Khin Mi Mi Aung

According to our database1, Khin Mi Mi Aung authored at least 57 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem.
Theor. Comput. Sci., 2019

Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields.
IACR Cryptology ePrint Archive, 2019

Achieving GWAS with Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2019

2018
High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Blockchain-based decentralized content trust for docker images.
Multimedia Tools Appl., 2018

Dynamic scheduling strategy with efficient node availability prediction for handling divisible loads in multi-cloud systems.
J. Parallel Distrib. Comput., 2018

Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs.
J. Parallel Distrib. Comput., 2018

Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme.
IACR Cryptology ePrint Archive, 2018

The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs.
IACR Cryptology ePrint Archive, 2018

2017
Decentralized Content Trust for Docker Images.
Proceedings of the 2nd International Conference on Internet of Things, 2017

2016
Building a large-scale object-based active storage platform for data analytics in the internet of things.
The Journal of Supercomputing, 2016

Leakage aware resource management approach with machine learning optimization framework for partially reconfigurable architectures.
Microprocessors and Microsystems - Embedded Hardware Design, 2016

Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing.
JCP, 2016

Secured Large Scale Shared Storage System.
JCM, 2016

Secure searching on cloud storage enhanced by homomorphic indexing.
Future Generation Comp. Syst., 2016

Machine Learning Approach to Generate Pareto Front for List-scheduling Algorithms.
Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems, 2016

Automatic framework to generate reconfigurable accelerators for option pricing applications.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2016

A study of secure DBaaS with encrypted data transactions.
Proceedings of the 2nd International Conference on Communication and Information Processing, 2016

Software-defined load balancer in cloud data centers.
Proceedings of the 2nd International Conference on Communication and Information Processing, 2016

Privacy-Preserved Multi-Party Data Merging with Secure Equality Evaluation.
Proceedings of the International Conference on Cloud Computing Research and Innovations, 2016

Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
SELDAC: Software-Defined Storage based Efficient Load Distribution and Auto Scaling in Cloud Data Centers.
JCM, 2015

HEDup: Secure Deduplication with Homomorphic Encryption.
Proceedings of the 10th IEEE International Conference on Networking, 2015

Building a Robust and Efficient Middleware for Geo-replicated Storage Systems.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

SDN Controlled Local Re-routing to Reduce Congestion in Cloud Data Center.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

Flexible Yet Secure De-duplication Service for Enterprise Data on Cloud Storage.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

Exploiting loop-array dependencies to accelerate the design space exploration with high level synthesis.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
A layer 2 multipath solution and its performance evaluation for Data Center Ethernets.
Int. J. Communication Systems, 2014

Virtual machine placement with two-path traffic routing for reduced congestion in data center networks.
Computer Communications, 2014

Scheduling Multiple Divisible Loads in a Multi-cloud System.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Design Space Exploration to Accelerate Nelder-Mead Algorithm Using FPGA.
Proceedings of the 22nd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2014

Homomorphic Exclusive-Or Operation Enhance Secure Searching on Cloud Storage.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

An efficient scheme to ensure data availability for a cloud service provider.
Proceedings of the 2014 IEEE International Conference on Big Data, 2014

ESPRESSO: An Encryption as a Service for Cloud Storage Systems.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Power-Efficient Virtual Machine Placement and Migration in Data Centers.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

sAES: A high throughput and low latency secure cloud storage with pipelined DMA based PCIe interface.
Proceedings of the 2013 International Conference on Field-Programmable Technology, 2013

Incorporating Energy and Throughput Awareness in Design Space Exploration and Run-Time Mapping for Heterogeneous MPSoCs.
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013

An efficient flow cache algorithm with improved fairness in Software-Defined Data Center Networks.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013

2012
OpenFlow based control for re-routing with differentiated flows in Data Center Networks.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Prompt congestion reaction scheme for data center network using multiple congestion points.
Proceedings of IEEE International Conference on Communications, 2012

Energy optimizations for data center network: Formulation and its solution.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Differentiated Congestion Management of Data Traffic for Data Center Ethernet.
IEEE Trans. Network and Service Management, 2011

2010
Dynamic Load Balancing Multipathing in Data Center Ethernet.
Proceedings of the MASCOTS 2010, 2010

Differentiated Ethernet Congestion Management for Prioritized Traffic.
Proceedings of IEEE International Conference on Communications, 2010

A Privacy Enhanced Data Aggregation Model.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Secured Key Distribution Scheme for Cryptographic Key Management System.
Proceedings of the ARES 2010, 2010

2006
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration.
I. J. Network Security, 2006

Survival of the Internet Applications: A Cluster Recovery Model.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
A Model of ITS Using Cold Standby Cluster.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

A Survivability Model for Cluster System.
Proceedings of the Distributed and Parallel Computing, 2005

A Survivability Model for Cluster System Under DoS Attacks.
Proceedings of the High Performance Computing and Communications, 2005

A rejuvenation methodology of cluster recovery.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Software Rejuvenation Approach to Security Engineering.
Proceedings of the Computational Science and Its Applications, 2004

The optimum time to perform software rejuvenation for survivability.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Transient Time Analysis of Network Security Survivability Using DEVS.
Proceedings of the Artificial Intelligence and Simulation, 2004

A Framework of Software Rejuvenation for Survivability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...