Jun-Bum Shin

According to our database1, Jun-Bum Shin authored at least 12 papers between 1998 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2018

Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018

New Communication Technologies in Poster Design through the Religion Conflict in Global Social Issues.
Proceedings of the 22nd International Conference Information Visualisation, 2018

PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2016
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2016

Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

New Paradigm of Social Poster Embedding Unexpected Graphic Pattern for the Ongoing Issue, Radiation Contamination in Fukushima.
Proceedings of the 20th International Conference Information Visualisation, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2012
A Privacy Protection Method for Social Network Data against Content/Degree Attacks.
IEICE Transactions, 2012

2002
Bauer-Berson-Feiertag attack revisited.
IACR Cryptology ePrint Archive, 2002

New DSA-Verifiable Signcryption Schemes.
Proceedings of the Information Security and Cryptology, 2002

1998
A new appraoch to server-aided secret computation.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998


  Loading...