default search action
Hien Thi Thu Truong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Prakash Shrestha, Hien Thi Thu Truong, Pupu Toivonen, Nitesh Saxena, Sasu Tarkoma, Petteri Nurmi:
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures. Pervasive Mob. Comput. 88: 101720 (2023) - 2022
- [c12]Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. CANS 2022: 122-142 - 2021
- [j3]Thorben Iggena, Eushay Bin Ilyas, Marten Fischer, Ralf Tönjes, Tarek Elsaleh, Roonak Rezvani, Narges Pourshahrokhi, Stefan Bischof, Andreas Fernbach, Josiane Xavier Parreira, Patrik Schneider, Pavel Smirnov, Martin Strohbach, Hien Thi Thu Truong, Aurora González-Vidal, Antonio F. Skarmeta, Parwinder Singh, Michail J. Beliatis, Mirko Presser, Juan Antonio Martínez, Pedro Gonzalez-Gil, Marianne Krogbæk, Sebastian Holmgard Christophersen:
IoTCrawler: Challenges and Solutions for Searching the Internet of Things. Sensors 21(5): 1559 (2021) - 2020
- [c11]Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame:
On the Security of Randomized Defenses Against Adversarial Samples. AsiaCCS 2020: 381-393 - [i7]Antonio Faonio, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. IACR Cryptol. ePrint Arch. 2020: 60 (2020)
2010 – 2019
- 2019
- [j2]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Trans. Mob. Comput. 18(2): 444-457 (2019) - [c10]Hien Thi Thu Truong, Miguel Almeida, Ghassan Karame, Claudio Soriente:
Towards Secure and Decentralized Sharing of IoT Data. Blockchain 2019: 176-183 - [c9]Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma, N. Asokan:
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification. PerCom 2019: 1-9 - [p1]Pedro Gonzalez-Gil, Juan Antonio Martínez, Hien Thi Thu Truong, Alessandro Sforzin, Antonio F. Skarmeta:
IoTCrawler. Managing Security and Privacy for IoT. Security and Privacy in the Internet of Things 2019: 167-181 - [i6]Hien Thi Thu Truong, Miguel Almeida, Ghassan Karame, Claudio Soriente:
Towards Secure and Decentralized Sharing of IoT Data. CoRR abs/1908.09015 (2019) - 2018
- [c8]Antonio F. Skarmeta, José Santa, Juan A. Martínez, Josiane Xavier Parreira, Payam M. Barnaghi, Shirin Enshaeifar, Michail J. Beliatis, Mirko A. Presser, Thorben Iggena, Marten Fischer, Ralf Tönjes, Martin Strohbach, Alessandro Sforzin, Hien Thi Thu Truong:
IoTCrawler: Browsing the Internet of Things. GIoTS 2018: 1-6 - [i5]Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Sasu Tarkoma, N. Asokan:
Proximity Verification Based on Acoustic Room Impulse Response. CoRR abs/1803.07211 (2018) - [i4]Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame:
Mix'n'Squeeze: Thwarting Adaptive Adversarial Samples Using Randomized Squeezing. CoRR abs/1812.04293 (2018) - 2015
- [i3]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Contextual Proximity Detection in the Face of Context-Manipulating Adversaries. CoRR abs/1511.00905 (2015) - 2014
- [c7]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. Financial Cryptography 2014: 349-364 - [c6]Eemil Lagerspetz, Hien Thi Thu Truong, Sasu Tarkoma, N. Asokan:
MDoctor: A Mobile Malware Prognosis Application. ICDCS Workshops 2014: 201-206 - [c5]Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan, Petteri Nurmi:
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication. PerCom 2014: 163-171 - [c4]Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya:
The company you keep: mobile malware infection rates and inexpensive risk indicators. WWW 2014: 39-50 - 2013
- [i2]Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya:
The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators. CoRR abs/1312.3245 (2013) - 2012
- [b1]Hien Thi Thu Truong:
A Contract-based and Trust-aware Collaboration Model. (Un modèle de collaboration basé sur les contrats et la confiance). University of Lorraine, Nancy, France, 2012 - [j1]Hien Thi Thu Truong, Claudia-Lavinia Ignat, Pascal Molli:
A Contract-Extended Push-Pull-Clone Model for Multi-Synchronous Collaboration. Int. J. Cooperative Inf. Syst. 21(3): 221- (2012) - [c3]Hien Thi Thu Truong, Claudia-Lavinia Ignat, Pascal Molli:
Authenticating operation-based history in collaborative systems. GROUP 2012: 131-140 - 2011
- [c2]Hien Thi Thu Truong, Claudia-Lavinia Ignat, Mohamed-Rafik Bouguelia, Pascal Molli:
A contract-extended push-pull-clone model. CollaborateCom 2011: 211-220 - [c1]Hien Thi Thu Truong, Claudia-Lavinia Ignat:
Log Auditing for Trust Assessment in Peer-to-Peer Collaboration. ISPDC 2011: 207-214 - 2010
- [i1]Hien Thi Thu Truong, Claudia-Lavinia Ignat:
A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration. CoRR abs/1012.1131 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint