Search Results - "Xuan, Viet Tran"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Privacy Preserving Jaccard Similarity by Cloud-Assisted for Classification by Le, Tho Thi Ngoc, Phuong, Tran Viet Xuan

    Published in Wireless personal communications (01-06-2020)
    “…In the current information era, data mining has been extensively applied in many fields to discover the huge knowledge. It is desirable to design a system to…”
    Get full text
    Journal Article
  2. 2

    Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions by Tran Viet Xuan Phuong, Guomin Yang, Susilo, Willy

    “…We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first…”
    Get full text
    Journal Article
  3. 3

    Anonymous attribute-based broadcast encryption with hidden multiple access structures by Phuong, Tran Viet Xuan

    Published in Designs, codes, and cryptography (2024)
    “…Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct…”
    Get full text
    Journal Article
  4. 4

    An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things by Wei, Jiannan, Phuong, Tran Viet Xuan, Yang, Guomin

    “…As an essential element of the next generation Internet, Internet of Things (IoT) has been undergoing an extensive development in recent years. In addition to…”
    Get full text
    Journal Article
  5. 5

    A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing by Kaitai Liang, Man Ho Au, Liu, Joseph K., Susilo, Willy, Wong, Duncan S., Guomin Yang, Phuong, Tran Viet Xuan, Qi Xie

    “…In this paper, for the first time, we define a general notion for proxy re-encryption (PRE), which we call deterministic finite automata-based functional PRE…”
    Get full text
    Journal Article
  6. 6

    Nonsingular fractional-order integral fast-terminal sliding mode control for underactuated shipboard cranes by Cuong, Hoang Manh, Thai, Nguyen Van, Trieu, Pham Van, Dong, Hoang Quoc, Nam, Tran The, Viet, Tran Xuan, Nho, Luong Cong, Tuan, Le Anh

    Published in Journal of the Franklin Institute (01-09-2022)
    “…Lack of actuators creates many challenges in controlling underactuated systems. Additional difficulty arises when underactuated systems are subject to actuator…”
    Get full text
    Journal Article
  7. 7

    Criteria-Based Encryption by Phuong, Tran Viet Xuan, Yang, Guomin, Susilo, Willy

    Published in Computer journal (01-04-2018)
    “…Abstract We present a new type of public-key encryption called Criteria-based Encryption (or CE, for short). Different from Attribute-based Encryption, in CE,…”
    Get full text
    Journal Article
  8. 8

    Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things by Xuan Phuong, Tran Viet, Ning, Rui, Xin, Chunsheng, Wu, Hongyi

    “…While the Internet of Things (IoT) is embraced as important tools for efficiency and productivity, it is becoming an increasingly attractive target for…”
    Get full text
    Conference Proceeding
  9. 9

    Sequence aware functional encryption and its application in searchable encryption by Xuan Phuong, Tran Viet, Yang, Guomin, Susilo, Willy, Guo, Fuchun, Huang, Qiong

    “…As a new broad vision of public-key encryption systems, functional encryption provides a promising solution for many challenging security problems such as…”
    Get full text
    Journal Article
  10. 10

    ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database by Dang, Hai-Van, Phuong, Tran Viet Xuan, Nguyen, Thuc D., Hoang, Thang

    “…Zero-knowledge universal accumulator generates the succinct commitment to a set and produces the short (non) membership proof (universal) without leaking…”
    Get full text
    Conference Proceeding
  11. 11

    Microstrip antenna with an air gap for use in RFID and tracking of cargo containers by Cong, Nho Luong, Knyazev, Sergei T., Xuan, Viet Tran, Quang, Hung Luu

    “…In this paper, a small analysis was carried out on the various design of radio frequency labels used today. Using the program for electrodynamic modeling of…”
    Get full text
    Conference Proceeding
  12. 12

    Efficient Ciphertext-Policy ABE with constant ciphertext length by Phuong Viet Xuan Tran, Thuc Nguyen Dinh, Miyaji, A.

    “…Following the development of promising result of Ciphertext-Policy Attribute-based encryption (CP-ABE), in which every secret key is associated with a set of…”
    Get full text
    Conference Proceeding
  13. 13

    An Analytical method for calculating the limitation of beam scanning in Uniform Linear Array (ULA) by Tran, X.V., Pham, V.H.

    “…The limitation of beam scanning in a uniform linear array (ULA) is determined as a maximum range of scanning; within that the sidelobe of the pattern still not…”
    Get full text
    Conference Proceeding