Youngjoo Shin
Youngjoo Shin
School of Cybersecurity, Korea University
Verified email at - Homepage
Cited by
Cited by
Secure data deduplication with dynamic ownership management in cloud storage
J Hur, D Koo, Y Shin, K Kang
IEEE Transactions on knowledge and data engineering 28 (11), 3113-3125, 2016
A survey of secure data deduplication schemes for cloud storage systems
Y Shin, D Koo, J Hur
ACM computing surveys (CSUR) 49 (4), 1-38, 2017
Unveiling hardware-based data prefetcher, a hidden source of information leakage
Y Shin, HC Kim, D Kwon, JH Jeong, J Hur
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Decentralized server-aided encryption for secure deduplication in cloud storage
Y Shin, D Koo, J Yun, J Hur
IEEE Transactions on Services Computing, 2020
Real-time detection for cache side channel attack using performance counter monitor
J Cho, T Kim, S Kim, M Im, T Kim, Y Shin
Applied Sciences 10 (3), 984, 2020
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience
D Koo, Y Shin, J Yun, J Hur
Applied Sciences 8 (12), 2532, 2018
Differentially private client‐side data deduplication protocol for cloud storage services
Y Shin, K Kim
Security and Communication Networks 8 (12), 2114-2123, 2015
A hybrid deduplication for secure and efficient data outsourcing in fog computing
D Koo, Y Shin, J Yun, J Hur
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
Fuzzing of embedded systems: A survey
J Yun, F Rustamov, J Kim, Y Shin
ACM Computing Surveys 55 (7), 1-33, 2022
An online data-oriented authentication based on Merkle tree with improved reliability
D Koo, Y Shin, J Yun, J Hur
2017 IEEE international conference on web services (ICWS), 840-843, 2017
Privacy-preserving smart metering with authentication in a smart grid
JB Hur, DY Koo, YJ Shin
Applied Sciences 5 (4), 1503-1527, 2015
Security weakness in the proof of storage with deduplication
Y Shin, J Hur, K Kim
Cryptology ePrint Archive, 2012
Decentralized group key management for dynamic networks using proxy cryptography
J Hur, Y Shin, H Yoon
Proceedings of the 3rd ACM workshop on QoS and security for wireless and …, 2007
CLDSafe: an efficient file backup system in cloud storage against ransomware
J Yun, J Hur, Y Shin, D Koo
IEICE TRANSACTIONS on Information and Systems 100 (9), 2228-2231, 2017
Avengers, Assemble! survey of WebAssembly security solutions
M Kim, H Jang, Y Shin
2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 543-553, 2022
Return of version downgrade attack in the era of TLS 1.3
S Lee, Y Shin, J Hur
Proceedings of the 16th International Conference on Emerging Networking …, 2020
Secure proof of storage with deduplication for cloud storage systems
Y Shin, D Koo, J Hur, J Yun
Multimedia Tools and Applications 76, 19363-19378, 2017
Pre-authentication for fast handoff in wireless mesh networks with mobile APs
C Park, J Hur, C Kim, Y Shin, H Yoon
Information Security Applications: 7th International Workshop, WISA 2006 …, 2007
Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system
D Koo, Y Shin, J Hur
Applied Sciences 7 (10), 1007, 2017
ThermalBleed: A practical thermal side-channel attack
T Kim, Y Shin
IEEE Access 10, 25718-25731, 2022
The system can't perform the operation now. Try again later.
Articles 1–20