Thuc Dinh Nguyen

Learn More
Mobile authentication/identification has grown into a priority issue nowadays because of its existing outdated mechanisms, such as PINs or passwords. In this paper, we introduce gait recognition by using a mobile accelerometer as not only effective but also as an implicit identification model. Unlike previous works, the gait recognition only performs well(More)
In this paper, we propose a novel gait authentication mechanism by mining sensor resources on mobile phone. Unlike previous works, both built-in accelerometer and magnetometer are used to handle mobile installation issues, including but not limited to disorientation, and misplacement errors. The authentication performance is improved by executing deep(More)
Authentication systems using gait captured from inertial sensors have been recently developed to enhance the limitation of existing mechanisms on mobile devices and achieved promising results. However, most these systems employed pattern recognition and machine learning techniques in which biometric templates are stored insecurely, which could leave(More)
Response Code (QR code) is widely used in daily life in recent years because it has high capacity encoding of data, damage resistance, fast decoding and other good characteristics. Since it is popular, people can use it to transmit secret information without inspection. The development of steganography in QR code lead to many problems arising. How to keep(More)
Wireless Sensor Networks (WSNs) gain popularity these days. WSNs have been one of key technologies for the future with broad applications from the military to everyday life. There are two kinds of WSNs model models with sensors for sensing data and a server for receiving and processing queries from users, and models with special additional nodes, their(More)
Database outsourcing is emerging as an important trend in which the data owners ship their data to external service provider. Since a service provider is not fully trusted, security and privacy are significant issues. They can be referred to as data confidentiality, user and data privacy, query assurance and secure auditing. Among them, secure auditing(More)
Matrix cryptosystems, like Hill cipher, are resistant to frequency analysis. The key is a non-singular k times k matrix, for example 3 times 3 matrix K. In this paper, we propose simple criteria to generate a modular non-singular key-matrix for matrix ciphers fast. We apply these results to cryptography and computer security. In this paper, we present a(More)
In this paper, we propose a new approach to represent general S-Box based on linear-transform and a given non-linear function that increases the complexity of algebraic expression and size of S-Box. In the case of size of 8, the proposed S-Box can archive the maximum number of terms (255 terms) and therefore it can be used to replace the classical S-Box(More)