Secure data deduplication with dynamic ownership management in cloud storage J Hur, D Koo, Y Shin, K Kang IEEE Transactions on Knowledge and Data Engineering 28 (11), 3113-3125, 2016 | 92 | 2016 |
A survey of secure data deduplication schemes for cloud storage systems Y Shin, D Koo, J Hur ACM computing surveys (CSUR) 49 (4), 1-38, 2017 | 57 | 2017 |
Differentially private client‐side data deduplication protocol for cloud storage services Y Shin, K Kim Security and Communication Networks 8 (12), 2114-2123, 2015 | 27 | 2015 |
Decentralized group key management for dynamic networks using proxy cryptography J Hur, Y Shin, H Yoon Proceedings of the 3rd ACM workshop on QoS and security for wireless and ¡¦, 2007 | 21 | 2007 |
Security weakness in the Proof of Storage with Deduplication. Y Shin, J Hur, K Kim IACR Cryptol. ePrint Arch. 2012, 554, 2012 | 20 | 2012 |
Pre-authentication for fast handoff in wireless mesh networks with mobile APs C Park, J Hur, C Kim, Y Shin, H Yoon International Workshop on Information Security Applications, 349-363, 2006 | 18 | 2006 |
Privacy-preserving smart metering with authentication in a smart grid JB Hur, DY Koo, YJ Shin Applied Sciences 5 (4), 1503-1527, 2015 | 16 | 2015 |
Secure proof of storage with deduplication for cloud storage systems Y Shin, D Koo, J Hur, J Yun Multimedia Tools and Applications 76 (19), 19363-19378, 2017 | 14 | 2017 |
Unveiling hardware-based data prefetcher, a hidden source of information leakage Y Shin, HC Kim, D Kwon, JH Jeong, J Hur Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications ¡¦, 2018 | 13 | 2018 |
Decentralized server-aided encryption for secure deduplication in cloud storage Y Shin, D Koo, J Yun, J Hur IEEE Transactions on Services Computing, 2020 | 12 | 2020 |
Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system D Koo, Y Shin, J Hur Applied Sciences 7 (10), 1007, 2017 | 12 | 2017 |
An online data-oriented authentication based on Merkle tree with improved reliability D Koo, Y Shin, J Yun, J Hur 2017 IEEE international conference on web services (ICWS), 840-843, 2017 | 11 | 2017 |
A hybrid deduplication for secure and efficient data outsourcing in fog computing D Koo, Y Shin, J Yun, J Hur 2016 IEEE International Conference on Cloud Computing Technology and Science ¡¦, 2016 | 11 | 2016 |
CLDSafe: an efficient file backup system in cloud storage against ransomware J Yun, J Hur, Y Shin, D Koo IEICE TRANSACTIONS on Information and Systems 100 (9), 2228-2231, 2017 | 10 | 2017 |
Equality predicate encryption for secure data deduplication Y Shin, K Kim Proc. Conference on Information Security and Cryptology (CISC-W), 64-70, 2012 | 10 | 2012 |
Miguard: detecting and guarding against malicious iframe through API hooking JB Yun, Y Shin, HC Kim, H Yoon IEICE Electronics Express 8 (7), 460-465, 2011 | 10 | 2011 |
Efficient and Secure File Deduplication in Cloud Storage Y Shin, K Kim IEICE Transactions on Information and Systems 97 (No.2), 184-197, 2014 | 9 | 2014 |
Scalable and efficient approach for secure group communication using proxy cryptography Y Shin, J Hur Wireless Networks 18 (4), 413-425, 2012 | 9 | 2012 |
An efficient proactive key distribution scheme for fast handoff in IEEE 802.11 wireless networks J Hur, C Park, Y Shin, H Yoon International Conference on Information Networking, 629-638, 2007 | 8 | 2007 |
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience D Koo, Y Shin, J Yun, J Hur Applied Sciences 8 (12), 2532, 2018 | 5 | 2018 |