Search

Your search keyword '"Junbeom Hur"' showing total 278 results

Search Constraints

Start Over You searched for: Author "Junbeom Hur" Remove constraint Author: "Junbeom Hur"
278 results on '"Junbeom Hur"'

Search Results

151. Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments

152. Secure deduplication with reliable and revocable key management in fog computing

153. Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage

154. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

156. Security and Privacy Issues of Fog Computing

157. A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems

158. Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings

161. Efficient and privacy-preserving biometric identification in cloud

163. A Study on Introducing Security Certification for Control Systems

164. A reliable group key management scheme for broadcast encryption

165. Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks

166. Reputation-Based Collusion Detection with Majority of Colluders

167. Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage

168. Password typographical error resilience in honey encryption

169. Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage

170. Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services

171. Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems

172. Secure proof of storage with deduplication for cloud storage systems

173. Data Block based User Authentication for Outsourced Data

174. Enhanced authentication for outsourced educational contents through provable block possession

175. Secure deduplication for multimedia data with user revocation in cloud storage

176. Medical-Grade Quality of Service for Real-Time Mobile Healthcare

177. Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images

178. Trapfetch: A breakpoint-based prefetcher for both launch and run-time

179. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection

180. Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage

181. Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage

182. Password typos resilience in honey encryption

183. A Practical Analysis of TLS Vulnerabilities in Korea Web Environment

184. Security Enhanced Authentication Protocol in LTE With Preserving User Location Privacy

185. An Enhanced Remote Data Checking Scheme for Dynamic Updates

186. SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage

187. A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing

188. Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage

189. Removing escrow from ciphertext policy attribute-based encryption

190. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage

191. Recommendations for antiarrhythmic drugs based on latent semantic analysis with fc-means clustering

192. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

193. Cross-layer analysis of protocol delay in mobile devices receiving BCMCS

194. Authenticated public key broadcast encryption scheme secure against insiders’ attack

195. Privacy-Preserving Smart Metering with Authentication in a Smart Grid

196. Scalable and efficient approach for secure group communication using proxy cryptography

197. Fine-grained user access control in ciphertext-policy attribute-based encryption

198. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

199. Chosen ciphertext secure authenticated group communication using identity-based signcryption

200. Self-healing key distribution scheme with long service time

Catalog

Books, media, physical & digital resources