Search

Your search keyword '"Junbeom Hur"' showing total 93 results

Search Constraints

Start Over You searched for: Author "Junbeom Hur" Remove constraint Author: "Junbeom Hur" Topic computer science Remove constraint Topic: computer science
93 results on '"Junbeom Hur"'

Search Results

1. VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning

2. Enabling Fast Public Auditing and Data Dynamics in Cloud Services

3. Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage

5. Quantum Mutual Authentication Key Agreement Scheme Using Five-Qubit Entanglement towards Different Realm Architecture

6. (In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags

7. A reliable adaptive forwarding approach in named data networking

8. Neural Network Stealing via Meltdown

9. Return of version downgrade attack in the era of TLS 1.3

10. A Comparative Analysis of Searchable Encryption Schemes using SGX

11. Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT

12. Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization

13. On the Security of Practical Mail User Agents against Cache Side-Channel Attacks

14. Cache Side-Channel Attack on Mail User Agent

15. Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea

16. Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments

17. Secure deduplication with reliable and revocable key management in fog computing

18. Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

19. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

21. Security and Privacy Issues of Fog Computing

22. A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems

23. CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware

24. Special issue on V2X communications and networks

25. Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings

26. Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience

27. SPEKS: Forward Private SGX-Based Public Key Encryption with Keyword Search

29. A Study on Introducing Security Certification for Control Systems

30. A reliable group key management scheme for broadcast encryption

31. Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks

32. Reputation-Based Collusion Detection with Majority of Colluders

33. Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage

34. Password typographical error resilience in honey encryption

35. Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage

36. Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services

37. A Practical De-mixing Algorithm for Bitcoin Mixing Services

38. Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems

39. Secure proof of storage with deduplication for cloud storage systems

40. Data Block based User Authentication for Outsourced Data

41. Enhanced authentication for outsourced educational contents through provable block possession

42. Secure deduplication for multimedia data with user revocation in cloud storage

43. Medical-Grade Quality of Service for Real-Time Mobile Healthcare

44. Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images

45. Trapfetch: A breakpoint-based prefetcher for both launch and run-time

46. Cloud-based biometrics processing for privacy-preserving identification

47. An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability

48. Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage

49. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

50. Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage

Catalog

Books, media, physical & digital resources