Thuc Dinh Nguyen
Orcid: 0000-0003-0524-8841
According to our database1,
Thuc Dinh Nguyen
authored at least 39 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEEE Trans. Inf. Forensics Secur., 2023
2022
Security and privacy enhanced smartphone-based gait authentication with random representation learning and digital lockers.
Pattern Recognit., 2022
ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database.
Proceedings of the 4th IEEE International Conference on Trust, 2022
2021
Security and Privacy Enhanced Gait Authentication with Random Representation Learning and Digital Lockers.
CoRR, 2021
Multi-Model Long Short-Term Memory Network for Gait Recognition Using Window-Based Data Segment.
IEEE Access, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
2017
Wirel. Pers. Commun., 2017
Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis.
Proceedings of the Information Security - 20th International Conference, 2017
2016
2015
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme.
Int. J. Inf. Sec., 2015
Int. J. Big Data Intell., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the SECRYPT 2015, 2015
Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
J. Inf. Process. Syst., 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
How Can We Acquire the Most Common Query Types in Two-Tiered Wireless Sensor Networks?
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013
A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013
2012
Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
2011
A Mutual and Pseudo Inverse Matrix - Based Authentication Mechanism for Outsourcing Service.
Proceedings of the Intelligent Information and Database Systems, 2011
2010
Proceedings of the 2010 IEEE RIVF International Conference on Computing & Communication Technologies, 2010
Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram.
Proceedings of the U- and E-Service, Science and Technology, 2010
2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
2007
Proceedings of the Genetic and Evolutionary Computation Conference, 2007