Security and privacy issues of fog computing HJ Nam, HY Choi, HJ Shin, HS Kwon, JM Jeong, CH Hahn, JB Hur The Journal of Korean Institute of Communications and Information Sciences …, 2017 | 12 | 2017 |
Secure and efficient hybrid data deduplication in edge computing H Shin, D Koo, J Hur ACM Transactions on Internet Technology (TOIT) 22 (3), 1-25, 2022 | 10 | 2022 |
Privacy-preserving and updatable block-level data deduplication in cloud storage services H Shin, D Koo, Y Shin, J Hur 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 392-400, 2018 | 9 | 2018 |
Efficient multi-user similarity search over encrypted data in cloud storage C Hahn, HJ Shin, H Kwon, J Hur Wireless Personal Communications 107, 1337-1353, 2019 | 6 | 2019 |
Cloud-based biometrics processing for privacy-preserving identification C Hahn, H Shin, J Hur 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN …, 2017 | 5 | 2017 |
A Study on Introducing Security Certification for Control Systems H Choi, D Kim, H Shin, C Hahn, J Hur Journal of the Korea Institute of Information Security & Cryptology 26 (3 …, 2016 | 3 | 2016 |
A practical analysis of TLS vulnerabilities in korea Web environment J Jeong, H Kwon, H Shin, J Hur Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 2 | 2017 |