Towards secure cloud orchestration for multi-cloud deployments N Paladi, A Michalas, HV Dang Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms, 4, 2018 | 24 | 2018 |
MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX A Michalas, A Bakas, HV Dang, A Zaltiko Nordic Conference on Secure IT Systems, 254-270, 2019 | 22 | 2019 |
Cloud Apps To-Go: Cloud Portability with TOSCA and MiCADO J Deslauriers, T Kiss, R Ariyattu, H Dang, A Ullah, J Bowden, D Krefting, ... Concurrency and Computation: Practice & Experience, 2020 | 17 | 2020 |
Describing and processing topology and quality of service parameters of applications in the cloud G Pierantoni, T Kiss, G Terstyanszky, J DesLauriers, G Gesmier, HV Dang Journal of Grid Computing, 1-18, 2020 | 15 | 2020 |
Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX A Michalas, A Bakas, HV Dang, A Zalitko Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019 | 13 | 2019 |
A privacy preserving message authentication code DH Van, ND Thuc 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-4, 2015 | 11 | 2015 |
Quasi-inverse based cryptography TD Nguyen, VH Dang International Conference on Computational Science and Its Applications, 629-642, 2013 | 10 | 2013 |
Do not tell me what I cannot do!(The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version). E Frimpong, A Bakas, HV Dang, A Michalas IACR Cryptol. ePrint Arch. 2020, 176, 2020 | 6 | 2020 |
Construction of Pseudoinverse Matrix Over Finite Field and Its Applications VH Dang, TD Nguyen Wireless Personal Communications 94 (3), 455-466, 2017 | 6 | 2017 |
Attributebased symmetric searchable encryption HV Dang, A Ullah, A Bakas, A Michalas 2nd Workshop on Cloud Security and Privacy (Cloud S&P) in conjunction with …, 2020 | 4 | 2020 |
Pseudoinverse matrix over finite field and its applications DH Van, ND Thuc Information science and applications, 491-498, 2015 | 4 | 2015 |
Efficient privacy preserving data audit in cloud HV Dang, TS Tran, DT Nguyen, TV Bui, DT Nguyen Advanced Computational Methods for Knowledge Engineering, 185-196, 2015 | 3 | 2015 |
SSM: Scalable Substitution Matrix Cipher DH Van, NT Binh, TM Triet, TN Bao, N Ho Special Issue on Theories and Applications of Computer Science, Journal of …, 2008 | 3 | 2008 |
A Secure Cloud-based Platform to Host Healthcare Applications G Pierantoni, T Kiss, G Terstyanszky, HV Dang, S Delgado Olabarriaga, ... 11th International Workshop on Science Gateways, IWSG 2019, 2019 | 1 | 2019 |
Approach to privacy-preserve data in two-tiered wireless sensor network based on linear system and histogram VH Dang, S Wohlgemuth, H Yoshiura, TD Nguyen, I Echizen International Conference on U-and E-Service, Science and Technology, 17-30, 2010 | 1 | 2010 |