Youngjoo Shin
Title
Cited by
Cited by
Year
Secure data deduplication with dynamic ownership management in cloud storage
J Hur, D Koo, Y Shin, K Kang
IEEE Transactions on Knowledge and Data Engineering 28 (11), 3113-3125, 2016
872016
A survey of secure data deduplication schemes for cloud storage systems
Y Shin, D Koo, J Hur
ACM computing surveys (CSUR) 49 (4), 1-38, 2017
522017
Differentially private client‐side data deduplication protocol for cloud storage services
Y Shin, K Kim
Security and Communication Networks 8 (12), 2114-2123, 2015
232015
Decentralized group key management for dynamic networks using proxy cryptography
J Hur, Y Shin, H Yoon
Proceedings of the 3rd ACM workshop on QoS and security for wireless and íŽ, 2007
212007
Security weakness in the Proof of Storage with Deduplication.
Y Shin, J Hur, K Kim
IACR Cryptol. ePrint Arch. 2012, 554, 2012
192012
Pre-authentication for fast handoff in wireless mesh networks with mobile APs
C Park, J Hur, C Kim, Y Shin, H Yoon
International Workshop on Information Security Applications, 349-363, 2006
182006
Privacy-preserving smart metering with authentication in a smart grid
JB Hur, DY Koo, YJ Shin
Applied Sciences 5 (4), 1503-1527, 2015
152015
Unveiling hardware-based data prefetcher, a hidden source of information leakage
Y Shin, HC Kim, D Kwon, JH Jeong, J Hur
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications íŽ, 2018
122018
Secure proof of storage with deduplication for cloud storage systems
Y Shin, D Koo, J Hur, J Yun
Multimedia Tools and Applications 76 (19), 19363-19378, 2017
122017
Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system
D Koo, Y Shin, J Hur
Applied Sciences 7 (10), 1007, 2017
112017
Decentralized server-aided encryption for secure deduplication in cloud storage
Y Shin, D Koo, J Yun, J Hur
IEEE Transactions on Services Computing, 2017
112017
An online data-oriented authentication based on Merkle tree with improved reliability
D Koo, Y Shin, J Yun, J Hur
2017 IEEE international conference on web services (ICWS), 840-843, 2017
102017
A hybrid deduplication for secure and efficient data outsourcing in fog computing
D Koo, Y Shin, J Yun, J Hur
2016 IEEE International Conference on Cloud Computing Technology and Science íŽ, 2016
102016
Equality predicate encryption for secure data deduplication
Y Shin, K Kim
Proc. Conference on Information Security and Cryptology (CISC-W), 64-70, 2012
102012
Miguard: detecting and guarding against malicious iframe through API hooking
JB Yun, Y Shin, HC Kim, H Yoon
IEICE Electronics Express 8 (7), 460-465, 2011
102011
Efficient and Secure File Deduplication in Cloud Storage
Y Shin, K Kim
IEICE Transactions on Information and Systems 97 (No.2), 184-197, 2014
92014
Scalable and efficient approach for secure group communication using proxy cryptography
Y Shin, J Hur
Wireless Networks 18 (4), 413-425, 2012
92012
CLDSafe: an efficient file backup system in cloud storage against ransomware
J Yun, J Hur, Y Shin, D Koo
IEICE TRANSACTIONS on Information and Systems 100 (9), 2228-2231, 2017
82017
An efficient proactive key distribution scheme for fast handoff in IEEE 802.11 wireless networks
J Hur, C Park, Y Shin, H Yoon
International Conference on Information Networking, 629-638, 2007
82007
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience
D Koo, Y Shin, J Yun, J Hur
Applied Sciences 8 (12), 2532, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20