Toan Nguyen
Toan Nguyen
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
T Van Nguyen, N Sae-Bae, N Memon
Computers & Security 66, 115-128, 2017
Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, J Markus, M Nasir
Security, Privacy and User Interaction, 5-22, 2020
Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computers & Security 65, 14-28, 2017
Illusionpin: Shoulder-surfing resistant authentication using hybrid images
A Papadopoulos, T Nguyen, E Durmus, N Memon
IEEE Transactions on Information Forensics and Security 12 (12), 2875-2889, 2017
Tap-based User Authentication for Smartwatches
T Nguyen, N Memon
Computer & Security, 2018
Smartwatches Locking Methods: A Comparative Study.
T Nguyen, ND Memon
SOUPS, 2017
A Deep Learning Model with Hierarchical LSTMs and Supervised Attention for Anti-Phishing
M Nguyen, T Nguyen, T Nguyen
Proceedings of the 1st Anti-Phishing Shared Pilot at 4th ACM International …, 2018
Finger-drawn PIN Authentication On Touch Devices
T Nguyen, N Sae-Bae, N Memon
Image Processing (ICIP), 2014 IEEE International Conference on, 5002-5006, 2014
Kid on the phone! Toward automatic detection of children on mobile devices
T Nguyen, A Roy, N Memon
Computers & Security 84, 334-348, 2019
Verification Code Forwarding Attack
H Siadati, T Nguyen, N Memon
9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9 …, 2015
X-platform phishing: Abusing trust for targeted attacks short paper
H Siadati, T Nguyen, N Memon
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
User Identification and Authentication on Emerging Interfaces
T Van Nguyen
New York University Tandon School of Engineering, 2018
Hệ phần mềm nhận dạng vân tay tự động
NTH Lan, NN Kỷ, NTH Thuỷ, NV Toàn
Tạp chí Công nghệ thông tin và Truyền thông, 45-52, 2011
Bảo mật truy cập dựa trên BioPKI và ứng dụng để bảo mật hệ nhận dạng vân tay C@ FRIS
NV Toàn, NTH Thuỷ, NN Kỷ, NTH Lan
Chuyên san tạp chí Thông tin, Khoa học công nghệ của Bộ Thông tin và Truyền …, 2011
Xây dựng giải pháp bảo mật BioPKI và ứng dụng để bảo mật hệ thống nhận dạng vân tay
NTH Thuỷ, NV Toàn, NN Kỷ, NTH Lan
Kỷ yếu hội thảo quốc gia: Một số vấn đề chọn lọc của Công nghệ thông tin và …, 2010
BioPKI model and Remote Access Control using Bio-Etoken in BioPKI System
NTH Lan, N Van Toan
IEEE-RIVF 2010 Addendum Contribution Proceeding, 50-53, 2010
Comparing network security specifications across equivalent networks
T Nguyen
US Patent App. 16/675,678, 2021
Detecting DGA Botnet based on Malware Behavior Analysis
K Nguyen Quoc, T Bui, D Le, D Tran, T Nguyen, HT Nguyen Nguyen
SoICT 2022: The 11th International Symposium on Information and …, 2022
Comparing network security specifications for a network to implement a network security policy for the network
T Nguyen
US Patent 11,405,426, 2022
Correlation of security policy input and output changes
TV Nguyen
US Patent App. US17/248,347, 2022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20