Hidden ciphertext policy attribute-based encryption under standard assumptions TVX Phuong, G Yang, W Susilo IEEE transactions on information forensics and security 11 (1), 35-45, 2015 | 192 | 2015 |
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014 | 161 | 2014 |
GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning. Q Zhang, C Wang, H Wu, C Xin, TV Phuong IJCAI, 3933-3939, 2018 | 101 | 2018 |
Puncturable attribute-based encryption for secure data delivery in Internet of Things TVX Phuong, R Ning, C Xin, H Wu IEEE INFOCOM 2018-IEEE conference on computer communications, 1511-1519, 2018 | 46 | 2018 |
Attribute based broadcast encryption with short ciphertext and decryption key TVX Phuong, G Yang, W Susilo, X Chen Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 33 | 2015 |
An efficient privacy preserving message authentication scheme for internet-of-things J Wei, TVX Phuong, G Yang IEEE Transactions on Industrial Informatics 17 (1), 617-626, 2020 | 32 | 2020 |
Puncturable proxy re-encryption supporting to group messaging service TVX Phuong, W Susilo, J Kim, G Yang, D Liu Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 17 | 2019 |
Privacy preserving jaccard similarity by cloud-assisted for classification TTN Le, TVX Phuong Wireless Personal Communications 112 (3), 1875-1892, 2020 | 16 | 2020 |
Efficient hidden vector encryption with constant-size ciphertext TVX Phuong, G Yang, W Susilo Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 16 | 2014 |
Poster: Efficient ciphertext policy attribute based encryption under decisional linear assumption TVX Phuong, G Yang, W Susilo Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 12 | 2014 |
Efficient ciphertext-policy abe with constant ciphertext length PVX Tran, TN Dinh, A Miyaji 2012 7th International Conference on Computing and Convergence Technology …, 2012 | 11 | 2012 |
Constant-ciphertext-size dual policy attribute based encryption A Miyaji, PVX Tran Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012 | 10 | 2012 |
Sequence aware functional encryption and its application in searchable encryption TVX Phuong, G Yang, W Susilo, F Guo, Q Huang Journal of Information Security and Applications 35, 106-118, 2017 | 9 | 2017 |
Non-equivocation in blockchain: Double-authentication-preventing signatures gone contractual Y Li, W Susilo, G Yang, Y Yu, TVX Phuong, D Liu Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 8 | 2021 |
Concise mercurial subvector commitments: definitions and constructions Y Li, W Susilo, G Yang, TVX Phuong, Y Yu, D Liu Australasian Conference on Information Security and Privacy, 353-371, 2021 | 6 | 2021 |
Location based encryption T Viet Xuan Phuong, W Susilo, G Yang, J Yan, D Liu Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | 6 | 2019 |
Edit distance based encryption and its application TVX Phuong, G Yang, W Susilo, K Liang Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 6 | 2016 |
Applications of AI/ML in Maritime Cyber Supply Chains R Diaz, R Ungo, K Smith, L Haghnegahdar, B Singh, T Phuong Procedia Computer Science 232, 3247-3257, 2024 | 2 | 2024 |
Efficient secure text retrieval on multi-keyword search TVX Phuong, TTN Le Proceedings of the 8th International Symposium on Information and …, 2017 | 2 | 2017 |
Secure Lightweight Data Communication Between the IoT Devices and Cloud Service TVX Phuong, TTN Le, HL Ngoc International Conference on Advanced Information Networking and Applications …, 2024 | 1 | 2024 |