Youngjoo Shin
Youngjoo Shin
School of Cybersecurity, Korea University
Verified email at - Homepage
Cited by
Cited by
Secure data deduplication with dynamic ownership management in cloud storage
J Hur, D Koo, Y Shin, K Kang
IEEE Transactions on Knowledge and Data Engineering 28 (11), 3113-3125, 2016
A survey of secure data deduplication schemes for cloud storage systems
Y Shin, D Koo, J Hur
ACM computing surveys (CSUR) 49 (4), 1-38, 2017
Unveiling hardware-based data prefetcher, a hidden source of information leakage
Y Shin, HC Kim, D Kwon, JH Jeong, J Hur
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications íŽ, 2018
Differentially private client‐side data deduplication protocol for cloud storage services
Y Shin, K Kim
Security and Communication Networks 8 (12), 2114-2123, 2015
Decentralized group key management for dynamic networks using proxy cryptography
J Hur, Y Shin, H Yoon
Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and íŽ, 2007
Decentralized server-aided encryption for secure deduplication in cloud storage
Y Shin, D Koo, J Yun, J Hur
IEEE Transactions on Services Computing, 2020
Security weakness in the proof of storage with deduplication
Y Shin, J Hur, K Kim
Cryptology ePrint Archive, 2012
A hybrid deduplication for secure and efficient data outsourcing in fog computing
D Koo, Y Shin, J Yun, J Hur
2016 IEEE International Conference on Cloud Computing Technology and Science íŽ, 2016
Privacy-preserving smart metering with authentication in a smart grid
JB Hur, DY Koo, YJ Shin
Applied Sciences 5 (4), 1503-1527, 2015
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience
D Koo, Y Shin, J Yun, J Hur
Applied Sciences 8 (12), 2532, 2018
Pre-authentication for fast handoff in wireless mesh networks with mobile APs
C Park, J Hur, C Kim, Y Shin, H Yoon
International Workshop on Information Security Applications, 349-363, 2006
Real-time detection for cache side channel attack using performance counter monitor
J Cho, T Kim, S Kim, M Im, T Kim, Y Shin
Applied Sciences 10 (3), 984, 2020
Secure proof of storage with deduplication for cloud storage systems
Y Shin, D Koo, J Hur, J Yun
Multimedia Tools and Applications 76 (19), 19363-19378, 2017
An online data-oriented authentication based on Merkle tree with improved reliability
D Koo, Y Shin, J Yun, J Hur
2017 IEEE international conference on web services (ICWS), 840-843, 2017
CLDSafe: an efficient file backup system in cloud storage against ransomware
J Yun, J Hur, Y Shin, D Koo
IEICE TRANSACTIONS on Information and Systems 100 (9), 2228-2231, 2017
Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system
D Koo, Y Shin, J Hur
Applied Sciences 7 (10), 1007, 2017
Equality predicate encryption for secure data deduplication
Y Shin, K Kim
Proc. Conference on Information Security and Cryptology (CISC-W), 64-70, 2012
Efficient and Secure File Deduplication in Cloud Storage
Y Shin, K Kim
IEICE Transactions on Information and Systems 97 (No.2), 184-197, 2014
Scalable and efficient approach for secure group communication using proxy cryptography
Y Shin, J Hur
Wireless Networks 18 (4), 413-425, 2012
Miguard: detecting and guarding against malicious iframe through API hooking
JB Yun, Y Shin, HC Kim, H Yoon
IEICE Electronics Express 8 (7), 460-465, 2011
The system can't perform the operation now. Try again later.
Articles 1–20