Search-and-compute on encrypted data JH Cheon, M Kim, M Kim Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015 | 84 | 2015 |
A secure smart-metering protocol over power-line communication S Kim, EY Kwon, M Kim, JH Cheon, S Ju, Y Lim, M Choi IEEE Transactions on Power Delivery 26 (4), 2370-2379, 2011 | 80 | 2011 |
Optimized search-and-compute circuits and their application to query evaluation on encrypted data JH Cheon, M Kim, M Kim IEEE Transactions on Information Forensics and Security 11 (1), 188-199, 2015 | 76 | 2015 |
Key management method using hierarchical node topology, and method of registering and deregistering user using the same S Han, B Kim, M Kim, Y Yoon, S Lee, JH Lee US Patent 8,983,071, 2015 | 69 | 2015 |
Mutual authentication method between devices using mediation module and system therefor H Ju, M Kim, JY Moon US Patent App. 11/865,821, 2008 | 62 | 2008 |
Home network system and method therefor YJ Jang, M Kim, S Nam, JH Lee US Patent 7,979,913, 2011 | 56 | 2011 |
Multi-media device having function of backing up broadcasting contents in home network environment and method of backing up the broadcasting contents B Kim, M Kim, S Nam, S Choi US Patent App. 11/234,416, 2006 | 55 | 2006 |
Bulletproofs+: shorter proofs for a privacy-enhanced distributed ledger H Chung, K Han, C Ju, M Kim, JH Seo Ieee Access 10, 42081-42096, 2022 | 53 | 2022 |
Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations JH Cheon, HW Chung, M Kim, KW Lee Cryptology ePrint Archive, 2016 | 53 | 2016 |
Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP) S Han, M Kim, J Cho, Y Choi US Patent 7,424,613, 2008 | 53 | 2008 |
On the efficiency of FHE-based private queries M Kim, HT Lee, S Ling, H Wang IEEE Transactions on Dependable and Secure Computing 15 (2), 357-363, 2016 | 50 | 2016 |
A new identification scheme based on the bilinear Diffie-Hellman problem M Kim, K Kim Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002 | 46 | 2002 |
Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs A Mohaien, DF Kune, EY Vasserman, M Kim, Y Kim IEEE Transactions on Dependable and Secure Computing 10 (6), 380-393, 2013 | 37 | 2013 |
Private compound wildcard queries using fully homomorphic encryption M Kim, HT Lee, S Ling, BHM Tan, H Wang IEEE Transactions on Dependable and Secure Computing 16 (5), 743-756, 2017 | 36 | 2017 |
Mutual private set intersection with linear complexity M Kim, HT Lee, JH Cheon Information Security Applications: 12th International Workshop, WISA 2011 …, 2012 | 32 | 2012 |
Method of controlling content access and method of obtaining content key using the same S Han, M Kim, Y Yoon, S Lee, B Kim, JH Lee US Patent 8,341,402, 2012 | 31 | 2012 |
Method of authenticating device using certificate, and digital content processing device for performing device authentication using the same Y You, M Kim, YJ Jang US Patent App. 10/927,239, 2005 | 27 | 2005 |
Method of creating domain based on public key cryptography Y You, M Kim, Y Choi, YJ Jang US Patent 7,996,322, 2011 | 26 | 2011 |
Method and apparatus for providing digital rights management content and license, and method and apparatus for using digital rights management content M Kim, JY Moon, J Seo, M Park US Patent App. 11/715,987, 2008 | 26 | 2008 |
Better security for queries on encrypted databases M Kim, HT Lee, S Ling, SQ Ren, BHM Tan, H Wang Cryptology ePrint Archive, 2016 | 25 | 2016 |