Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Hoang Dang Hai"'
Publikováno v:
2020 International Conference on Advanced Technologies for Communications (ATC).
Efficient algorithms performing binary field operations are often required in cryptography such as for digital signatures on binary elliptic curves. The most important operation that affects the performance of such algorithms is the multiplication si
Publikováno v:
2020 4th International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom).
Binary field multiplication (BFM) plays an important role in applications such as elliptic curve cryptography (ECC). For efficient implementation of BFM on hardware platforms, the design of fast BFM algorithms is remaining a hot research challenge. T
Publikováno v:
2019 International Conference on Advanced Technologies for Communications (ATC).
This paper evaluates trade-off between reliable and secure communication for multi-hop low-energy adaptive clustering hierarchy (LEACH) networks under impact of hardware imperfection. In the proposed scheme, a source communicates with a destination v
Publikováno v:
SoftCOM
In the last few years, markets of Internet of Things (IoT) technology is emerging rapidly as the technology will become an important part of our everyday life in the next few decades. Since accessibility of IoT devices requires controlling, monitorin
Publikováno v:
2018 20th International Conference on Advanced Communication Technology (ICACT).
Network security has become a critical issue in recent years. A drastic increase in the use of devices for accessing corporate networks could expose these systems to major security risks. As the use of personal computers moves to mobile devices and n
Autor:
Pham Thieu Nga, Hoang Dang Hai
Publikováno v:
SoICT
Evaluating the security level of the Web-Portal is an urgent need, but it is not yet paid enough attention. A quantitative method is a key factor in analyzing security level evaluation. The formal model of the standard ISO/IEC 15408 and some other se
Autor:
Hoang Dang Hai, Nguyen Ha Duong
Publikováno v:
2016 18th International Conference on Advanced Communication Technology (ICACT).
Network traffic anomaly detection can find unusual events cause by hacker activity. Most research in this area focus on supervised and unsupervised model. In this work, we proposed a semi-supervised model based on combination of Mahalanobis distance
Autor:
Nguyen Ha Duong, Hoang Dang Hai
Publikováno v:
2015 17th International Conference on Advanced Communication Technology (ICACT).
Network traffic anomaly detection can help to early detect network attacks because hacker's activities may result in unusual changes of network traffic, that are significant fluctuations compared to normal traffic of the network Among various anomaly
Autor:
Hoang Dang Hai, Vu Hoang Hieu
Publikováno v:
2006 First International Conference on Communications and Electronics.
Adaptive middleware enables modifying the behavior of a distributed application after the application is developed in response to some changes in functional requirements or operating conditions. Several projects proposed adaptive middleware architect
Autor:
Hoang Dang Hai, Thorsten Strufe, Pham Thieu Nga, Hoang Hong Ngoc, Nguyen Anh Son, Immanuel Schweizer
Publikováno v:
Journal of Research and Development on Information and Communication Technology. :107
Sparse Wireless Sensor Networks using several mobile nodes and a small number of static sensor nodes have been widely used for many applications, especially for traffic-generated pollution monitoring. This paper proposes a method for data collection