Follow
Tran Viet Xuan Phuong
Title
Cited by
Cited by
Year
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
1922015
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1612014
GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning.
Q Zhang, C Wang, H Wu, C Xin, TV Phuong
IJCAI, 3933-3939, 2018
1012018
Puncturable attribute-based encryption for secure data delivery in Internet of Things
TVX Phuong, R Ning, C Xin, H Wu
IEEE INFOCOM 2018-IEEE conference on computer communications, 1511-1519, 2018
462018
Attribute based broadcast encryption with short ciphertext and decryption key
TVX Phuong, G Yang, W Susilo, X Chen
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
332015
An efficient privacy preserving message authentication scheme for internet-of-things
J Wei, TVX Phuong, G Yang
IEEE Transactions on Industrial Informatics 17 (1), 617-626, 2020
322020
Puncturable proxy re-encryption supporting to group messaging service
TVX Phuong, W Susilo, J Kim, G Yang, D Liu
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
172019
Privacy preserving jaccard similarity by cloud-assisted for classification
TTN Le, TVX Phuong
Wireless Personal Communications 112 (3), 1875-1892, 2020
162020
Efficient hidden vector encryption with constant-size ciphertext
TVX Phuong, G Yang, W Susilo
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
162014
Poster: Efficient ciphertext policy attribute based encryption under decisional linear assumption
TVX Phuong, G Yang, W Susilo
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
122014
Efficient ciphertext-policy abe with constant ciphertext length
PVX Tran, TN Dinh, A Miyaji
2012 7th International Conference on Computing and Convergence Technology …, 2012
112012
Constant-ciphertext-size dual policy attribute based encryption
A Miyaji, PVX Tran
Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012
102012
Sequence aware functional encryption and its application in searchable encryption
TVX Phuong, G Yang, W Susilo, F Guo, Q Huang
Journal of Information Security and Applications 35, 106-118, 2017
92017
Non-equivocation in blockchain: Double-authentication-preventing signatures gone contractual
Y Li, W Susilo, G Yang, Y Yu, TVX Phuong, D Liu
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
82021
Concise mercurial subvector commitments: definitions and constructions
Y Li, W Susilo, G Yang, TVX Phuong, Y Yu, D Liu
Australasian Conference on Information Security and Privacy, 353-371, 2021
62021
Location based encryption
T Viet Xuan Phuong, W Susilo, G Yang, J Yan, D Liu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
62019
Edit distance based encryption and its application
TVX Phuong, G Yang, W Susilo, K Liang
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
62016
Applications of AI/ML in Maritime Cyber Supply Chains
R Diaz, R Ungo, K Smith, L Haghnegahdar, B Singh, T Phuong
Procedia Computer Science 232, 3247-3257, 2024
22024
Efficient secure text retrieval on multi-keyword search
TVX Phuong, TTN Le
Proceedings of the 8th International Symposium on Information and …, 2017
22017
Secure Lightweight Data Communication Between the IoT Devices and Cloud Service
TVX Phuong, TTN Le, HL Ngoc
International Conference on Advanced Information Networking and Applications …, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20