Secure vehicular communication systems: implementation, performance, and research challenges F Kargl, P Papadimitratos, L Buttyan, M Müter, E Schoch, B Wiedersheim, ... IEEE Communications magazine 46 (11), 110-118, 2008 | 327 | 2008 |
Augmenting zero trust architecture to endpoints using blockchain: A state‐of‐the‐art review L Alevizos, VT Ta, M Hashem Eiza Security and Privacy, e191, 2021 | 60 | 2021 |
Face de-identification with expressions preservation G Letournel, A Bugeau, VT Ta, JP Domenger 2015 IEEE International Conference on Image Processing (ICIP), 4366-4370, 2015 | 50 | 2015 |
A secure road traffic congestion detection and notification concept based on V2I communications VT Ta, A Dvir Vehicular Communications 25, 100283, 2020 | 26 | 2020 |
Blockchain-enabled Intrusion Detection and Prevention System of APTs within Zero Trust Architecture L Alevizos, MH Eiza, VT Ta, Q Shi, J Read IEEE Access, 2022 | 24 | 2022 |
Exemplar-based colorization in RGB color space F Pierre, JF Aujol, A Bugeau, N Papadakis, VT Ta 2014 IEEE International Conference on Image Processing (ICIP), 625-629, 2014 | 19 | 2014 |
Consistency verification of stateful firewalls is not harder than the stateless case L Buttyán, G Pék, TV Thong Infocommunications Journal 64 (1), 2-8, 2009 | 19 | 2009 |
Formal verification of secure ad-hoc network routing protocols using deductive model-checking L Buttyán, TV Thong Periodica Polytechnica, Electrical Engineering Journal 55 (1-2), 31-43, 2011 | 15 | 2011 |
Automated road traffic congestion detection and alarm systems: Incorporating V2I communications into atcss VT Ta arXiv preprint arXiv:1606.01010, 2016 | 14 | 2016 |
Children designing privacy warnings: Informing a set of design guidelines J Dempsey, G Sim, B Cassidy, VT Ta International Journal of Child-Computer Interaction 31, 2022 | 13 | 2022 |
STWSN: A Novel Secure Distributed Transport Protocol for Wireless Sensor Networks A Dvir, VT Ta, S Erlich, L Buttyan International Journal of Communication Systems (IJCS Wiley), 1-28, 2018 | 12 | 2018 |
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains A Dvir, L Buttyan, TV Thong 2013 IEEE International Conference on Communications (ICC), 2073-2078, 2013 | 11 | 2013 |
Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment M Hashem Eiza, R Izuchukwu Okeke, J Dempsey, VT Ta International Journal on Cyber Situational Awareness (IJCSA), 2021 | 10* | 2021 |
Privacy by design: On the conformance between protocols and architectures VT Ta, T Antignac Foundations and Practice of Security, 65-81, 2015 | 10 | 2015 |
Dataprove: Fully automated conformance verification between data protection policies and system architectures VT Ta, MH Eiza Proceedings on Privacy Enhancing Technologies (PoPETs) 2022 (1), 565-585, 2022 | 8 | 2022 |
Formal Accountability for Biometric Surveillance: A Case Study VT Ta, D Butin, D Le Métayer Privacy Technologies and Policy (Annual Privacy Forum) 9484, 21-37, 2016 | 6 | 2016 |
On automating the verification of secure ad-hoc network routing protocols TV Thong, L Buttyán Telecommunication Systems 52, 2611-2635, 2013 | 5 | 2013 |
On formal and automatic security verification of WSN transport protocols. TV Thong, A Dvir IACR Cryptology ePrint Archive 2013 (14), 94 pages, 2013 | 5* | 2013 |
Secure Vehicular Communication Systems: Implementation FP Kargal, P Buttyan, L Muter, M Schoch, E Wiedersheim, ... Ulm Univiversity, 2008 | 5* | 2008 |
Securing road traffic congestion detection by incorporating v2i communications VT Ta, A Dvir, Y Arie 2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018 | 3 | 2018 |