Anh Duc Duong

According to our database1, Anh Duc Duong authored at least 50 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Provable user authentication scheme on ECC in multi-server environment.
J. Supercomput., 2023

2022
A Provably Secure User Authentication Scheme Over Unreliable Networks.
Proceedings of the Advanced Information Networking and Applications, 2022

2020
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment.
Secur. Commun. Networks, 2020

A comparison of methods for 3D scene shape retrieval.
Comput. Vis. Image Underst., 2020

2019
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment.
Secur. Commun. Networks, 2019


2018



2017
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment.
Wirel. Pers. Commun., 2017


2016
Secure Identity-Based Authentication Scheme Suitable for Limited-Resource Devices.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016


2015
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Realtime Face Verification with Lightweight Convolutional Neural Networks.
Proceedings of the Advances in Visual Computing - 11th International Symposium, 2015

2014
Enhanced Dynamic Authentication Scheme (EDAS).
Inf. Syst. Frontiers, 2014

A Better Heuristic Algorithm for Finding the Closest Trio of 3-colored Points from a Given Set of 3-colored Points on a Plane.
Fundam. Informaticae, 2014

Unsupervised social media events clustering using user-centric parallel split-n-merge algorithms.
Proceedings of the IEEE International Conference on Acoustics, 2014

Essential keypoints to enhance visual object recognition with saliency-based metrics.
Proceedings of the 13th International Conference on Control Automation Robotics & Vision, 2014

Picture-Driven User Interface Development for Applications on Multi-platforms.
Proceedings of the Human-Computer Interaction. Theories, Methods, and Tools, 2014

Smart Card Based User Authentication Scheme with Anonymity.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

Two-Way Biometrics-Based Authentication Scheme on Mobile Devices.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2013
Trap escape for local search by backtracking and conflict reverse.
Proceedings of the Twelfth Scandinavian Conference on Artificial Intelligence, 2013

Local Descriptors without Orientation Normalization to Enhance Landmark Regconition.
Proceedings of the Knowledge and Systems Engineering, 2013

Improved id-based remote user authentication scheme using smart card.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Modified Efficient and Secure Dynamic ID-Based User Authentication Scheme.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Robust Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Collaborative Smart Virtual Keyboard with Word Predicting Function.
Proceedings of the Human-Computer Interaction. Interaction Modalities and Techniques, 2013

2012
Augmented media for traditional magazines.
Proceedings of the Symposium on Information and Communication Technology 2012, 2012

Applying Virtual Reality for In-Door Jogging.
Proceedings of the 2012 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), Ho Chi Minh City, Vietnam, February 27, 2012

Smart Shopping Assistant: A Multimedia and Social Media Augmented System with Mobile Devices to Enhance Customers' Experience and Interaction.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Robust Biometrics-Based Remote User Authentication Scheme Using Smart Cards.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Realtime arbitrary-shaped template matching process.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

An Indexed Bottom-up Approach for Publishing Anonymized Data.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Improvement of the More Efficient and Secure ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Pool-based anonymous communication framework for high-performance computing.
J. Supercomput., 2011

2010
Moving Objects Segmentation in Video Sequence Based on Bayesian Network.
Proceedings of the 2010 IEEE RIVF International Conference on Computing & Communication Technologies, 2010

Bi-directional RPROB-based Location Anonymizer System for Location-Based Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services.
Proceedings of the ARES 2010, 2010

2009
Adaptive Hybrid Mean Shift and Particle Filter.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009

RPROB - A Family of Binomial-Mix-based Anonymous Communication Systems.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

XPROB - A Generalized Pool-Based Anonymous Communication Framework.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Addressing cold-start problem in recommendation systems.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Gray S-Box for Advanced Encryption Standard.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2006
Ridge and valley based face detection.
Proceedings of the 4th International Confernce on Computer Sciences: Research, 2006

2005
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2002
The Extended Rijndael-like Block Ciphers.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

The Advanced Encryption Standard and its Application in the Examination Security in Vietnam.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002


  Loading...