Follow
Hai-Van Dang
Hai-Van Dang
Research Associate, University of Westminster, United Kingdom
Verified email at westminster.ac.uk
Title
Cited by
Cited by
Year
Towards secure cloud orchestration for multi-cloud deployments
N Paladi, A Michalas, HV Dang
Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms, 4, 2018
242018
MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX
A Michalas, A Bakas, HV Dang, A Zaltiko
Nordic Conference on Secure IT Systems, 254-270, 2019
222019
Cloud Apps To-Go: Cloud Portability with TOSCA and MiCADO
J Deslauriers, T Kiss, R Ariyattu, H Dang, A Ullah, J Bowden, D Krefting, ...
Concurrency and Computation: Practice & Experience, 2020
162020
Describing and processing topology and quality of service parameters of applications in the cloud
G Pierantoni, T Kiss, G Terstyanszky, J DesLauriers, G Gesmier, HV Dang
Journal of Grid Computing, 1-18, 2020
152020
Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX
A Michalas, A Bakas, HV Dang, A Zalitko
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
132019
A privacy preserving message authentication code
DH Van, ND Thuc
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-4, 2015
112015
Quasi-inverse based cryptography
TD Nguyen, VH Dang
International Conference on Computational Science and Its Applications, 629-642, 2013
102013
Do not tell me what I cannot do!(The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version).
E Frimpong, A Bakas, HV Dang, A Michalas
IACR Cryptol. ePrint Arch. 2020, 176, 2020
62020
Construction of Pseudoinverse Matrix Over Finite Field and Its Applications
VH Dang, TD Nguyen
Wireless Personal Communications 94 (3), 455-466, 2017
62017
Attributebased symmetric searchable encryption
HV Dang, A Ullah, A Bakas, A Michalas
2nd Workshop on Cloud Security and Privacy (Cloud S&P) in conjunction with …, 2020
42020
Pseudoinverse matrix over finite field and its applications
DH Van, ND Thuc
Information science and applications, 491-498, 2015
42015
Efficient privacy preserving data audit in cloud
HV Dang, TS Tran, DT Nguyen, TV Bui, DT Nguyen
Advanced Computational Methods for Knowledge Engineering, 185-196, 2015
32015
SSM: Scalable Substitution Matrix Cipher
DH Van, NT Binh, TM Triet, TN Bao, N Ho
Special Issue on Theories and Applications of Computer Science, Journal of …, 2008
32008
A Secure Cloud-based Platform to Host Healthcare Applications
G Pierantoni, T Kiss, G Terstyanszky, HV Dang, S Delgado Olabarriaga, ...
11th International Workshop on Science Gateways, IWSG 2019, 2019
12019
Approach to privacy-preserve data in two-tiered wireless sensor network based on linear system and histogram
VH Dang, S Wohlgemuth, H Yoshiura, TD Nguyen, I Echizen
International Conference on U-and E-Service, Science and Technology, 17-30, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–15