Dongyoung Koo

According to our database1, Dongyoung Koo authored at least 17 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing.
Future Generation Comp. Syst., 2018

Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Secure proof of storage with deduplication for cloud storage systems.
Multimedia Tools Appl., 2017

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware.
IEICE Transactions, 2017

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems.
ACM Comput. Surv., 2017

An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
IEEE Trans. Knowl. Data Eng., 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2016

SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2013
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology.
The Journal of Supercomputing, 2013

A Survey on Intrusion-Tolerant System.
JCSE, 2013

Removing escrow from ciphertext policy attribute-based encryption.
Computers & Mathematics with Applications, 2013

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
Computers & Electrical Engineering, 2013


  Loading...