Dongyoung Koo

Orcid: 0000-0003-3283-5494

According to our database1, Dongyoung Koo authored at least 26 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption.
IEEE Access, 2023

2022
Secure and Efficient Hybrid Data Deduplication in Edge Computing.
ACM Trans. Internet Techn., 2022

Downgrading Backward Privacy of Searchable Encryption.
Proceedings of the International Conference on Information Networking, 2022

2020
Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage.
IEEE Trans. Serv. Comput., 2020

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments.
Secur. Commun. Networks, 2020

Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Visualization Techniques for Outlier Data.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

2018
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018

Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing.
Future Gener. Comput. Syst., 2018

Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Secure proof of storage with deduplication for cloud storage systems.
Multim. Tools Appl., 2017

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware.
IEICE Trans. Inf. Syst., 2017

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems.
ACM Comput. Surv., 2017

An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
IEEE Trans. Knowl. Data Eng., 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2014
An Efficient Audit Scheme for Cloud Storage.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology.
J. Supercomput., 2013

A Survey on Intrusion-Tolerant System.
J. Comput. Sci. Eng., 2013

Removing escrow from ciphertext policy attribute-based encryption.
Comput. Math. Appl., 2013

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
Comput. Electr. Eng., 2013


  Loading...