Young-joo Shin

According to our database1, Young-joo Shin authored at least 18 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Secure proof of storage with deduplication for cloud storage systems.
Multimedia Tools Appl., 2017

CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware.
IEICE Transactions, 2017

An efficient stream cipher for resistive RAM.
IEICE Electronic Express, 2017

A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems.
ACM Comput. Surv., 2017

An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Differentially private client-side data deduplication protocol for cloud storage services.
Security and Communication Networks, 2015

2014
Efficient and Secure File Deduplication in Cloud Storage.
IEICE Transactions, 2014

2012
Scalable and efficient approach for secure group communication using proxy cryptography.
Wireless Networks, 2012

Security weakness in the Proof of Storage with Deduplication.
IACR Cryptology ePrint Archive, 2012

2011
MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking.
IEICE Electronic Express, 2011

2007
Decentralized group key management for dynamic networks using proxy cryptography.
Proceedings of the Q2SWinet'07, 2007

An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.
Proceedings of the Information Security Applications, 7th International Workshop, 2006


  Loading...