Junbeom Hur

According to our database1, Junbeom Hur
  • authored at least 66 papers between 2005 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing.
Future Generation Comp. Syst., 2018

2017
Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.
Sensors, 2017

Secure proof of storage with deduplication for cloud storage systems.
Multimedia Tools Appl., 2017

Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks.
Multimedia Tools Appl., 2017

Secure deduplication for multimedia data with user revocation in cloud storage.
Multimedia Tools Appl., 2017

Special issue on V2X communications and networks.
Journal of Communications and Networks, 2017

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware.
IEICE Transactions, 2017

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems.
ACM Comput. Surv., 2017

Trapfetch: A breakpoint-based prefetcher for both launch and run-time.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Cloud-based biometrics processing for privacy-preserving identification.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Password typos resilience in honey encryption.
Proceedings of the 2017 International Conference on Information Networking, 2017

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
IEEE Trans. Knowl. Data Eng., 2016

Privacy-preserving public auditing for educational multimedia data in cloud computing.
Multimedia Tools Appl., 2016

Enhanced authentication for outsourced educational contents through provable block possession.
Multimedia Tools Appl., 2016

Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks.
Mobile Information Systems, 2016

A reliable group key management scheme for broadcast encryption.
Journal of Communications and Networks, 2016

Reputation-Based Collusion Detection with Majority of Colluders.
IEICE Transactions, 2016

A Practical Analysis of TLS Vulnerabilities in Korea Web Environment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Recommendations for antiarrhythmic drugs based on latent semantic analysis with fc-means clustering.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Scalable and secure Private Set intersection for big data.
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016

2015
Medical-Grade Quality of Service for Real-Time Mobile Healthcare.
IEEE Computer, 2015

2014
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks.
IEEE/ACM Trans. Netw., 2014

An Enhanced Remote Data Checking Scheme for Dynamic Updates.
TIIS, 2014

Efficient and Secure Identity-Based Onion Routing.
Journal of Research and Practice in Information Technology, 2014

Secure Device-to-Device Authentication in Mobile Multi-hop Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
Cross-layer analysis of protocol delay in mobile devices receiving BCMCS.
Wireless Networks, 2013

Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid.
IEEE Trans. Parallel Distrib. Syst., 2013

Improving Security and Efficiency in Attribute-Based Data Sharing.
IEEE Trans. Knowl. Data Eng., 2013

Design and QoS of a Wireless System for Real-Time Remote Electrocardiography.
IEEE J. Biomedical and Health Informatics, 2013

Energy-aware topology control for reliable data delivery in solar-powered WSNs.
EURASIP J. Wireless Comm. and Networking, 2013

Removing escrow from ciphertext policy attribute-based encryption.
Computers & Mathematics with Applications, 2013

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
Computers & Electrical Engineering, 2013

2012
Scalable and efficient approach for secure group communication using proxy cryptography.
Wireless Networks, 2012

Toward energy-efficient error control in 3G broadcast video.
IEEE Wireless Commun., 2012

Fine-grained user access control in ciphertext-policy attribute-based encryption.
Security and Communication Networks, 2012

Authenticated public key broadcast encryption scheme secure against insiders' attack.
Mathematical and Computer Modelling, 2012

Using a dynamic backbone for efficient data delivery in solar-powered WSNs.
J. Network and Computer Applications, 2012

Privacy-preserving identity-based broadcast encryption.
Information Fusion, 2012

Security weakness in the Proof of Storage with Deduplication.
IACR Cryptology ePrint Archive, 2012

Dependable and secure computing in medical information systems.
Computer Communications, 2012

Extending Service Coverage Using FGS-Aware Blind Repetition.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

2011
Fine-grained data access control for distributed sensor networks.
Wireless Networks, 2011

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems.
IEEE Trans. Parallel Distrib. Syst., 2011

2010
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks.
MONET, 2010

Self-healing key distribution scheme with long service time.
IEICE Electronic Express, 2010

Chosen ciphertext secure authenticated group communication using identity-based signcryption.
Computers & Mathematics with Applications, 2010

2009
Improved batch exponentiation.
Inf. Process. Lett., 2009

A Decentralized Multi-Group Key Management Scheme.
IEICE Transactions, 2009

Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
Proceedings of the Communication and Networking, 2009

2008
Security Considerations for Handover Schemes in Mobile WiMAX Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Transactions, 2007

Decentralized group key management for dynamic networks using proxy cryptography.
Proceedings of the Q2SWinet'07, 2007

An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.
Proceedings of the Advances in Information and Computer Security, 2007

An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2005
Trust Management for Resilient Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology, 2005


  Loading...