default search action
BibTeX records: Hien Thi Thu Truong
@article{DBLP:journals/percom/ShresthaTTSTN23, author = {Prakash Shrestha and Hien Thi Thu Truong and Pupu Toivonen and Nitesh Saxena and Sasu Tarkoma and Petteri Nurmi}, title = {Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures}, journal = {Pervasive Mob. Comput.}, volume = {88}, pages = {101720}, year = {2023}, url = {https://doi.org/10.1016/j.pmcj.2022.101720}, doi = {10.1016/J.PMCJ.2022.101720}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/ShresthaTTSTN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FaonioVST22, author = {Antonio Faonio and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Claudio Soriente and Hien Thi Thu Truong}, editor = {Alastair R. Beresford and Arpita Patra and Emanuele Bellini}, title = {Auditable Asymmetric Password Authenticated Public Key Establishment}, booktitle = {Cryptology and Network Security - 21st International Conference, {CANS} 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13641}, pages = {122--142}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20974-1\_6}, doi = {10.1007/978-3-031-20974-1\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/FaonioVST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/IggenaIFTERP0FP21, author = {Thorben Iggena and Eushay Bin Ilyas and Marten Fischer and Ralf T{\"{o}}njes and Tarek Elsaleh and Roonak Rezvani and Narges Pourshahrokhi and Stefan Bischof and Andreas Fernbach and Josiane Xavier Parreira and Patrik Schneider and Pavel Smirnov and Martin Strohbach and Hien Thi Thu Truong and Aurora Gonz{\'{a}}lez{-}Vidal and Antonio F. Skarmeta and Parwinder Singh and Michail J. Beliatis and Mirko Presser and Juan Antonio Mart{\'{\i}}nez and Pedro Gonzalez{-}Gil and Marianne Krogb{\ae}k and Sebastian Holmgard Christophersen}, title = {IoTCrawler: Challenges and Solutions for Searching the Internet of Things}, journal = {Sensors}, volume = {21}, number = {5}, pages = {1559}, year = {2021}, url = {https://doi.org/10.3390/s21051559}, doi = {10.3390/S21051559}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/IggenaIFTERP0FP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SharadMTK20, author = {Kumar Sharad and Giorgia Azzurra Marson and Hien Thi Thu Truong and Ghassan Karame}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {On the Security of Randomized Defenses Against Adversarial Samples}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {381--393}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384751}, doi = {10.1145/3320269.3384751}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SharadMTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioVST20, author = {Antonio Faonio and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Claudio Soriente and Hien Thi Thu Truong}, title = {Auditable Asymmetric Password Authenticated Public Key Establishment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2020}, url = {https://eprint.iacr.org/2020/060}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioVST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ShresthaSTA19, author = {Babins Shrestha and Nitesh Saxena and Hien Thi Thu Truong and N. Asokan}, title = {Sensor-Based Proximity Detection in the Face of Active Adversaries}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {18}, number = {2}, pages = {444--457}, year = {2019}, url = {https://doi.org/10.1109/TMC.2018.2839604}, doi = {10.1109/TMC.2018.2839604}, timestamp = {Tue, 05 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/ShresthaSTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/TruongAKS19, author = {Hien Thi Thu Truong and Miguel Almeida and Ghassan Karame and Claudio Soriente}, title = {Towards Secure and Decentralized Sharing of IoT Data}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {176--183}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00031}, doi = {10.1109/BLOCKCHAIN.2019.00031}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/TruongAKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/TruongTNSTA19, author = {Hien Thi Thu Truong and Juhani Toivonen and Thien Duc Nguyen and Claudio Soriente and Sasu Tarkoma and N. Asokan}, title = {DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification}, booktitle = {2019 {IEEE} International Conference on Pervasive Computing and Communications, PerCom, Kyoto, Japan, March 11-15, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PERCOM.2019.8767404}, doi = {10.1109/PERCOM.2019.8767404}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/TruongTNSTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/aise/Gonzalez-GilMTSS19, author = {Pedro Gonzalez{-}Gil and Juan Antonio Mart{\'{\i}}nez and Hien Thi Thu Truong and Alessandro Sforzin and Antonio F. Skarmeta}, editor = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio F. Skarmeta}, title = {IoTCrawler. Managing Security and Privacy for IoT}, booktitle = {Security and Privacy in the Internet of Things: Challenges and Solutions}, series = {Ambient Intelligence and Smart Environments}, volume = {27}, pages = {167--181}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/AISE200011}, doi = {10.3233/AISE200011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/aise/Gonzalez-GilMTSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-09015, author = {Hien Thi Thu Truong and Miguel Almeida and Ghassan Karame and Claudio Soriente}, title = {Towards Secure and Decentralized Sharing of IoT Data}, journal = {CoRR}, volume = {abs/1908.09015}, year = {2019}, url = {http://arxiv.org/abs/1908.09015}, eprinttype = {arXiv}, eprint = {1908.09015}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-09015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/giots/SkarmetaSMPBEBP18, author = {Antonio F. Skarmeta and Jos{\'{e}} Santa and Juan A. Mart{\'{\i}}nez and Josiane Xavier Parreira and Payam M. Barnaghi and Shirin Enshaeifar and Michail J. Beliatis and Mirko A. Presser and Thorben Iggena and Marten Fischer and Ralf T{\"{o}}njes and Martin Strohbach and Alessandro Sforzin and Hien Thi Thu Truong}, title = {IoTCrawler: Browsing the Internet of Things}, booktitle = {2018 Global Internet of Things Summit, GIoTS 2018, Bilbao, Spain, June 4-7, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GIOTS.2018.8534528}, doi = {10.1109/GIOTS.2018.8534528}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/giots/SkarmetaSMPBEBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-07211, author = {Hien Thi Thu Truong and Juhani Toivonen and Thien Duc Nguyen and Sasu Tarkoma and N. Asokan}, title = {Proximity Verification Based on Acoustic Room Impulse Response}, journal = {CoRR}, volume = {abs/1803.07211}, year = {2018}, url = {http://arxiv.org/abs/1803.07211}, eprinttype = {arXiv}, eprint = {1803.07211}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-07211.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-04293, author = {Kumar Sharad and Giorgia Azzurra Marson and Hien Thi Thu Truong and Ghassan Karame}, title = {Mix'n'Squeeze: Thwarting Adaptive Adversarial Samples Using Randomized Squeezing}, journal = {CoRR}, volume = {abs/1812.04293}, year = {2018}, url = {http://arxiv.org/abs/1812.04293}, eprinttype = {arXiv}, eprint = {1812.04293}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-04293.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShresthaSTA15, author = {Babins Shrestha and Nitesh Saxena and Hien Thi Thu Truong and N. Asokan}, title = {Contextual Proximity Detection in the Face of Context-Manipulating Adversaries}, journal = {CoRR}, volume = {abs/1511.00905}, year = {2015}, url = {http://arxiv.org/abs/1511.00905}, eprinttype = {arXiv}, eprint = {1511.00905}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShresthaSTA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ShresthaSTA14, author = {Babins Shrestha and Nitesh Saxena and Hien Thi Thu Truong and N. Asokan}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {349--364}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_23}, doi = {10.1007/978-3-662-45472-5\_23}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/ShresthaSTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/LagerspetzTTA14, author = {Eemil Lagerspetz and Hien Thi Thu Truong and Sasu Tarkoma and N. Asokan}, title = {MDoctor: {A} Mobile Malware Prognosis Application}, booktitle = {34th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}, pages = {201--206}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCSW.2014.36}, doi = {10.1109/ICDCSW.2014.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/LagerspetzTTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/TruongGSSAN14, author = {Hien Thi Thu Truong and Xiang Gao and Babins Shrestha and Nitesh Saxena and N. Asokan and Petteri Nurmi}, title = {Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication}, booktitle = {{IEEE} International Conference on Pervasive Computing and Communications, PerCom 2014, Budapest, Hungary, March 24-28, 2014}, pages = {163--171}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PerCom.2014.6813957}, doi = {10.1109/PERCOM.2014.6813957}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/TruongGSSAN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/TruongLNOTAB14, author = {Hien Thi Thu Truong and Eemil Lagerspetz and Petteri Nurmi and Adam J. Oliner and Sasu Tarkoma and N. Asokan and Sourav Bhattacharya}, editor = {Chin{-}Wan Chung and Andrei Z. Broder and Kyuseok Shim and Torsten Suel}, title = {The company you keep: mobile malware infection rates and inexpensive risk indicators}, booktitle = {23rd International World Wide Web Conference, {WWW} '14, Seoul, Republic of Korea, April 7-11, 2014}, pages = {39--50}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2566486.2568046}, doi = {10.1145/2566486.2568046}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/TruongLNOTAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TruongLNOTAB13, author = {Hien Thi Thu Truong and Eemil Lagerspetz and Petteri Nurmi and Adam J. Oliner and Sasu Tarkoma and N. Asokan and Sourav Bhattacharya}, title = {The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators}, journal = {CoRR}, volume = {abs/1312.3245}, year = {2013}, url = {http://arxiv.org/abs/1312.3245}, eprinttype = {arXiv}, eprint = {1312.3245}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/TruongLNOTAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Truong12, author = {Hien Thi Thu Truong}, title = {A Contract-based and Trust-aware Collaboration Model. (Un mod{\`{e}}le de collaboration bas{\'{e}} sur les contrats et la confiance)}, school = {University of Lorraine, Nancy, France}, year = {2012}, url = {https://tel.archives-ouvertes.fr/tel-00769076}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Truong12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/TruongIM12, author = {Hien Thi Thu Truong and Claudia{-}Lavinia Ignat and Pascal Molli}, title = {A Contract-Extended Push-Pull-Clone Model for Multi-Synchronous Collaboration}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {21}, number = {3}, pages = {221}, year = {2012}, url = {https://doi.org/10.1142/S0218843012410031}, doi = {10.1142/S0218843012410031}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcis/TruongIM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/group/TruongIM12, author = {Hien Thi Thu Truong and Claudia{-}Lavinia Ignat and Pascal Molli}, editor = {Thomas A. Finholt and Hilda Tellioglu and Kori Inkpen and Tom Gross}, title = {Authenticating operation-based history in collaborative systems}, booktitle = {{ACM} 2012 International Conference on Support Group Work, {GROUP} '12, Sanibel Island, FL, USA, October 27-31, 2012}, pages = {131--140}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2389176.2389197}, doi = {10.1145/2389176.2389197}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/group/TruongIM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/TruongIBM11, author = {Hien Thi Thu Truong and Claudia{-}Lavinia Ignat and Mohamed{-}Rafik Bouguelia and Pascal Molli}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {A contract-extended push-pull-clone model}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {211--220}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247184}, doi = {10.4108/ICST.COLLABORATECOM.2011.247184}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/TruongIBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispdc/TruongI11, author = {Hien Thi Thu Truong and Claudia{-}Lavinia Ignat}, title = {Log Auditing for Trust Assessment in Peer-to-Peer Collaboration}, booktitle = {10th International Symposium on Parallel and Distributed Computing, {ISPDC} 2011, Cluj-Napoca, Romania, July 6-8, 2011}, pages = {207--214}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ISPDC.2011.38}, doi = {10.1109/ISPDC.2011.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispdc/TruongI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-1131, author = {Hien Thi Thu Truong and Claudia{-}Lavinia Ignat}, title = {A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration}, journal = {CoRR}, volume = {abs/1012.1131}, year = {2010}, url = {http://arxiv.org/abs/1012.1131}, eprinttype = {arXiv}, eprint = {1012.1131}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-1131.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.