Thuc Dinh Nguyen

Orcid: 0000-0003-0524-8841

According to our database1, Thuc Dinh Nguyen authored at least 39 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
AVET: A Novel Transform Function to Improve Cancellable Biometrics Security.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Security and privacy enhanced smartphone-based gait authentication with random representation learning and digital lockers.
Pattern Recognit., 2022

Group Testing with Blocks of Positives and Inhibitors.
Entropy, 2022

ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database.
Proceedings of the 4th IEEE International Conference on Trust, 2022

2021
Security and Privacy Enhanced Gait Authentication with Random Representation Learning and Digital Lockers.
CoRR, 2021

Multi-Model Long Short-Term Memory Network for Gait Recognition Using Window-Based Data Segment.
IEEE Access, 2021

A Reliability Guaranteed Solution for Data Storing and Sharing.
IEEE Access, 2021

Improved algorithms for non-adaptive group testing with consecutive positives.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
FEHash: Full Entropy Hash for Face Template Protection.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2017
Construction of Pseudoinverse Matrix Over Finite Field and Its Applications.
Wirel. Pers. Commun., 2017

Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis.
Proceedings of the Information Security - 20th International Conference, 2017

2016
RSA-type Algebra Structures.
KSII Trans. Internet Inf. Syst., 2016

2015
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme.
Int. J. Inf. Sec., 2015

Robust fingerprinting codes for database using non-adaptive group testing.
Int. J. Big Data Intell., 2015

SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS.
IACR Cryptol. ePrint Arch., 2015

On the Instability of Sensor Orientation in Gait Verification on Mobile Phone.
Proceedings of the SECRYPT 2015, 2015

Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

On the Public Key-Based Auditing Methods.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

A Generalized Authentication Scheme for Mobile Phones Using Gait Signals.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Robust Message Hiding for QR Code.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer.
J. Inf. Process. Syst., 2013

Effective Fingerprinting Codes for Database.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

How Can We Acquire the Most Common Query Types in Two-Tiered Wireless Sensor Networks?
Proceedings of the Seventh International Conference on Next Generation Mobile Apps, 2013

Early detection for networking anomalies using non-adaptive group testing.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via Internet.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Attacks on Low Private Exponent RSA: An Experimental Study.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Quasi-inverse Based Cryptography.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Robust Fingerprinting Codes for Database.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

2012
Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

2011
A Mutual and Pseudo Inverse Matrix - Based Authentication Mechanism for Outsourcing Service.
Proceedings of the Intelligent Information and Database Systems, 2011

2010
An Efficient Pseudo Inverse Matrix - Based Solution for Secure Auditing.
Proceedings of the 2010 IEEE RIVF International Conference on Computing & Communication Technologies, 2010

Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram.
Proceedings of the U- and E-Service, Science and Technology, 2010

2009
A New S-Box Structure Based on Graph Isomorphism.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Modular Matrix Cipher and Its Application in Authentication Protocol.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

2007
XCSF with computed continuous action.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007


  Loading...