Journal
|
2024 |
Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multidelegation
Lee Joonyoung IEEE Internet of Things Journal, v.11, no.10, pp.17482-17494 |
12 |
원문
|
Journal
|
2019 |
Symmetric Keyring Encryption Scheme for Biometric Cryptosystem
Yen-Lung Lai Information Sciences, v.502, pp.492-509 |
20 |
원문
|
Journal
|
2018 |
Authorized Client-side Deduplication Using Access Policy-based Convergent Encryption
Taek-Young Youn Journal of Internet Technology, v.19, no.4, pp.1229-1240 |
2 |
원문
|
Conference
|
2016 |
Practical Additive Homomorphic Encryption for Statistical Analysis over Encrypted Data
Taek-Young Youn International Conference on Platform Technology and Service (PlatCon) 2016, pp.1-7 |
6 |
원문
|
Journal
|
2014 |
Efficient DRM Mechanism of Scalable Contents Based on H.264/SVC in Convergence Environment
Su Wan Park Multimedia Tools and Applications, v.73, no.2, pp.841-855 |
1 |
원문
|
Conference
|
2013 |
E-mail Encryption Methods and Lawful Interception Methods of it
Jeong Young Sic International Conference on Advanced Communication Technology (ICACT) 2013, pp.29-32 |
5 |
|
Conference
|
2012 |
Efficient DRM Mechanism for Scalable Contents based on H.264/SVC
Su Wan Park International Conference on Advanced IT, engineering and Management (AIM) 2012, pp.19-20 |
|
|
Journal
|
2012 |
Address Permutation for Privacy-Preserving Searchable Symmetric Encryption
Choi Dae Seon ETRI Journal, v.34, no.1, pp.66-75 |
2 |
원문
|
Journal
|
2011 |
Privacy-Preserving H.264 Video Encryption Scheme
Choi Sugil ETRI Journal, v.33, no.6, pp.935-944 |
11 |
원문
|
Journal
|
2009 |
Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
구우권 Information Processing Letters, v.109, no.23-24, pp.1260-1262 |
11 |
원문
|
Journal
|
2009 |
Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases
Seung Min Lee IEICE Transactions on Information and Systems, v.E92-D, no.11, pp.2207-2217 |
38 |
원문
|
Conference
|
2009 |
A Scalable Security Service Model for Reliable End-to-End Media Distribution and Reuse
Moon Yong Hyuk Joint Workshop on Information Security (JWIS) 2009, pp.1-11 |
|
|
Conference
|
2007 |
A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme
Lee Sang Su International Conference on Future Generation Communication and Networking (FGCN) 2007, pp.1-5 |
4 |
원문
|
Conference
|
2007 |
How to Construct a New Encryption Scheme Supporting Range Queries on Encrypted Database
Lee Donghyuk International Conference on Convergence Information Technology (ICCIT) 2007, pp.1402-1407 |
2 |
원문
|
Conference
|
2006 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles
Jeong Ik Rae International Conference on Cryptology and Network Security (CANS) 2006 (LNCS 4301), v.4301, pp.37-54 |
18 |
원문
|
Journal
|
2005 |
Protection of MPEG-2 Multicast Streaming in IP Set-Top Box Environment
Seong Oun Hwang ETRI Journal, v.27, no.5, pp.595-607 |
3 |
원문
|
Conference
|
2004 |
Protecting ASF Movie on VOD
Park Jee Hyun International Conference on Trust, Privacy and Security in Digital Business (TrustBus) 2004 (LNCS 3184), v.3184, pp.242-250 |
0 |
원문
|