong, G Yang, W Susilo
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
152014
Poster: Efficient ciphertext policy attribute based encryption under decisional linear assumption
TVX Phuong, G Yang, W Susilo
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
112014
Efficient ciphertext-policy abe with constant ciphertext length
PVX Tran, TN Dinh, A Miyaji
2012 7th International Conference on Computing and Convergence Technology …, 2012
112012
Constant-ciphertext-size dual policy attribute based encryption
A Miyaji, PVX Tran
Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012
92012
Privacy preserving jaccard similarity by cloud-assisted for classification
TTN Le, TVX Phuong
Wireless Personal Communications 112 (3), 1875-1892, 2020
82020
Puncturable proxy re-encryption supporting to group messaging service
TVX Phuong, W Susilo, J Kim, G Yang, D Liu
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
82019
Sequence aware functional encryption and its application in searchable encryption
TVX Phuong, G Yang, W Susilo, F Guo, Q Huang
Journal of Information Security and Applications 35, 106-118, 2017
62017
Non-equivocation in blockchain: double-authentication-preventing signatures gone contractual
Y Li, W Susilo, G Yang, Y Yu, TVX Phuong, D Liu
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
42021
Location based encryption
T Viet Xuan Phuong, W Susilo, G Yang, J Yan, D Liu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
32019
Edit distance based encryption and its application
TVX Phuong, G Yang, W Susilo, K Liang
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
32016
Concise mercurial subvector commitments: Definitions and constructions
Y Li, W Susilo, G Yang, TVX Phuong, Y Yu, D Liu
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
22021
Efficient secure text retrieval on multi-keyword search
TVX Phuong, TTN Le
Proceedings of the 8th International Symposium on Information and …, 2017
22017
SyLPEnIoT: Symmetric lightweight predicate encryption for data privacy applications in IoT environments
T Viet Xuan Phuong, W Susilo, G Yang, J Kim, YW Chow, D Liu
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
12021
Criteria-based encryption
TVX Phuong, G Yang, W Susilo
The Computer Journal 61 (4), 512-525, 2018
12018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20