Follow
Vinh-Thong Ta
Vinh-Thong Ta
Verified email at edgehill.ac.uk - Homepage
Title
Cited by
Cited by
Year
Secure vehicular communication systems: implementation, performance, and research challenges
F Kargl, P Papadimitratos, L Buttyan, M Müter, E Schoch, B Wiedersheim, ...
IEEE Communications magazine 46 (11), 110-118, 2008
3142008
Consistency verification of stateful firewalls is not harder than the stateless case
L Buttyán, G Pék, T Ta Vinh
HTE 64 (2009/II), 2-8, 2009
192009
Adaptation of eikonal equation over weighted graph
VT Ta
International conference on scale space and variational methods in computer …, 2009
172009
A secure road traffic congestion detection and notification concept based on V2I communications
VT Ta, A Dvir
Vehicular Communications 25, 100283, 2020
142020
Formal verification of secure ad-hoc network routing protocols using deductive model-checking
L Buttyán, TV Thong
Periodica Polytechnica, Electrical Engineering Journal 55 (1-2), 31-43, 2011
142011
Formal verification of secure ad-hoc network routing protocols using deductive model-checking
L Buttyán, TV Thong
WMNC2010, 1-6, 2010
142010
Augmenting zero trust architecture to endpoints using blockchain: A state‐of‐the‐art review
L Alevizos, VT Ta, M Hashem Eiza
Security and Privacy, e191, 2021
112021
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains
A Dvir, L Buttyan, TV Thong
2013 IEEE International Conference on Communications (ICC), 2073-2078, 2013
112013
Automated road traffic congestion detection and alarm systems: Incorporating V2I communications into atcss
VT Ta
arXiv preprint arXiv:1606.01010, 2016
102016
Privacy by design: On the conformance between protocols and architectures
VT Ta, T Antignac
Foundations and Practice of Security, 65-81, 2015
102015
STWSN: A Novel Secure Distributed Transport Protocol for Wireless Sensor Networks
A Dvir, VT Ta, S Erlich, L Buttyan
International Journal of Communication Systems (IJCS Wiley), 1-28, 2018
62018
Formal Accountability for Biometric Surveillance: A Case Study
VT Ta, D Butin, D Le Métayer
Privacy Technologies and Policy (Annual Privacy Forum) 9484, 21-37, 2016
62016
On automating the verification of secure ad-hoc network routing protocols
TV Thong, L Buttyán
Telecommunication Systems 52 (4), 2611-2635, 2013
52013
Secure Vehicular Communication Systems: Implementation
FP Kargal, P Buttyan, L Muter, M Schoch, E Wiedersheim, ...
Ulm Univiversity, 2008
5*2008
Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment
M Hashem Eiza, R Izuchukwu Okeke, J Dempsey, VT Ta
International Journal on Cyber Situational Awareness (IJCSA), 2021
4*2021
On formal and automatic security verification of wsn transport protocols
VT Ta, L Buttyán, A Dvir
International Scholarly Research Notices 2014, 2014
42014
On formal and automatic security verification of WSN transport protocols.
TV Thong, A Dvir
IACR Cryptology ePrint Archive 2013 (14), 94 pages, 2013
4*2013
Securing road traffic congestion detection by incorporating v2i communications
VT Ta, A Dvir, Y Arie
2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018
32018
Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review
L Alevizos, VT Ta, MH Eiza
arXiv preprint arXiv:2104.00460, 2021
22021
Children designing privacy warnings: Informing a set of design guidelines
J Dempsey, G Sim, B Cassidy, VT Ta
International Journal of Child-Computer Interaction 31, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20