Follow
Toan Thinh Truong
Toan Thinh Truong
Department of Software Engineering, University of Science, VNU-HCM
Verified email at fit.hcmus.edu.vn
Title
Cited by
Cited by
Year
Improvement of the more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC
TT Truong, MT Tran, AD Duong
2012 26th international conference on advanced information networking and …, 2012
452012
Robust mobile device integration of a fingerprint biometric remote authentication scheme
TT Truong, MT Tran, AD Duong
Advanced Information Networking and Applications (AINA), 2012 IEEE 26th …, 2012
242012
Provable identity based user authentication scheme on ECC in multi-server environment
TT Truong, MT Tran, AD Duong, I Echizen
Wireless Personal Communications 95, 2785-2801, 2017
232017
Robust secure dynamic ID based remote user authentication scheme for multi-server environment
TT Truong, MT Tran, AD Duong
Computational Science and Its Applications–ICCSA 2013: 13th International …, 2013
172013
Robust biometrics-based remote user authentication scheme using smart cards
TT Truong, MT Tran, AD Duong
2012 15th International Conference on Network-Based Information Systems, 384-391, 2012
122012
Chaotic chebyshev polynomials based remote user authentication scheme in client-server environment
TT Truong, MT Tran, AD Duong, I Echizen
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
112015
Improved Chebyshev polynomials-based authentication scheme in client-server environment
TT Truong, MT Tran, AD Duong
Security and Communication Networks 2019, 2019
102019
Enhanced dynamic authentication scheme (EDAS)
TT Truong, MT Tran, AD Duong
Information Systems Frontiers 16, 113-127, 2014
72014
Large margin cotangent loss for deep similarity learning
AK Duong, HL Nguyen, TT Truong
2022 International Conference on Advanced Computing and Analytics (ACOMPA …, 2022
52022
Smart kiosk with gait-based continuous authentication
DT Phan, NNT Dam, MP Nguyen, MT Tran, TT Truong
Distributed, Ambient, and Pervasive Interactions: Third International …, 2015
52015
Modified dynamic ID-based user authentication scheme resisting smart-card-theft attack
TT Truong, MT Tran, AD Duong
Applied Mathematics & Information Sciences 8 (3), 967, 2014
52014
Modified efficient and secure dynamic id-based user authentication scheme
TT Truong, MT Tran, AD Duong
Information and Communication Technology: International Conference, ICT …, 2013
42013
Provable user authentication scheme on ECC in multi-server environment
TT Truong, MT Tran, AD Duong, PN Nguyen-Pham, HA Nguyen, ...
The Journal of Supercomputing 79 (1), 725-761, 2023
32023
Secure identity-based authentication scheme suitable for limited-resource devices
TT Truong, VM Luong, MT Tran, AD Duong
2016 12th International Conference on Computational Intelligence and …, 2016
32016
Dynamic identity-based authentication scheme with perfect forward secrecy session key
TT Truong, MT Tran, AD Duong
AETA 2013: Recent Advances in Electrical Engineering and Related Sciences …, 2014
32014
Enhanced face authentication with separate loss functions
AK Duong, HL Nguyen, TT Truong
arXiv preprint arXiv:2302.11427, 2023
22023
Chebyshev polynomial-based authentication scheme in multiserver environment polynomial-based authentication scheme
TT Truong, MT Tran, AD Duong
Security and Communication Networks 2020, 1-21, 2020
22020
Provable user authentication scheme in telecare medicine information system using elliptic curve cryptosystem
TT Truong, DT Phan, MT Tran, AD Duong, I Echizen
2016 11th International Conference on Availability, Reliability and Security …, 2016
12016
Improved id-based remote user authentication scheme using smart card
TT Truong, MT Tran, AD Duong
2013 9th International Wireless Communications and Mobile Computing …, 2013
12013
Inference Rules for Determined Decisions in Policy-Based ABAC Enforcement Systems
BH Pham, TT Truong, MT Tran
2023 7th International Conference on Cryptography, Security and Privacy (CSP …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20