scispace - formally typeset
T

Tham Nguyen

Researcher at University of Technology, Sydney

Publications -  9
Citations -  512

Tham Nguyen is an academic researcher from University of Technology, Sydney. The author has contributed to research in topics: Encryption & Computer science. The author has an hindex of 3, co-authored 7 publications receiving 313 citations. Previous affiliations of Tham Nguyen include Commonwealth Scientific and Industrial Research Organisation & University of Sydney.

Papers
More filters
Journal ArticleDOI

A Survey of Wearable Devices and Challenges

TL;DR: The communication security issues facing the popular wearables is examined followed by a survey of solutions studied in the literature, and the techniques for improving the power efficiency of wearables are explained.
Proceedings ArticleDOI

Challenge-response trust assessment model for personal space IoT

TL;DR: The proposed challenge-response trust assessment model provides a reliable trust resource that can be used along with other resources such as direct trust, recommendation trust to get a comprehensive trust opinion on a specific device and can be considered as a new method for evaluating the trust value on a device.
Proceedings ArticleDOI

Initial trust establishment for personal space IoT systems

TL;DR: A challenge-response method and a trust assessment model is proposed to establish, without prior knowledge, the initial trust that a device places on another in a mobile and dynamic environment called personal space IoT.
Posted Content

Privacy-Preserving Spam Filtering using Functional Encryption.

TL;DR: A spam classification framework that enables the classification of encrypted emails and is based on a neural network with a quadratic network part and a multi-layer perception network part that achieves an accuracy of over 96%.
Proceedings ArticleDOI

Dirichlet-Based Initial Trust Establishment for Personal Space IoT Systems

TL;DR: A Dirichlet-based trust assessment model is proposed to establish the initial trust that the system places on a device in a mobile and dynamic environment called personal space IoT and can also be used to affirm the trust of a device during its operation or when it is being re-admitted to the system after an interruption.