Sang-Uk Shin
Orcid: 0000-0002-7048-582XAffiliations:
- Pukyong National University, Department of Information Security, Busan, South Korea
 
  According to our database1,
  Sang-Uk Shin
  authored at least 46 papers
  between 1998 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
 
On csauthors.net:
Bibliography
  2025
Personal data sharing model with legal validity in blockchain-based secure environment.
    
  
    Proceedings of the 27th International Conference on Advanced Communications Technology, 2025
    
  
  2024
    J. Internet Serv. Inf. Secur., 2024
    
  
  2022
    J. Internet Serv. Inf. Secur., 2022
    
  
  2021
PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments.
    
  
    IEICE Trans. Inf. Syst., 2021
    
  
Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data.
    
  
    IEICE Trans. Inf. Syst., 2021
    
  
  2020
    Secur. Commun. Networks, 2020
    
  
  2019
    Wirel. Commun. Mob. Comput., 2019
    
  
    J. Supercomput., 2019
    
  
  2018
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage.
    
  
    IEEE Access, 2018
    
  
    Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
    
  
    Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
    
  
  2016
    Multim. Tools Appl., 2016
    
  
  2015
Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services.
    
  
    Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
    
  
  2014
Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment.
    
  
    Multim. Tools Appl., 2014
    
  
    J. Internet Serv. Inf. Secur., 2014
    
  
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data.
    
  
    Comput. Sci. Inf. Syst., 2014
    
  
  2013
    J. Univers. Comput. Sci., 2013
    
  
    J. Internet Serv. Inf. Secur., 2013
    
  
    Comput. Sci. Inf. Syst., 2013
    
  
    Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
    
  
  2012
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing.
    
  
    J. Internet Serv. Inf. Secur., 2012
    
  
  2011
    J. Inf. Sci. Eng., 2011
    
  
Efficient e-Discovery Process Utilizing Combination Method of Machine Learning Algorithms.
    
  
    Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
    
  
  2010
    Sci. China Inf. Sci., 2010
    
  
  2009
An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding.
    
  
    IEICE Trans. Inf. Syst., 2009
    
  
  2008
    Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
    
  
    Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
    
  
  2007
    Proceedings of the Advances in Multimedia Modeling, 2007
    
  
    Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007
    
  
    Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
    
  
    Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
    
  
  2006
    Proceedings of the Intelligence and Security Informatics, International Workshop, 2006
    
  
  2005
    Proceedings of the Information Security Applications, 6th International Workshop, 2005
    
  
    Proceedings of the Advances in Natural Computation, First International Conference, 2005
    
  
    Proceedings of the Computational Intelligence and Security, International Conference, 2005
    
  
  2004
    Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004
    
  
  2001
    J. Inf. Sci. Eng., 2001
    
  
    Proceedings of the Advances in Cryptology, 2001
    
  
  2000
    Proceedings of the Public Key Cryptography, 2000
    
  
  1999
    Proceedings of the Public Key Cryptography, 1999
    
  
    Proceedings of the Information Security, Second International Workshop, 1999
    
  
  1998
    Proceedings of the Public Key Cryptography, 1998
    
  
A secure hash function based on cellular automata.
  
    Proceedings of the 1st International Conference on Information Security and Cryptology, 1998