Follow
Youngjoo Shin
Youngjoo Shin
School of Cybersecurity, Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Secure data deduplication with dynamic ownership management in cloud storage
J Hur, D Koo, Y Shin, K Kang
IEEE Transactions on Knowledge and Data Engineering 28 (11), 3113-3125, 2016
1692016
A survey of secure data deduplication schemes for cloud storage systems
Y Shin, D Koo, J Hur
ACM computing surveys (CSUR) 49 (4), 1-38, 2017
1212017
Unveiling hardware-based data prefetcher, a hidden source of information leakage
Y Shin, HC Kim, D Kwon, JH Jeong, J Hur
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
562018
Decentralized server-aided encryption for secure deduplication in cloud storage
Y Shin, D Koo, J Yun, J Hur
IEEE Transactions on Services Computing, 2020
482020
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience
D Koo, Y Shin, J Yun, J Hur
Applied Sciences 8 (12), 2532, 2018
372018
Differentially private client‐side data deduplication protocol for cloud storage services
Y Shin, K Kim
Security and Communication Networks 8 (12), 2114-2123, 2015
342015
Real-time detection for cache side channel attack using performance counter monitor
J Cho, T Kim, S Kim, M Im, T Kim, Y Shin
Applied Sciences 10 (3), 984, 2020
332020
A hybrid deduplication for secure and efficient data outsourcing in fog computing
D Koo, Y Shin, J Yun, J Hur
2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016
292016
Security weakness in the proof of storage with deduplication
Y Shin, J Hur, K Kim
Cryptology ePrint Archive, 2012
262012
Decentralized group key management for dynamic networks using proxy cryptography
J Hur, Y Shin, H Yoon
Proceedings of the 3rd ACM workshop on QoS and security for wireless and …, 2007
262007
Privacy-preserving smart metering with authentication in a smart grid
JB Hur, DY Koo, YJ Shin
Applied Sciences 5 (4), 1503-1527, 2015
242015
An online data-oriented authentication based on Merkle tree with improved reliability
D Koo, Y Shin, J Yun, J Hur
2017 IEEE international conference on web services (ICWS), 840-843, 2017
232017
CLDSafe: an efficient file backup system in cloud storage against ransomware
J Yun, J Hur, Y Shin, D Koo
IEICE TRANSACTIONS on Information and Systems 100 (9), 2228-2231, 2017
192017
Pre-authentication for fast handoff in wireless mesh networks with mobile APs
C Park, J Hur, C Kim, Y Shin, H Yoon
Information Security Applications: 7th International Workshop, WISA 2006 …, 2007
182007
Secure proof of storage with deduplication for cloud storage systems
Y Shin, D Koo, J Hur, J Yun
Multimedia Tools and Applications 76, 19363-19378, 2017
172017
Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system
D Koo, Y Shin, J Hur
Applied Sciences 7 (10), 1007, 2017
162017
Return of version downgrade attack in the era of TLS 1.3
S Lee, Y Shin, J Hur
Proceedings of the 16th International Conference on Emerging Networking …, 2020
152020
Equality predicate encryption for secure data deduplication
Y Shin, K Kim
Proc. Conference on Information Security and Cryptology (CISC-W), 64-70, 2012
132012
Reinforcing meltdown attack by using a return stack buffer
T Kim, Y Shin
IEEE Access 7, 186065-186077, 2019
122019
Efficient and Secure File Deduplication in Cloud Storage
Y Shin, K Kim
IEICE Transactions on Information and Systems 97 (No.2), 184-197, 2014
112014
The system can't perform the operation now. Try again later.
Articles 1–20