BibTeX records: Hien Thi Thu Truong

download as .bib file

@article{DBLP:journals/percom/ShresthaTTSTN23,
  author       = {Prakash Shrestha and
                  Hien Thi Thu Truong and
                  Pupu Toivonen and
                  Nitesh Saxena and
                  Sasu Tarkoma and
                  Petteri Nurmi},
  title        = {Chirp-Loc: Multi-factor authentication via acoustically-generated
                  location signatures},
  journal      = {Pervasive Mob. Comput.},
  volume       = {88},
  pages        = {101720},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.pmcj.2022.101720},
  doi          = {10.1016/J.PMCJ.2022.101720},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/ShresthaTTSTN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FaonioVST22,
  author       = {Antonio Faonio and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Claudio Soriente and
                  Hien Thi Thu Truong},
  editor       = {Alastair R. Beresford and
                  Arpita Patra and
                  Emanuele Bellini},
  title        = {Auditable Asymmetric Password Authenticated Public Key Establishment},
  booktitle    = {Cryptology and Network Security - 21st International Conference, {CANS}
                  2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13641},
  pages        = {122--142},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20974-1\_6},
  doi          = {10.1007/978-3-031-20974-1\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/FaonioVST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/IggenaIFTERP0FP21,
  author       = {Thorben Iggena and
                  Eushay Bin Ilyas and
                  Marten Fischer and
                  Ralf T{\"{o}}njes and
                  Tarek Elsaleh and
                  Roonak Rezvani and
                  Narges Pourshahrokhi and
                  Stefan Bischof and
                  Andreas Fernbach and
                  Josiane Xavier Parreira and
                  Patrik Schneider and
                  Pavel Smirnov and
                  Martin Strohbach and
                  Hien Thi Thu Truong and
                  Aurora Gonz{\'{a}}lez{-}Vidal and
                  Antonio F. Skarmeta and
                  Parwinder Singh and
                  Michail J. Beliatis and
                  Mirko Presser and
                  Juan Antonio Mart{\'{\i}}nez and
                  Pedro Gonzalez{-}Gil and
                  Marianne Krogb{\ae}k and
                  Sebastian Holmgard Christophersen},
  title        = {IoTCrawler: Challenges and Solutions for Searching the Internet of
                  Things},
  journal      = {Sensors},
  volume       = {21},
  number       = {5},
  pages        = {1559},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21051559},
  doi          = {10.3390/S21051559},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/IggenaIFTERP0FP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SharadMTK20,
  author       = {Kumar Sharad and
                  Giorgia Azzurra Marson and
                  Hien Thi Thu Truong and
                  Ghassan Karame},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {On the Security of Randomized Defenses Against Adversarial Samples},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {381--393},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384751},
  doi          = {10.1145/3320269.3384751},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SharadMTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioVST20,
  author       = {Antonio Faonio and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Claudio Soriente and
                  Hien Thi Thu Truong},
  title        = {Auditable Asymmetric Password Authenticated Public Key Establishment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/060},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioVST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ShresthaSTA19,
  author       = {Babins Shrestha and
                  Nitesh Saxena and
                  Hien Thi Thu Truong and
                  N. Asokan},
  title        = {Sensor-Based Proximity Detection in the Face of Active Adversaries},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {444--457},
  year         = {2019},
  url          = {https://doi.org/10.1109/TMC.2018.2839604},
  doi          = {10.1109/TMC.2018.2839604},
  timestamp    = {Tue, 05 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/ShresthaSTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/TruongAKS19,
  author       = {Hien Thi Thu Truong and
                  Miguel Almeida and
                  Ghassan Karame and
                  Claudio Soriente},
  title        = {Towards Secure and Decentralized Sharing of IoT Data},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {176--183},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00031},
  doi          = {10.1109/BLOCKCHAIN.2019.00031},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/TruongAKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/TruongTNSTA19,
  author       = {Hien Thi Thu Truong and
                  Juhani Toivonen and
                  Thien Duc Nguyen and
                  Claudio Soriente and
                  Sasu Tarkoma and
                  N. Asokan},
  title        = {DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence
                  Verification},
  booktitle    = {2019 {IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom, Kyoto, Japan, March 11-15, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PERCOM.2019.8767404},
  doi          = {10.1109/PERCOM.2019.8767404},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/TruongTNSTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/aise/Gonzalez-GilMTSS19,
  author       = {Pedro Gonzalez{-}Gil and
                  Juan Antonio Mart{\'{\i}}nez and
                  Hien Thi Thu Truong and
                  Alessandro Sforzin and
                  Antonio F. Skarmeta},
  editor       = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Antonio F. Skarmeta},
  title        = {IoTCrawler. Managing Security and Privacy for IoT},
  booktitle    = {Security and Privacy in the Internet of Things: Challenges and Solutions},
  series       = {Ambient Intelligence and Smart Environments},
  volume       = {27},
  pages        = {167--181},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/AISE200011},
  doi          = {10.3233/AISE200011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/aise/Gonzalez-GilMTSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-09015,
  author       = {Hien Thi Thu Truong and
                  Miguel Almeida and
                  Ghassan Karame and
                  Claudio Soriente},
  title        = {Towards Secure and Decentralized Sharing of IoT Data},
  journal      = {CoRR},
  volume       = {abs/1908.09015},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.09015},
  eprinttype    = {arXiv},
  eprint       = {1908.09015},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-09015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/giots/SkarmetaSMPBEBP18,
  author       = {Antonio F. Skarmeta and
                  Jos{\'{e}} Santa and
                  Juan A. Mart{\'{\i}}nez and
                  Josiane Xavier Parreira and
                  Payam M. Barnaghi and
                  Shirin Enshaeifar and
                  Michail J. Beliatis and
                  Mirko A. Presser and
                  Thorben Iggena and
                  Marten Fischer and
                  Ralf T{\"{o}}njes and
                  Martin Strohbach and
                  Alessandro Sforzin and
                  Hien Thi Thu Truong},
  title        = {IoTCrawler: Browsing the Internet of Things},
  booktitle    = {2018 Global Internet of Things Summit, GIoTS 2018, Bilbao, Spain,
                  June 4-7, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GIOTS.2018.8534528},
  doi          = {10.1109/GIOTS.2018.8534528},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/giots/SkarmetaSMPBEBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-07211,
  author       = {Hien Thi Thu Truong and
                  Juhani Toivonen and
                  Thien Duc Nguyen and
                  Sasu Tarkoma and
                  N. Asokan},
  title        = {Proximity Verification Based on Acoustic Room Impulse Response},
  journal      = {CoRR},
  volume       = {abs/1803.07211},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.07211},
  eprinttype    = {arXiv},
  eprint       = {1803.07211},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-07211.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-04293,
  author       = {Kumar Sharad and
                  Giorgia Azzurra Marson and
                  Hien Thi Thu Truong and
                  Ghassan Karame},
  title        = {Mix'n'Squeeze: Thwarting Adaptive Adversarial Samples Using Randomized
                  Squeezing},
  journal      = {CoRR},
  volume       = {abs/1812.04293},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.04293},
  eprinttype    = {arXiv},
  eprint       = {1812.04293},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-04293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShresthaSTA15,
  author       = {Babins Shrestha and
                  Nitesh Saxena and
                  Hien Thi Thu Truong and
                  N. Asokan},
  title        = {Contextual Proximity Detection in the Face of Context-Manipulating
                  Adversaries},
  journal      = {CoRR},
  volume       = {abs/1511.00905},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.00905},
  eprinttype    = {arXiv},
  eprint       = {1511.00905},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShresthaSTA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ShresthaSTA14,
  author       = {Babins Shrestha and
                  Nitesh Saxena and
                  Hien Thi Thu Truong and
                  N. Asokan},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Drone to the Rescue: Relay-Resilient Authentication using Ambient
                  Multi-sensing},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {349--364},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_23},
  doi          = {10.1007/978-3-662-45472-5\_23},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ShresthaSTA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/LagerspetzTTA14,
  author       = {Eemil Lagerspetz and
                  Hien Thi Thu Truong and
                  Sasu Tarkoma and
                  N. Asokan},
  title        = {MDoctor: {A} Mobile Malware Prognosis Application},
  booktitle    = {34th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  pages        = {201--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCSW.2014.36},
  doi          = {10.1109/ICDCSW.2014.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/LagerspetzTTA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/TruongGSSAN14,
  author       = {Hien Thi Thu Truong and
                  Xiang Gao and
                  Babins Shrestha and
                  Nitesh Saxena and
                  N. Asokan and
                  Petteri Nurmi},
  title        = {Comparing and fusing different sensor modalities for relay attack
                  resistance in Zero-Interaction Authentication},
  booktitle    = {{IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom 2014, Budapest, Hungary, March 24-28, 2014},
  pages        = {163--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PerCom.2014.6813957},
  doi          = {10.1109/PERCOM.2014.6813957},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/TruongGSSAN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/TruongLNOTAB14,
  author       = {Hien Thi Thu Truong and
                  Eemil Lagerspetz and
                  Petteri Nurmi and
                  Adam J. Oliner and
                  Sasu Tarkoma and
                  N. Asokan and
                  Sourav Bhattacharya},
  editor       = {Chin{-}Wan Chung and
                  Andrei Z. Broder and
                  Kyuseok Shim and
                  Torsten Suel},
  title        = {The company you keep: mobile malware infection rates and inexpensive
                  risk indicators},
  booktitle    = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic
                  of Korea, April 7-11, 2014},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2566486.2568046},
  doi          = {10.1145/2566486.2568046},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/TruongLNOTAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TruongLNOTAB13,
  author       = {Hien Thi Thu Truong and
                  Eemil Lagerspetz and
                  Petteri Nurmi and
                  Adam J. Oliner and
                  Sasu Tarkoma and
                  N. Asokan and
                  Sourav Bhattacharya},
  title        = {The Company You Keep: Mobile Malware Infection Rates and Inexpensive
                  Risk Indicators},
  journal      = {CoRR},
  volume       = {abs/1312.3245},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.3245},
  eprinttype    = {arXiv},
  eprint       = {1312.3245},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/TruongLNOTAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Truong12,
  author       = {Hien Thi Thu Truong},
  title        = {A Contract-based and Trust-aware Collaboration Model. (Un mod{\`{e}}le
                  de collaboration bas{\'{e}} sur les contrats et la confiance)},
  school       = {University of Lorraine, Nancy, France},
  year         = {2012},
  url          = {https://tel.archives-ouvertes.fr/tel-00769076},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Truong12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcis/TruongIM12,
  author       = {Hien Thi Thu Truong and
                  Claudia{-}Lavinia Ignat and
                  Pascal Molli},
  title        = {A Contract-Extended Push-Pull-Clone Model for Multi-Synchronous Collaboration},
  journal      = {Int. J. Cooperative Inf. Syst.},
  volume       = {21},
  number       = {3},
  pages        = {221},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0218843012410031},
  doi          = {10.1142/S0218843012410031},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcis/TruongIM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/group/TruongIM12,
  author       = {Hien Thi Thu Truong and
                  Claudia{-}Lavinia Ignat and
                  Pascal Molli},
  editor       = {Thomas A. Finholt and
                  Hilda Tellioglu and
                  Kori Inkpen and
                  Tom Gross},
  title        = {Authenticating operation-based history in collaborative systems},
  booktitle    = {{ACM} 2012 International Conference on Support Group Work, {GROUP}
                  '12, Sanibel Island, FL, USA, October 27-31, 2012},
  pages        = {131--140},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2389176.2389197},
  doi          = {10.1145/2389176.2389197},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/group/TruongIM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/TruongIBM11,
  author       = {Hien Thi Thu Truong and
                  Claudia{-}Lavinia Ignat and
                  Mohamed{-}Rafik Bouguelia and
                  Pascal Molli},
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {A contract-extended push-pull-clone model},
  booktitle    = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  pages        = {211--220},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247184},
  doi          = {10.4108/ICST.COLLABORATECOM.2011.247184},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/TruongIBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispdc/TruongI11,
  author       = {Hien Thi Thu Truong and
                  Claudia{-}Lavinia Ignat},
  title        = {Log Auditing for Trust Assessment in Peer-to-Peer Collaboration},
  booktitle    = {10th International Symposium on Parallel and Distributed Computing,
                  {ISPDC} 2011, Cluj-Napoca, Romania, July 6-8, 2011},
  pages        = {207--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISPDC.2011.38},
  doi          = {10.1109/ISPDC.2011.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispdc/TruongI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-1131,
  author       = {Hien Thi Thu Truong and
                  Claudia{-}Lavinia Ignat},
  title        = {A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration},
  journal      = {CoRR},
  volume       = {abs/1012.1131},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.1131},
  eprinttype    = {arXiv},
  eprint       = {1012.1131},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-1131.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}