Jun-Bum Shin

According to our database1, Jun-Bum Shin authored at least 13 papers between 1998 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2018

Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018

Instant Privacy-Preserving Biometric Authentication for Hamming Distance.
IACR Cryptology ePrint Archive, 2018

New Communication Technologies in Poster Design through the Religion Conflict in Global Social Issues.
Proceedings of the 22nd International Conference Information Visualisation, 2018

PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2016

Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

New Paradigm of Social Poster Embedding Unexpected Graphic Pattern for the Ongoing Issue, Radiation Contamination in Fukushima.
Proceedings of the 20th International Conference Information Visualisation, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

A Privacy Protection Method for Social Network Data against Content/Degree Attacks.
IEICE Transactions, 2012

Bauer-Berson-Feiertag attack revisited.
IACR Cryptology ePrint Archive, 2002

New DSA-Verifiable Signcryption Schemes.
Proceedings of the Information Security and Cryptology, 2002

A new appraoch to server-aided secret computation.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998