default search action
Le Vinh Thinh
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Le Vinh Thinh, Tran Thien Huan, Samia Bouzefrane:
iTEVAC: an enhanced trusted evacuation system leveraging fog computing and IoT. J. Inf. Telecommun. 8(4): 417-451 (2024) - [j3]Thinh Le Vinh, Huan Tran Thien, Duy L. Le:
Dynamic Traffic Optimization in Smart Cities (DTOS): Integrating OpenStreetMap, IoT, and Fog Computing. SN Comput. Sci. 5(7): 823 (2024) - 2023
- [j2]Rezak Aziz, Soumya Banerjee, Samia Bouzefrane, Thinh Le Vinh:
Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm. Future Internet 15(9): 310 (2023) - [c8]Yulliwas Ameur, Samia Bouzefrane, Le Vinh Thinh:
Handling security issues by using homomorphic encryption in multi-cloud environment. ANT/EDI40 2023: 390-397 - [c7]Thinh Le Vinh, Huan Tran Thien, Trung Nguyen Huu, Samia Bouzefrane:
TEVAC: Trusted Evacuation System based Fog Computing. ICSSE 2023: 164-169 - [c6]Le Vinh Thinh, Tran Thien Huan, Nguyen Van Long:
Building the Shortest Path Database in Urban Traffic Network Using RAO Algorithm. MSPN 2023: 52-70 - 2021
- [c5]Tran Thien Huan, Le Vinh Thinh, Cao Van Kien, Ho Pham Huy Anh:
Robust Biped Walking Pattern Generation Using Hybrid Nonlinear Autoregressive eXogenous and Multi-Layer Perceptron Neural Networks Optimized by Improved Differential Evolution Algorithm. ICSSE 2021: 62-68 - 2020
- [j1]Le Vinh Thinh, Hervé Cagnon, Samia Bouzefrane, Soumya Banerjee:
Property-based token attestation in mobile computing. Concurr. Comput. Pract. Exp. 32(1) (2020) - [c4]Mamoudou Sangaré, Soumya Banerjee, Paul Mühlethaler, Le Vinh Thinh:
Graph Based Subjective Matching of Trusted Strings and Blockchain Based Filtering for Connected Vehicles. MSPN 2020: 1-14
2010 – 2019
- 2017
- [b1]Thinh Le Vinh:
Security and Trust in Mobile Cloud Computing. (La sécurité et la confiance pour le Cloud computing mobile). Conservatoire national des arts et métiers, Paris, France, 2017 - 2016
- [c3]Le Vinh Thinh, Radha Krishna Reddy Pallavali, Fatiha Houacine, Samia Bouzefrane:
Energy Efficiency in Mobile Cloud Computing Architectures. FiCloud Workshops 2016: 326-331 - 2015
- [c2]Le Vinh Thinh, Samia Bouzefrane, Jean-Marc Farinone, Amir Attar, Brian P. Kennedy:
Middleware to Integrate Mobile Devices, Sensors and Cloud Computing. ANT/SEIT 2015: 234-243 - 2014
- [c1]Samia Bouzefrane, Le Vinh Thinh:
Trusted Platforms to Secure Mobile Cloud Computing. HPCC/CSS/ICESS 2014: 1068-1075
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint