Follow
Dongyoung Koo
Dongyoung Koo
Hansung University
Verified email at nslab.kaist.ac.kr
Title
Cited by
Cited by
Year
Secure data deduplication with dynamic ownership management in cloud storage
J Hur, D Koo, Y Shin, K Kang
IEEE Transactions on knowledge and data engineering 28 (11), 3113-3125, 2016
1882016
A survey of secure data deduplication schemes for cloud storage systems
Y Shin, D Koo, J Hur
ACM computing surveys (CSUR) 49 (4), 1-38, 2017
1482017
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
D Koo, J Hur, H Yoon
Computers & Electrical Engineering 39 (1), 34-46, 2013
1262013
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
D Koo, J Hur
Future Generation Computer Systems 78, 739-752, 2018
1112018
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
792016
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
712018
Decentralized server-aided encryption for secure deduplication in cloud storage
Y Shin, D Koo, J Yun, J Hur
IEEE Transactions on Services Computing 13 (6), 1021-1033, 2017
662017
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience
D Koo, Y Shin, J Yun, J Hur
Applied Sciences 8 (12), 2532, 2018
572018
Removing escrow from ciphertext policy attribute-based encryption
J Hur, D Koo, SO Hwang, K Kang
Computers & Mathematics with Applications 65 (9), 1310-1317, 2013
342013
A hybrid deduplication for secure and efficient data outsourcing in fog computing
D Koo, Y Shin, J Yun, J Hur
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
332016
An online data-oriented authentication based on Merkle tree with improved reliability
D Koo, Y Shin, J Yun, J Hur
2017 IEEE international conference on web services (ICWS), 840-843, 2017
302017
Privacy-preserving smart metering with authentication in a smart grid
JB Hur, DY Koo, YJ Shin
Applied Sciences 5 (4), 1503-1527, 2015
282015
Scalable and reliable key management for secure deduplication in cloud storage
H Kwon, C Hahn, D Koo, J Hur
2017 IEEE 10th international conference on cloud computing (CLOUD), 391-398, 2017
242017
CLDSafe: an efficient file backup system in cloud storage against ransomware
J Yun, J Hur, Y Shin, D Koo
IEICE TRANSACTIONS on Information and Systems 100 (9), 2228-2231, 2017
232017
A secure and efficient audit mechanism for dynamic shared data in cloud storage
O Kwon, D Koo, Y Shin, H Yoon
The Scientific World Journal 2014 (1), 820391, 2014
202014
Secure proof of storage with deduplication for cloud storage systems
Y Shin, D Koo, J Hur, J Yun
Multimedia Tools and Applications 76, 19363-19378, 2017
182017
Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system
D Koo, Y Shin, J Hur
Applied Sciences 7 (10), 1007, 2017
182017
A novel adaptive cluster transformation (ACT)-based intrusion tolerant architecture for hybrid information technology
J Lim, Y Kim, D Koo, S Lee, S Doo, H Yoon
The Journal of Supercomputing 66, 918-935, 2013
132013
Secure and efficient hybrid data deduplication in edge computing
H Shin, D Koo, J Hur
ACM Transactions on Internet Technology (TOIT) 22 (3), 1-25, 2022
102022
Inferring firewall rules by cache side-channel analysis in network function virtualization
Y Shin, D Koo, J Hur
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1798-1807, 2020
102020
The system can't perform the operation now. Try again later.
Articles 1–20