Secure data deduplication with dynamic ownership management in cloud storage J Hur, D Koo, Y Shin, K Kang IEEE Transactions on Knowledge and Data Engineering 28 (11), 3113-3125, 2016 | 169 | 2016 |
A survey of secure data deduplication schemes for cloud storage systems Y Shin, D Koo, J Hur ACM computing surveys (CSUR) 49 (4), 1-38, 2017 | 121 | 2017 |
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage D Koo, J Hur, H Yoon Computers & Electrical Engineering 39 (1), 34-46, 2013 | 116 | 2013 |
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing D Koo, J Hur Future Generation Computer Systems 78, 739-752, 2018 | 99 | 2018 |
Efficient privacy-preserving matrix factorization via fully homomorphic encryption S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 68 | 2016 |
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018 | 48 | 2018 |
Decentralized server-aided encryption for secure deduplication in cloud storage Y Shin, D Koo, J Yun, J Hur IEEE Transactions on Services Computing 13 (6), 1021-1033, 2017 | 48 | 2017 |
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience D Koo, Y Shin, J Yun, J Hur Applied Sciences 8 (12), 2532, 2018 | 37 | 2018 |
Removing escrow from ciphertext policy attribute-based encryption J Hur, D Koo, SO Hwang, K Kang Computers & Mathematics with Applications 65 (9), 1310-1317, 2013 | 32 | 2013 |
A hybrid deduplication for secure and efficient data outsourcing in fog computing D Koo, Y Shin, J Yun, J Hur 2016 IEEE International Conference on Cloud Computing Technology and Science …, 2016 | 29 | 2016 |
Privacy-preserving smart metering with authentication in a smart grid JB Hur, DY Koo, YJ Shin Applied Sciences 5 (4), 1503-1527, 2015 | 24 | 2015 |
An online data-oriented authentication based on Merkle tree with improved reliability D Koo, Y Shin, J Yun, J Hur 2017 IEEE international conference on web services (ICWS), 840-843, 2017 | 23 | 2017 |
CLDSafe: an efficient file backup system in cloud storage against ransomware J Yun, J Hur, Y Shin, D Koo IEICE TRANSACTIONS on Information and Systems 100 (9), 2228-2231, 2017 | 19 | 2017 |
Scalable and reliable key management for secure deduplication in cloud storage H Kwon, C Hahn, D Koo, J Hur 2017 IEEE 10th international conference on cloud computing (CLOUD), 391-398, 2017 | 19 | 2017 |
Secure proof of storage with deduplication for cloud storage systems Y Shin, D Koo, J Hur, J Yun Multimedia Tools and Applications 76, 19363-19378, 2017 | 17 | 2017 |
Privacy-preserving aggregation and authentication of multi-source smart meters in a smart grid system D Koo, Y Shin, J Hur Applied Sciences 7 (10), 1007, 2017 | 16 | 2017 |
A secure and efficient audit mechanism for dynamic shared data in cloud storage O Kwon, D Koo, Y Shin, H Yoon The Scientific World Journal 2014, 2014 | 16 | 2014 |
A novel adaptive cluster transformation (ACT)-based intrusion tolerant architecture for hybrid information technology J Lim, Y Kim, D Koo, S Lee, S Doo, H Yoon The Journal of Supercomputing 66, 918-935, 2013 | 12 | 2013 |
Privacy-preserving and updatable block-level data deduplication in cloud storage services H Shin, D Koo, Y Shin, J Hur 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 392-400, 2018 | 8 | 2018 |
Lightweight and seamless memory randomization for mission-critical services in a cloud platform J Yun, KW Park, D Koo, Y Shin Energies 13 (6), 1332, 2020 | 7 | 2020 |