Subjects :
Encrypted Data
논문 검색결과
| Type |
Year |
Title |
Cited |
Download |
|
Conference
|
2023 |
Efficient Hardware Acceleration of Chinese Remainder Theorem for Fully Homomorphic Encryption
Hyunwoo Kim International Conference on Electronics, Information and Communication (ICEIC) 2023, pp.1-4 |
1 |
원문
|
|
Journal
|
2018 |
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage
Taek-Young Youn IEEE Access, v.6, pp.26578-26587 |
44 |
원문
|
|
Journal
|
2018 |
Deduplication Technologies over Encrypted Data
Keonwoo Kim 전자통신동향분석, v.33, no.1, pp.68-77 |
|
원문
|
|
Journal
|
2017 |
Client-Side Deduplication to Enhance Security and Reduce Communication Costs
Keonwoo Kim ETRI Journal, v.39, no.1, pp.116-123 |
13 |
원문
|
|
Conference
|
2016 |
Practical Additive Homomorphic Encryption for Statistical Analysis over Encrypted Data
Taek-Young Youn International Conference on Platform Technology and Service (PlatCon) 2016, pp.1-7 |
6 |
원문
|
|
Journal
|
2014 |
Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems
Lee Seoung Hyeon Information, v.5, no.4, pp.622-633 |
11 |
원문
|
|
Journal
|
2009 |
Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases
Seung Min Lee IEICE Transactions on Information and Systems, v.E92-D, no.11, pp.2207-2217 |
38 |
원문
|
|
Conference
|
2006 |
Difference Set Attacks on Conjunctive Keyword Search Schemes
이현숙 Workshop on Secure Data Management (SDM) 2006 (LNCS 4165), v.4165, pp.64-74 |
7 |
원문
|
연구보고서 검색결과
| Type |
Year |
Research Project |
Primary Investigator |
Download |
|
No search results. |