Vinh-Thong Ta
Vinh-Thong Ta
Verified email at - Homepage
Cited by
Cited by
Secure vehicular communication systems: implementation, performance, and research challenges
F Kargl, P Papadimitratos, L Buttyan, M Müter, E Schoch, B Wiedersheim, ...
IEEE Communications magazine 46 (11), 110-118, 2008
Augmenting zero trust architecture to endpoints using blockchain: A state‐of‐the‐art review
L Alevizos, VT Ta, M Hashem Eiza
Security and Privacy, e191, 2021
Face de-identification with expressions preservation
G Letournel, A Bugeau, VT Ta, JP Domenger
2015 IEEE International Conference on Image Processing (ICIP), 4366-4370, 2015
A secure road traffic congestion detection and notification concept based on V2I communications
VT Ta, A Dvir
Vehicular Communications 25, 100283, 2020
Blockchain-enabled Intrusion Detection and Prevention System of APTs within Zero Trust Architecture
L Alevizos, MH Eiza, VT Ta, Q Shi, J Read
IEEE Access, 2022
Consistency verification of stateful firewalls is not harder than the stateless case
L Buttyán, G Pék, TV Thong
Infocommunications Journal 64 (1), 2-8, 2009
Exemplar-based colorization in RGB color space
F Pierre, JF Aujol, A Bugeau, N Papadakis, VT Ta
2014 IEEE International Conference on Image Processing (ICIP), 625-629, 2014
Formal verification of secure ad-hoc network routing protocols using deductive model-checking
L Buttyán, TV Thong
Periodica Polytechnica, Electrical Engineering Journal 55 (1-2), 31-43, 2011
Automated road traffic congestion detection and alarm systems: Incorporating V2I communications into atcss
arXiv preprint arXiv:1606.01010, 2016
STWSN: A Novel Secure Distributed Transport Protocol for Wireless Sensor Networks
A Dvir, VT Ta, S Erlich, L Buttyan
International Journal of Communication Systems (IJCS Wiley), 1-28, 2018
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains
A Dvir, L Buttyan, TV Thong
2013 IEEE International Conference on Communications (ICC), 2073-2078, 2013
Privacy by design: On the conformance between protocols and architectures
VT Ta, T Antignac
Foundations and Practice of Security, 65-81, 2015
Children designing privacy warnings: Informing a set of design guidelines
J Dempsey, G Sim, B Cassidy, VT Ta
International Journal of Child-Computer Interaction 31, 2022
Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment
M Hashem Eiza, R Izuchukwu Okeke, J Dempsey, VT Ta
International Journal on Cyber Situational Awareness (IJCSA), 2021
Dataprove: Fully automated conformance verification between data protection policies and system architectures
VT Ta, MH Eiza
Proceedings on Privacy Enhancing Technologies (PoPETs) 2022 (1), 565-585, 2022
Formal Accountability for Biometric Surveillance: A Case Study
VT Ta, D Butin, D Le Métayer
Privacy Technologies and Policy (Annual Privacy Forum) 9484, 21-37, 2016
On automating the verification of secure ad-hoc network routing protocols
TV Thong, L Buttyán
Telecommunication Systems 52, 2611-2635, 2013
Secure Vehicular Communication Systems: Implementation
FP Kargal, P Buttyan, L Muter, M Schoch, E Wiedersheim, ...
Ulm Univiversity, 2008
On formal and automatic security verification of WSN transport protocols.
TV Thong, A Dvir
IACR Cryptology ePrint Archive 2013 (14), 94 pages, 2013
Securing road traffic congestion detection by incorporating v2i communications
VT Ta, A Dvir, Y Arie
2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20