Son Xuan Ha
2738  results:
Search for persons X
?
1

UAV Speed Control for Mobile Relay System to Ensure Transmi..:

, In: 2024 IEEE/SICE International Symposium on System Integration (SII),
 
?
 
?
4

Millimeter Wave Path Loss Modeling for UAV Communications U..:

, In: Ad Hoc Networks; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
 
?
5

In2P-Med: Toward the Individual Privacy Preferences Identit..:

, In: Lecture Notes in Computer Science; Web Engineering,
Son, Ha Xuan ; Tuan, Khoi N. H. ; Van, Loc C. P.... - p. 126-140 , 2023
 
?
6

PriApp-Install: Learning User Privacy Preferences on Mobile..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
 
?
8

Patient-Chain: Patient-centered Healthcare System a Blockch..:

, In: Parallel and Distributed Computing, Applications and Technologies; Lecture Notes in Computer Science,
 
?
10

SSSB: An Approach to Insurance for Cross-Border Exchange by..:

, In: Mobile Web and Intelligent Information Systems; Lecture Notes in Computer Science,
Quoc, Khoi Le ; Vo, Hong Khanh ; Huong, Luong Hoang... - p. 179-192 , 2022
 
?
11

Toward a Design of Blood Donation Management by Blockchain ..:

, In: Computational Science and Its Applications – ICCSA 2021; Lecture Notes in Computer Science,
 
?
12

Toward a Security IoT Platform with High Rate Transmission ..:

, In: Computational Science and Its Applications – ICCSA 2021; Lecture Notes in Computer Science,
 
?
13

Toward a Blockchain-Based Technology in Dealing with Emerge..:

, In: Mobile, Secure, and Programmable Networking; Lecture Notes in Computer Science,
 
?
14

Smart Care : Integrating Blockchain Technology into the ..:

, In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy,
Duong-Trung, Nghia ; Son, Ha Xuan ; Le, Hai Trieu. - p. 105-109 , 2020
 
?
15

On Components of a Patient-centered Healthcare System Using..:

, In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy,
 
1-15