Nguyen Phong Hoang

Learn More
As we are living in the digital age, information technology appears in nearly every aspect of our daily lives, and plays an integral role in agriculture, industry, education, business, politics, etc. Thanks to its undeniable convenience, information technology has helped to make our lives easier and more comfortable. For instance, VoIP (voice over IP)(More)
— Trilateration has recently become one of the well-known threat models to the user's location privacy in location-based applications (aka: location-based services or LBS), especially those containing highly sensitive information such as dating applications. The threat model mainly depends on the distance shown from the targeted victim to the adversary to(More)
—Regardless of Tor's robustness against individual attackers thanks to its distributed characteristics, the network is still highly vulnerable to those very powerful adversaries, such as oppressive regimes which have control over a large proportion of the Internet. As recently confirmed by Edward Snowden, Autonomous-System level adversary is no longer(More)
—Trilateration is one of the well-known threat models to the user's location privacy in location-based apps; especially those contain highly sensitive information such as dating apps. The threat model mainly bases on the publicly shown distance from a targeted victim to the adversary to pinpoint the victim's location. As a countermeasure, most of(More)
  • 1