Tran Viet Xuan Phuong
Tran Viet Xuan Phuong
在 uow.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1272014
Hidden ciphertext policy attribute-based encryption under standard assumptions
TVX Phuong, G Yang, W Susilo
IEEE transactions on information forensics and security 11 (1), 35-45, 2015
932015
GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning.
Q Zhang, C Wang, H Wu, C Xin, TV Phuong
IJCAI, 3933-3939, 2018
232018
Attribute based broadcast encryption with short ciphertext and decryption key
TVX Phuong, G Yang, W Susilo, X Chen
European Symposium on Research in Computer Security, 252-269, 2015
152015
Efficient hidden vector encryption with constant-size ciphertext
TVX Phuong, G Yang, W Susilo
European Symposium on Research in Computer Security, 472-487, 2014
122014
Puncturable attribute-based encryption for secure data delivery in internet of things
TVX Phuong, R Ning, C Xin, H Wu
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1511-1519, 2018
82018
Efficient ciphertext-policy abe with constant ciphertext length
PVX Tran, TN Dinh, A Miyaji
2012 7th International Conference on Computing and Convergence Technology …, 2012
82012
Poster: Efficient ciphertext policy attribute based encryption under decisional linear assumption
TVX Phuong, G Yang, W Susilo
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
72014
Constant-ciphertext-size dual policy attribute based encryption
A Miyaji, PVX Tran
International Symposium on Cyberspace Safety and Security, 400-413, 2012
72012
Sequence aware functional encryption and its application in searchable encryption
TVX Phuong, G Yang, W Susilo, F Guo, Q Huang
Journal of Information Security and Applications 35, 106-118, 2017
52017
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
J Wei, TVX Phuong, G Yang
IEEE Transactions on Industrial Informatics 17 (1), 617-626, 2020
22020
Edit distance based encryption and its application
TVX Phuong, G Yang, W Susilo, K Liang
Australasian Conference on Information Security and Privacy, 103-119, 2016
22016
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service
TVX Phuong, W Susilo, J Kim, G Yang, D Liu
European Symposium on Research in Computer Security, 215-233, 2019
12019
Location Based Encryption
TVX Phuong, W Susilo, G Yang, J Yan, D Liu
Australasian Conference on Information Security and Privacy, 21-38, 2019
12019
Efficient Secure Text Retrieval on Multi-Keyword Search
TVX Phuong, TTN Le
Proceedings of the Eighth International Symposium on Information and …, 2017
12017
Privacy Preserving Jaccard Similarity by Cloud-Assisted for Classification
TTN Le, TVX Phuong
Wireless Personal Communications 112 (3), 1875-1892, 2020
2020
Criteria-Based Encryption
TVX Phuong, G Yang, W Susilo
The Computer Journal 61 (4), 512-525, 2018
2018
Criteria-Based Encryption
PVX Tran, G Yang, W Susilo
2018
Edit distance based encryption and its application
PVX Tran, G Yang, W Susilo, K Liang
2016
Attribute based broadcast encryption with short ciphertext and decryption key
PVX Tran, G Yang, W Susilo, X Chen
2015
系统目前无法执行此操作,请稍后再试。
文章 1–20