Search Results - "Xuan, Viet Tran"
-
1
Privacy Preserving Jaccard Similarity by Cloud-Assisted for Classification
Published in Wireless personal communications (01-06-2020)“…In the current information era, data mining has been extensively applied in many fields to discover the huge knowledge. It is desirable to design a system to…”
Get full text
Journal Article -
2
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
Published in IEEE transactions on information forensics and security (01-01-2016)“…We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first…”
Get full text
Journal Article -
3
Anonymous attribute-based broadcast encryption with hidden multiple access structures
Published in Designs, codes, and cryptography (2024)“…Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct…”
Get full text
Journal Article -
4
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
Published in IEEE transactions on industrial informatics (01-01-2021)“…As an essential element of the next generation Internet, Internet of Things (IoT) has been undergoing an extensive development in recent years. In addition to…”
Get full text
Journal Article -
5
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
Published in IEEE transactions on information forensics and security (01-10-2014)“…In this paper, for the first time, we define a general notion for proxy re-encryption (PRE), which we call deterministic finite automata-based functional PRE…”
Get full text
Journal Article -
6
Nonsingular fractional-order integral fast-terminal sliding mode control for underactuated shipboard cranes
Published in Journal of the Franklin Institute (01-09-2022)“…Lack of actuators creates many challenges in controlling underactuated systems. Additional difficulty arises when underactuated systems are subject to actuator…”
Get full text
Journal Article -
7
Criteria-Based Encryption
Published in Computer journal (01-04-2018)“…Abstract We present a new type of public-key encryption called Criteria-based Encryption (or CE, for short). Different from Attribute-based Encryption, in CE,…”
Get full text
Journal Article -
8
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
Published in IEEE INFOCOM 2018 - IEEE Conference on Computer Communications (01-04-2018)“…While the Internet of Things (IoT) is embraced as important tools for efficiency and productivity, it is becoming an increasingly attractive target for…”
Get full text
Conference Proceeding -
9
Sequence aware functional encryption and its application in searchable encryption
Published in Journal of information security and applications (01-08-2017)“…As a new broad vision of public-key encryption systems, functional encryption provides a promising solution for many challenging security problems such as…”
Get full text
Journal Article -
10
ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database
Published in 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA) (01-12-2022)“…Zero-knowledge universal accumulator generates the succinct commitment to a set and produces the short (non) membership proof (universal) without leaking…”
Get full text
Conference Proceeding -
11
Microstrip antenna with an air gap for use in RFID and tracking of cargo containers
Published in 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (01-09-2018)“…In this paper, a small analysis was carried out on the various design of radio frequency labels used today. Using the program for electrodynamic modeling of…”
Get full text
Conference Proceeding -
12
Efficient Ciphertext-Policy ABE with constant ciphertext length
Published in 2012 7th International Conference on Computing and Convergence Technology (ICCCT) (01-12-2012)“…Following the development of promising result of Ciphertext-Policy Attribute-based encryption (CP-ABE), in which every secret key is associated with a set of…”
Get full text
Conference Proceeding -
13
An Analytical method for calculating the limitation of beam scanning in Uniform Linear Array (ULA)
Published in 2009 International Conference on Advanced Technologies for Communications (01-10-2009)“…The limitation of beam scanning in a uniform linear array (ULA) is determined as a maximum range of scanning; within that the sidelobe of the pattern still not…”
Get full text
Conference Proceeding