Seung Geol Choi
Orcid: 0000-0001-9563-9648
According to our database1,
Seung Geol Choi
authored at least 45 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Leveraging semantic context to establish access controls for secure cloud-based electronic health records.
Int. J. Inf. Manag. Data Insights, 2024
IACR Commun. Cryptol., 2024
2023
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
2021
Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation.
Proceedings of the IEEE International Conference on Digital Health, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 3rd IEEE International Conference on Edge Computing, 2019
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption.
IACR Cryptol. ePrint Arch., 2016
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
2014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Inf. Process. Lett., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2009
Inf. Process. Lett., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Advances in Information and Computer Security, 2006