Secure data deduplication with dynamic ownership management in cloud storage J Hur, D Koo, Y Shin, K Kang IEEE Transactions on knowledge and data engineering 28 (11), 3113-3125, 2016 | 188 | 2016 |
A survey of secure data deduplication schemes for cloud storage systems Y Shin, D Koo, J Hur ACM computing surveys (CSUR) 49 (4), 1-38, 2017 | 148 | 2017 |
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage D Koo, J Hur, H Yoon Computers & Electrical Engineering 39 (1), 34-46, 2013 | 126 | 2013 |
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing D Koo, J Hur Future Generation Computer Systems 78, 739-752, 2018 | 111 | 2018 |
Efficient privacy-preserving matrix factorization via fully homomorphic encryption S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 79 | 2016 |
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018 | 71 | 2018 |
Decentralized server-aided encryption for secure deduplication in cloud storage Y Shin, D Koo, J Yun, J Hur IEEE Transactions on Services Computing 13 (6), 1021-1033, 2017 | 66 | 2017 |
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience D Koo, Y Shin, J Yun, J Hur Applied Sciences 8 (12), 2532, 2018 | 57 | 2018 |
Removing escrow from ciphertext policy attribute-based encryption J Hur, D Koo, SO Hwang, K Kang Computers & Mathematics with Applications 65 (9), 1310-1317, 2013 | 34 | 2013 |
A hybrid deduplication for secure and efficient data outsourcing in fog computing D Koo, Y Shin, J Yun, J Hur 2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016 | 33 | 2016 |
An online data-oriented authentication based on Merkle tree with improved reliability D Koo, Y Shin, J Yun, J Hur 2017 IEEE international conference on web services (ICWS), 840-843, 2017 | 30 | 2017 |
Privacy-preserving smart metering with authentication in a smart grid JB Hur, DY Koo, YJ Shin Applied Sciences 5 (4), 1503-1527, 2015 | 28 | 2015 |
Scalable and reliable key management for secure deduplication in cloud storage H Kwon, C Hahn, D Koo, J Hur 2017 IEEE 10th international conference on cloud computing (CLOUD), 391-398, 2017 | 24 | 2017 |
CLDSafe: an efficient file backup system in cloud storage against ransomware J Yun, J Hur, Y Shin, D Koo IEICE TRANSACTIONS on Information and Systems 100 (9), 2228-2231, 2017 | 23 | 2017 |
A secure and efficient audit mechanism for dynamic shared data in cloud storage O Kwon, D Koo, Y Shin, H Yoon The Scientific World Journal 2014 (1), 820391, 2014 | 20 | 2014 |
Secure proof of storage with deduplication for cloud storage systems Y Shin, D Koo, J Hur, J Yun Multimedia Tools and Applications 76, 19363-19378, 2017 | 18 | 2017 |
Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system D Koo, Y Shin, J Hur Applied Sciences 7 (10), 1007, 2017 | 18 | 2017 |
A novel adaptive cluster transformation (ACT)-based intrusion tolerant architecture for hybrid information technology J Lim, Y Kim, D Koo, S Lee, S Doo, H Yoon The Journal of Supercomputing 66, 918-935, 2013 | 13 | 2013 |
Secure and efficient hybrid data deduplication in edge computing H Shin, D Koo, J Hur ACM Transactions on Internet Technology (TOIT) 22 (3), 1-25, 2022 | 10 | 2022 |
Inferring firewall rules by cache side-channel analysis in network function virtualization Y Shin, D Koo, J Hur IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1798-1807, 2020 | 10 | 2020 |