Ta Vinh Thong

Orcid: 0000-0003-0399-9633

Affiliations:
  • Edge Hill University, Ormskirk, Lancashire, UK
  • University of Cental Lancashire, UCLan, Preston, UK (2015-2021)
  • Budapest University of Technology and Economics, CrySyS Lab, Hungary (PhD 2014)


According to our database1, Ta Vinh Thong authored at least 21 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Novel Efficient Dynamic Throttling Strategy for Blockchain-Based Intrusion Detection Systems in 6G-Enabled VSNs.
Sensors, September, 2023

2022
Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review.
Secur. Priv., 2022

DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures.
Proc. Priv. Enhancing Technol., 2022

Children designing privacy warnings: Informing a set of design guidelines.
Int. J. Child Comput. Interact., 2022

An Indirect Social Trust Model for Vehicular Social Networks Using Evolving Graph Theory.
CoRR, 2022

Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture.
IEEE Access, 2022

2021
Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review.
CoRR, 2021

2020
A secure road traffic congestion detection and notification concept based on V2I communications.
Veh. Commun., 2020

Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment.
Int. J. Cyber Situational Aware., 2020

2018
STWSN: A novel secure distributed transport protocol for wireless sensor networks.
Int. J. Commun. Syst., 2018

Securing Road Traffic Congestion Detection by Incorporating V2I Communications.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

2015
Formal Accountability for Biometric Surveillance: A Case Study.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
Automated security verification of networking protocols and query auditing algorithms for wireless sensor networks
PhD thesis, 2014

Formal Security Verification of Transport Protocols for Wireless Sensor Networks.
Proceedings of the Advanced Computational Methods for Knowledge Engineering, 2014

Privacy by Design: On the Conformance Between Protocols and Architectures.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

2013
On automating the verification of secure ad-hoc network routing protocols.
Telecommun. Syst., 2013

On formal and automatic security verification of WSN transport protocols.
IACR Cryptol. ePrint Arch., 2013

SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains.
Proceedings of IEEE International Conference on Communications, 2013

2012
Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

2010
Formal verification of secure ad-hoc network routing protocols using deductive model-checking.
Proceedings of the 3rd Joint IFIP Wireless and Mobile Networking Conference, 2010

2008
Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Commun. Mag., 2008


  Loading...