Towards secure and decentralized sharing of IoT data HTT Truong, M Almeida, G Karame, C Soriente 2019 IEEE International Conference on Blockchain (Blockchain), 176-183, 2019 | 112 | 2019 |
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi 2014 IEEE International Conference on Pervasive Computing and Communications …, 2014 | 102 | 2014 |
Drone to the rescue: Relay-resilient authentication using ambient multi-sensing B Shrestha, N Saxena, HTT Truong, N Asokan International Conference on Financial Cryptography and Data Security, 349-364, 2014 | 98 | 2014 |
The company you keep: Mobile malware infection rates and inexpensive risk indicators HTT Truong, E Lagerspetz, P Nurmi, AJ Oliner, S Tarkoma, N Asokan, ... Proceedings of the 23rd international conference on World wide web, 39-50, 2014 | 88 | 2014 |
Sensor-based proximity detection in the face of active adversaries B Shrestha, N Saxena, HTT Truong, N Asokan IEEE Transactions on Mobile Computing 18 (2), 444-457, 2018 | 39 | 2018 |
IoTCrawler: Browsing the internet of things AF Skarmeta, J Santa, JA Martínez, JX Parreira, P Barnaghi, S Enshaeifar, ... 2018 Global Internet of Things Summit (GIoTS), 1-6, 2018 | 29 | 2018 |
Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability HTT Truong, X Gao, B Shrestha, N Saxena, N Asokan, P Nurmi Pervasive and Mobile Computing 16, 187-204, 2015 | 29 | 2015 |
Iotcrawler: Challenges and solutions for searching the internet of things T Iggena, E Bin Ilyas, M Fischer, R Tönjes, T Elsaleh, R Rezvani, ... Sensors 21 (5), 1559, 2021 | 26 | 2021 |
Contextual proximity detection in the face of context-manipulating adversaries B Shrestha, N Saxena, HTT Truong, N Asokan arXiv preprint arXiv:1511.00905, 2015 | 15 | 2015 |
DoubleEcho: Mitigating context-manipulation attacks in copresence verification HTT Truong, J Toivonen, TD Nguyen, C Soriente, S Tarkoma, N Asokan 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 12 | 2019 |
MDoctor: A mobile malware prognosis application E Lagerspetz, HTT Truong, S Tarkoma, N Asokan 2014 IEEE 34th international conference on distributed computing systems …, 2014 | 12 | 2014 |
Authenticating operation-based history in collaborative systems HTT Truong, CL Ignat, P Molli Proceedings of the 2012 ACM International Conference on Supporting Group …, 2012 | 10 | 2012 |
An efficient identity-based broadcast signcryption scheme DT Hien, TN Tien, TTT Hien 2010 Second International Conference on Knowledge and Systems Engineering …, 2010 | 10 | 2010 |
[Retracted] Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts H Truong, JL Hernández-Ramos, JA Martinez, J Bernal Bernabe, W Li, ... Security and Communication Networks 2022 (1), 1828747, 2022 | 8 | 2022 |
An ontological approach to lifelog representation for disclosure control TTT Hien, S Eitoku, T Yamada, S Muto, M Abe 2009 IEEE 13th International Symposium on Consumer Electronics, 932-936, 2009 | 7 | 2009 |
Proximity verification based on acoustic room impulse response HTT Truong, J Toivonen, TD Nguyen, S Tarkoma, N Asokan arXiv preprint arXiv:1803.07211, 2018 | 6 | 2018 |
Log auditing for trust assessment in peer-to-peer collaboration HTT Truong, CL Ignat 2011 10th International Symposium on Parallel and Distributed Computing, 207-214, 2011 | 5 | 2011 |
IoT European security and privacy projects: Integration, architectures and interoperability E Ferrera, C Pastrone, PE Brun, R De Besombes, K Loupos, ... Next Generation Internet of Things–Distributed Intelligence at the Edge and …, 2022 | 4 | 2022 |
Collaborative editing with contract over friend-to-friend networks HTT Truong, MR Bouguelia, CL Ignat, P Molli | 4 | 2011 |
Secure and auditable proxy technology using trusted execution environments C Soriente, H Truong US Patent 11,451,517, 2022 | 3 | 2022 |