Hien Truong
Hien Truong
Elisa Corporation
Verified email at elisa.fi
Title
Cited by
Cited by
Year
The company you keep: Mobile malware infection rates and inexpensive risk indicators
HTT Truong, E Lagerspetz, P Nurmi, AJ Oliner, S Tarkoma, N Asokan, ...
Proceedings of the 23rd international conference on World wide web, 39-50, 2014
812014
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing
B Shrestha, N Saxena, HTT Truong, N Asokan
International Conference on Financial Cryptography and Data Security, 349-364, 2014
812014
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
2014 IEEE International Conference on Pervasive Computing and Communications …, 2014
782014
Towards secure and decentralized sharing of IoT data
HTT Truong, M Almeida, G Karame, C Soriente
2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019
362019
Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability
HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi
Pervasive and Mobile Computing 16, 187-204, 2015
262015
Sensor-based proximity detection in the face of active adversaries
B Shrestha, N Saxena, HTT Truong, N Asokan
IEEE Transactions on Mobile Computing 18 (2), 444-457, 2018
192018
Iotcrawler: Browsing the internet of things
AF Skarmeta, J Santa, JA Martínez, JX Parreira, P Barnaghi, S Enshaeifar, ...
2018 Global Internet of Things Summit (GIoTS), 1-6, 2018
162018
Contextual proximity detection in the face of context-manipulating adversaries
B Shrestha, N Saxena, H Thi Thu Truong, N Asokan
arXiv e-prints, arXiv: 1511.00905, 2015
142015
MDoctor: A mobile malware prognosis application
E Lagerspetz, HTT Truong, S Tarkoma, N Asokan
2014 IEEE 34th international conference on distributed computing systems …, 2014
102014
Authenticating operation-based history in collaborative systems
HTT Truong, CL Ignat, P Molli
Proceedings of the 17th ACM international conference on Supporting group …, 2012
92012
An efficient identity-based broadcast signcryption scheme
DT Hien, TN Tien, TTT Hien
2010 Second International Conference on Knowledge and Systems Engineering …, 2010
72010
DoubleEcho: Mitigating context-manipulation attacks in copresence verification
HTT Truong, J Toivonen, TD Nguyen, C Soriente, S Tarkoma, N Asokan
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
62019
Proximity verification based on acoustic room impulse response
HTT Truong, J Toivonen, TD Nguyen, S Tarkoma, N Asokan
arXiv preprint arXiv:1803.07211, 2018
52018
Log auditing for trust assessment in peer-to-peer collaboration
HTT Truong, CL Ignat
2011 10th International Symposium on Parallel and Distributed Computing, 207-214, 2011
52011
An ontological approach to lifelog representation for disclosure control
TTT Hien, S Eitoku, T Yamada, S Muto, M Abe
2009 IEEE 13th International Symposium on Consumer Electronics, 932-936, 2009
52009
IoTCrawler: Challenges and Solutions for Searching the Internet of Things
T Iggena, E Bin Ilyas, M Fischer, R Tönjes, T Elsaleh, R Rezvani, ...
Sensors 21 (5), 1559, 2021
32021
IoT European security and privacy projects: Integration, architectures and interoperability
E Ferrera, C Pastrone, PE Brun, R De Besombes, K Loupos, ...
Next Generation Internet of Things. Distributed Intelligence at the Edge and …, 2018
32018
A contract-extended push-pull-clone model for multi-synchronous collaboration
HTT Truong, CL Ignat, P Molli
International Journal of Cooperative Information Systems 21 (03), 221-262, 2012
32012
A contract-extended push-pull-clone model
HTT Truong, CL Ignat, MR Bouguelia, P Molli
7th International Conference on Collaborative Computing: Networking …, 2011
32011
Collaborative editing with contract over friend-to-friend networks
HTT Truong, MR Bouguelia, CL Ignat, P Molli
32011
The system can't perform the operation now. Try again later.
Articles 1–20