Conference
|
2023 |
Privacy-preserving Approximate Query Processing with Differentially Private Generative Models
옥지원 International Conference on Big Data (Big Data) 2023, pp.6242-6244 |
2 |
원문
|
Conference
|
2023 |
Federated Learning Using Blockchain-based Marketplace
Eom Bo Yun International Conference on Ubiquitous and Future Networks (ICUFN) 2023, pp.795-797 |
0 |
원문
|
Journal
|
2023 |
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments
Park Kisung IEEE Transactions on Dependable and Secure Computing, v.20, no.2, pp.1719-1729 |
62 |
원문
|
Journal
|
2022 |
SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments
Yusungjin IEEE Access, v.10, pp.60534-60549 |
16 |
원문
|
Journal
|
2021 |
Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack
Park Cheolhee IEEE Access, v.9, pp.167412-167425 |
7 |
원문
|
Journal
|
2021 |
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
Yusungjin IEEE Access, v.9, pp.126186-126197 |
55 |
원문
|
Journal
|
2021 |
World Without Boundaries and Trends in User Authentication Technology
Jin Seung Hun 전자통신동향분석, v.36, no.4, pp.135-144 |
|
원문
|
Journal
|
2020 |
Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
이준영 Applied Sciences, v.10, no.18, pp.1-20 |
15 |
원문
|
Journal
|
2020 |
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
유성진 Applied Sciences, v.10, no.5, pp.1-26 |
38 |
원문
|
Journal
|
2019 |
Efficient Privacy-Preserving Machine Learning for Blockchain Network
김현일 IEEE Access, v.7, pp.136481-136495 |
114 |
원문
|
Journal
|
2019 |
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication
서민혜 IEEE Access, v.7, pp.69892-69906 |
5 |
원문
|
Conference
|
2015 |
Privacy Preserving Client-side Deduplication scheme in Cloud Storage
박철희 Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2015, pp.141-147 |
|
|
Journal
|
2015 |
Short Dynamic Group Signature Scheme Supporting Controllable Linkability
Jung Yeon Hwang IEEE Transactions on Information Forensics and Security, v.10, no.6, pp.1109-1124 |
57 |
원문
|
Conference
|
2014 |
Self-certified Privacy-Preserving Scheme for Vehicle-to-Vehicle Communications
Kwantae Cho International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.335-341 |
1 |
원문
|
Conference
|
2014 |
A Privacy-Preserving Human Tracking Scheme in Centralized Cloud based Camera Networks
Yu-Chi Chen International Conference on Communications (ICC) 2014, pp.793-798 |
5 |
원문
|
Journal
|
2013 |
Group Signatures with Controllable Linkability for Dynamic Membership
Jung Yeon Hwang Information Sciences, v.222, pp.761-778 |
50 |
원문
|
Conference
|
2012 |
Privacy-Preserving Cross-User Source-Based Data Deduplication in Cloud Storage
Lee Seung Kwang International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.329-330 |
33 |
원문
|
Journal
|
2012 |
Address Permutation for Privacy-Preserving Searchable Symmetric Encryption
Choi Dae Seon ETRI Journal, v.34, no.1, pp.66-75 |
2 |
원문
|
Journal
|
2011 |
Privacy-Preserving H.264 Video Encryption Scheme
Choi Sugil ETRI Journal, v.33, no.6, pp.935-944 |
11 |
원문
|
Conference
|
2011 |
Privacy-Preserving PKI Design Based on Group Signature
Lee Sokjoon Australian Information Security Management Conference (AISM) 2011, pp.155-164 |
|
원문
|
Conference
|
2011 |
Short Group Signatures with Controllable Linkability
Jung Yeon Hwang Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec) 2011, pp.44-52 |
38 |
원문
|
Conference
|
2010 |
Scanning and Tracking Fingerprint Images for Detecting Privacy Violators
Kim Hak Jae International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.109-113 |
|
|
Journal
|
2010 |
Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
Hong Do Won ETRI Journal, v.32, no.3, pp.351-361 |
8 |
원문
|
Journal
|
2010 |
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency
Abedelaziz Mohaisen IEICE Transactions on Information and Systems, v.E93.D, no.2, pp.315-325 |
10 |
원문
|
Journal
|
2008 |
Mitigating the ICA Attack Against Rotation-Based Transformation for Privacy Preserving Clustering
Abedelaziz Mohaisen ETRI Journal, v.30, no.6, pp.868-870 |
5 |
원문
|
Conference
|
2008 |
Privacy Preserving Association Rule Ming Revisited
Abedelaziz Mohaisen World Conference on Information Security Applications (WISA) 2008, pp.1-15 |
|
|