Changhee Hahn

According to our database1, Changhee Hahn authored at least 12 papers between 2014 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks.
Multimedia Tools Appl., 2017

Secure deduplication for multimedia data with user revocation in cloud storage.
Multimedia Tools Appl., 2017

Cloud-based biometrics processing for privacy-preserving identification.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Privacy-preserving public auditing for educational multimedia data in cloud computing.
Multimedia Tools Appl., 2016

Enhanced authentication for outsourced educational contents through provable block possession.
Multimedia Tools Appl., 2016

Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks.
Mobile Information Systems, 2016

POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Scalable and secure Private Set intersection for big data.
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016

2014
Secure Device-to-Device Authentication in Mobile Multi-hop Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014


  Loading...