Departments and laboratories

Security Laboratory

Security Laboratory

November 11

Visions

– To play a crucial and pivotal role in the VNU University of Engineering and Technology’s training, scientific research, technology development, application deployment, consultation, assessment, and professional cooperation activities in the area of information security

– To concentrate material and human resources in the VNU University of Engineering to solve pressing scientific and technological problems in assurance of information security in Vietnam.

– To contribute to raising awareness of information security among information technology professionals, promoting the development and application of effective core technologies for information security in Vietnam.

Hình 1. Một buổi làm việc tại PTN An toàn thông tin

Faculty members

– 3 doctors:
Dr. Nguyen Dai Tho, Dr. Le Dinh Thanh, Dr. Le Thi Hoi

– 3 bachelors:
Nguyen Xuan Nam, Hoang Dang Kien, Nguyen Thi Thu Trang

Teaching

– To develop and enhance training programs, curriculums, course syllabuses, lectures, laboratory exercises, and textbooks on information security at the VNU University of Engineering and Technology

– To teach and provide support for the realization of information security courses at the Faculty of Information Technology and related courses at the University of Engineering and Technology and the Vietnam National University, Hanoi.

– To supervise and evaluate students’ internships, scientific research works, Bachelor’s theses, Master’s theses, and PhD theses in information security.

Hình 3. Sinh viên đạt giải cao tại các cuộc thi An toàn thông tin trong nước và quốc tế

Research

– To lead, develop, provide support for, evaluate, and assess programs, plans, and projects in information security

– To carry out scientific research works on infrastructure security and application security

– To provide advanced facilities and equipments for tests, experiments, research simulations, scientific and technological developments in information security

– To create an academic environment for discussions, professional exchanges, and specialized training seminars in information security

– To assess the current situation, identify security vulnerabilities of information systems, provide analyses, advices, and supports for the implementation of appropriate security measures.

Professional cooperation

– To represent the Faculty of Information Technology and the VNU University of Engineering and Technology in development cooperation, training support, professional and research exchange activities in information security with domestic and overseas companies and institutions

– To promote and participate in the deployment of joint research and development projects in information security with partner institutions and client companies

Projects

– Development of a trial system for the fire alert using wireless sensor networks, University of Engineering and Technology, Vietnam National University, Hanoi, 2013-2014

– Performance enhancement of some routing protocols in wireless networks, University of Engineering and Technology, Vietnam National University, Hanoi, 2011-2012

– Research on the development of a system for providing and managing digital certificates using Public Key Infrastructure (PKI), for assuring the security of transactions on computer networks in support of state management activities in Hanoi, City of Hanoi, 2007-2009

– Studies on the application of agent technology for the retrieval and transfer of information on the Internet, University of Engineering and Technology, Vietnam National University, Hanoi, 2005-2006

– Public Key Infrastructure (PKI), for assuring the security of transactions on computer networks in support of state management activities in Hanoi, City of Hanoi, 2005-2007

International Publications

1. Dai Tho Nguyen, Thanh Le Dinh, and Binh Minh Nguyen. Efficient Core Selection for Multicast Routing in Mobile Ad Hoc Networks. In Proceedings of the Second International Conference on Computer Science, Applied Mathematics and Applications (ICCSAMA 2014), Budapest, Hungary, pages 415-426, Springer, 2014.

2. Luong Viet Nguyen, Ho Van Canh, and Trinh Nhat Tien. Pyramidal JND Model for Grayscale Image and its Application to Watermarking. In Proceedings of 2013 IEEE International Conference on Computer Science and Automation Engineering (CSAE 2013), Guangzhou, China, 2013.

3. Luong Viet Nguyen, Ho Van Canh, and Trinh Nhat Tien. The Method of Hiding Steganography without Key Exchanging and Original Image. In Proceedings of the International Conference on Computer Science and Automation Engineering (CSAE 2012), pages 408-412, Zhangjiajie, China, 2012.

4. Nguyen Thanh Tung, Nguyen Van Duc, Nguyen Hai Thanh, Phan Cong Vinh, and Nguyen Dai Tho. Power Save Protocol Using Chain Based Routing. In Proceedings of the International Conference on Context-Aware Systems and Applications (ICCASA 2012), pages 183-191. Ho Chi Minh City, Vietnam, 2012.

5. Thanh Le Dinh, Dai Tho Nguyen, and Ho Thuan. Hybrid Contention-Based Geographic Routing in Wireless Sensor Networks. In Proceedings of the Second International Symposium on Information and Communication Technology (SoICT 2011), pages 86-91, Hanoi, Vietnam, 2011.

6. Hai Nguyen Trung and Dai Tho Nguyen. An Efficient and Message-Optimal Multicast Routing Protocol in Mobile Ad-Hoc Networks. In Proceedings of the 2011 International Conference on Advanced Technologies for Communications, pages 169-173, Da Nang, Vietnam, 2011.

7. Thanh Le Dinh and Dai Tho Nguyen. Greedy Geographic Routing with Path Optimization in Wireless Sensor Networks. In Proceedings of the 2010 IEEE-RIVF International Conference on Computing and Communication Technologies, pages 148-153, Hanoi, Vietnam, 2010.

8. Dang Thu Hien, Trinh Nhat Tien, and Truong Thi Thu Hien. An Efficient Identity-Based Broadcast Signcryption Scheme. In Proceedings of the Second International Conference on Knowledge and Systems Engineering (KSE), pages 209-216, Hanoi, Vietnam, 2010.

9. Ho Thi Huong Thom, Ho Van Canh, and Trinh Nhat Tien. Steganalysis of Reversible Vertical Horizontal Data Hiding Technique. International Journal of Computer Science and Information Security, Vol. 8, No. 6, pages 7-12, 2010.

10. Ho Thi Huong Thom, Ho Van Canh, and Trinh Nhat Tien. Steganalysis to Reversible Data Hiding. In Proceedings of the International Conference on Database Theory and Application (DTA 2009), pages 1-8, Jeju Island, Korea, 2009.

11. Ho Thi Huong Thom, Ho Van Canh, and Trinh Nhat Tien. Novel Algorithms of Classification to Steganalysis of Compressed Images and Uncompressed Images. In Proceedings of the Second International Conference on Knowledge and Systems Engineering (KSE), pages 87-92, Hanoi, Vietnam, 2010.

12. Ho Thi Huong Thom, Ho Van Canh, and Trinh Nhat Tien. Statistical Methods to Steganalysis of Color or Grayscale Images. In Proceedings of the Doctoral Symposium, 2009 IEEE-RIVF International Conference on Computing and Communication Technologies on, pages 1-6, Da Nang, Vietnam, 2009.

13. Dai Tho Nguyen, Bach Le Nguyen, and Duy Loi Vu. Improving Freenet’s Performance by Adaptive Clustering Cache Replacement. In Proceedings of the 2009 IEEE-RIVF International Conference on Computing and Communication Technologies, pages 195-201, Da Nang, Vietnam, 2009.

14. Thanh Le Dinh. Topological Boundary Detection in Wireless Sensor Networks. International Journal of Information Processing Systems, Vol. 5, No. 3, pages 145-150, 2009.

15. Dinh Thanh Le. Another Topological Hole Detection Protocol for Wireless Sensor Networks. In Proceedings of the Third International Conference on Ubiquitous Information Technology and Applications, pages 75-79, Ho Chi Minh City, Vietnam, 2008.

16. Marc Bui, Sajal K. Das, Ajoy Kumar Datta, and Dai Tho Nguyen. Randomized Mobile Agent Based Routing in Wireless Networks. International Journal of Foundations of Computer Science, Vol. 12, No. 3, pages 365-384, 2001.

17. Marc Bui, Sajal K. Das, Ajoy Kumar Datta, and Dai Tho Nguyen. Randomized Mobile Agent Based Routing in Wireless Networks. In Proceedings of the 7th International Colloquium on Structural Information and Communication Complexity (SIROCCO 2000), pages 47-61, L’Aquila, Italy, 2000.

18. Marc Bui, Ajoy Kumar Datta, Olivier Flauzac, and Dai Tho Nguyen. Randomized Adaptive Routing Based on Mobile Agents. In Proceedings of the 4th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN’99), pages 380-387, Fremantle, Australia, 1999.

National Publications (in English)

1. Dai Tho Nguyen, Ho Thuan, Thanh Le Dinh. Improvements to a Protocol for the Maintenance of Common Data in Distributed Systems. In Proceedings of the 15th National Symposium on Selected Topics of Information Technology and Telecommunications, pages 122-126, Hanoi, Vietnam, 2013.

2. Thanh Le Dinh, Dai Tho Nguyen, and Ho Thuan. More Efficient Path Optimization for Greedy Geographic Routing in Wireless Sensor Networks. Journal of Sience of HNUE (Hanoi National University of Education), pages 150-156, vol. 58, 2013.

3. Luong Viet Nguyen, Ho Van Canh, and Trinh Nhat Tien. Watermarking Using Explicit HVS’s Properties. In Proceedings of the 6th National Symposium on Fundamental and Applied Information Technology Research, Hue, Vietnam, 2013.

4. Thanh Le Dinh, Dai Tho Nguyen, and Ho Thuan. More Efficient Path Optimization for Greedy Geographic Routing in Wireless Sensor Networks. In Proceedings of the 2012 Scientific Research Workshop of the HNUE (Hanoi National University of Education) Faculty of Information Technology, pages 49-54. Hanoi, Vietnam, 2012.

5. Thanh Le Dinh and Dai Tho Nguyen. A Self-Stabilizing Multiple on Data Segment (MODS) Incremental Update Protocol for the Maintenance of Common Data in Distributed Systems. In Proceedings of the 3rd National Symposium on Fundamental and Applied Information Technology Research, pages 173-183, Nha Trang, Vietnam, 2008.

6. Trinh Nhat Tien. The Fast Algorithm for Founding Nonpreemptive Schedule with Some On-time Jobs in Minimal Processing Time. Journal of Computer Science and Cybernetics, Vol. 17, No. 1, pages 21-30, 2001.

7. Trinh Nhat Tien. An O(n2logn) Algorithm for a Nonpreemptive Schedule on One Machine. Journal of Computer Science and Cybernetics, Vol. 15, No. 1, 1999.

© VNU-UET-Faculty of Information Technology. All rights reserved.