Tran Viet Xuan Phuong

Orcid: 0000-0002-9182-3445

According to our database1, Tran Viet Xuan Phuong authored at least 20 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Anonymous attribute-based broadcast encryption with hidden multiple access structures.
Des. Codes Cryptogr., July, 2024

Secure Lightweight Data Communication Between the IoT Devices and Cloud Service.
Proceedings of the Advanced Information Networking and Applications, 2024

2022
ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database.
Proceedings of the 4th IEEE International Conference on Trust, 2022

2021
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things.
IEEE Trans. Ind. Informatics, 2021

SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021

Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Concise Mercurial Subvector Commitments: Definitions and Constructions.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Privacy Preserving Jaccard Similarity by Cloud-Assisted for Classification.
Wirel. Pers. Commun., 2020

2019
Puncturable Proxy Re-Encryption supporting to Group Messaging Service.
IACR Cryptol. ePrint Arch., 2019

Location Based Encryption.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Criteria-Based Encryption.
Comput. J., 2018

Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Secur. Appl., 2017

Efficient Secure Text Retrieval on Multi-Keyword Search.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017

2016
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions.
IEEE Trans. Inf. Forensics Secur., 2016

Edit Distance Based Encryption and Its Application.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014

Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
IACR Cryptol. ePrint Arch., 2014

POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...