Myungsun Kim
Myungsun Kim
The University of Suwon
Verified email at - Homepage
Cited by
Cited by
Search-and-compute on encrypted data
JH Cheon, M Kim, M Kim
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
A secure smart-metering protocol over power-line communication
S Kim, EY Kwon, M Kim, JH Cheon, S Ju, Y Lim, M Choi
IEEE Transactions on Power Delivery 26 (4), 2370-2379, 2011
Optimized search-and-compute circuits and their application to query evaluation on encrypted data
JH Cheon, M Kim, M Kim
IEEE Transactions on Information Forensics and Security 11 (1), 188-199, 2015
Key management method using hierarchical node topology, and method of registering and deregistering user using the same
S Han, B Kim, M Kim, Y Yoon, S Lee, JH Lee
US Patent 8,983,071, 2015
Mutual authentication method between devices using mediation module and system therefor
H Ju, M Kim, JY Moon
US Patent App. 11/865,821, 2008
Home network system and method therefor
YJ Jang, M Kim, S Nam, JH Lee
US Patent 7,979,913, 2011
Multi-media device having function of backing up broadcasting contents in home network environment and method of backing up the broadcasting contents
B Kim, M Kim, S Nam, S Choi
US Patent App. 11/234,416, 2006
Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP)
S Han, M Kim, J Cho, Y Choi
US Patent 7,424,613, 2008
A new identification scheme based on the bilinear Diffie-Hellman problem
M Kim, K Kim
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations
JH Cheon, HW Chung, M Kim, KW Lee
Cryptology ePrint Archive, 2016
Method and apparatus for checking proximity between devices using hash chain
JH Lee, M Kim, S Han, Y Yoon, S Lee, B Kim
US Patent 8,122,487, 2012
On the efficiency of FHE-based private queries
M Kim, HT Lee, S Ling, H Wang
IEEE Transactions on Dependable and Secure Computing 15 (2), 357-363, 2016
Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger
H Chung, K Han, C Ju, M Kim, JH Seo
Ieee Access 10, 42081-42096, 2022
Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs
A Mohaien, DF Kune, EY Vasserman, M Kim, Y Kim
IEEE Transactions on Dependable and Secure Computing 10 (6), 380-393, 2013
Private compound wildcard queries using fully homomorphic encryption
M Kim, HT Lee, S Ling, BHM Tan, H Wang
IEEE Transactions on Dependable and Secure Computing 16 (5), 743-756, 2017
Mutual private set intersection with linear complexity
M Kim, HT Lee, JH Cheon
Information Security Applications: 12th International Workshop, WISA 2011 …, 2012
Method of controlling content access and method of obtaining content key using the same
S Han, M Kim, Y Yoon, S Lee, B Kim, JH Lee
US Patent 8,341,402, 2012
Method and apparatus for providing digital rights management content and license, and method and apparatus for using digital rights management content
M Kim, JY Moon, J Seo, M Park
US Patent App. 11/715,987, 2008
Method for transmitting content in home network using user-binding
M Kim, S Han, Y You, Y Yoon, B Kim, JH Lee
US Patent 8,234,493, 2012
Method of creating domain based on public key cryptography
Y You, M Kim, Y Choi, YJ Jang
US Patent 7,996,322, 2011
The system can't perform the operation now. Try again later.
Articles 1–20