Follow
Junbeom Hur
Junbeom Hur
Verified email at isslab.korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Attribute-based access control with efficient revocation in data outsourcing systems
J Hur, DK Noh
IEEE Transactions on Parallel and Distributed Systems 22 (7), 1214-1221, 2010
10712010
Improving security and efficiency in attribute-based data sharing
J Hur
IEEE transactions on knowledge and data engineering 25 (10), 2271-2282, 2011
5202011
Secure data deduplication with dynamic ownership management in cloud storage
J Hur, D Koo, Y Shin, K Kang
IEEE Transactions on knowledge and data engineering 28 (11), 3113-3125, 2016
1782016
Attribute-based secure data sharing with hidden policies in smart grid
J Hur
IEEE Transactions on Parallel and Distributed Systems 24 (11), 2171-2180, 2013
1362013
A survey of secure data deduplication schemes for cloud storage systems
Y Shin, D Koo, J Hur
ACM computing surveys (CSUR) 49 (4), 1-38, 2017
1292017
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
D Koo, J Hur, H Yoon
Computers & Electrical Engineering 39 (1), 34-46, 2013
1202013
Secure data retrieval for decentralized disruption-tolerant military networks
J Hur, K Kang
IEEE/ACM transactions on networking 22 (1), 16-26, 2012
1102012
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
D Koo, J Hur
Future Generation Computer Systems 78, 739-752, 2018
1032018
Unveiling hardware-based data prefetcher, a hidden source of information leakage
Y Shin, HC Kim, D Kwon, JH Jeong, J Hur
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
722018
Privacy-preserving identity-based broadcast encryption
J Hur, C Park, SO Hwang
Information Fusion 13 (4), 296-303, 2012
662012
Security considerations for handover schemes in mobile WiMAX networks
J Hur, H Shim, P Kim, H Yoon, NO Song
2008 IEEE wireless communications and networking conference, 2531-2536, 2008
662008
Decentralized server-aided encryption for secure deduplication in cloud storage
Y Shin, D Koo, J Yun, J Hur
IEEE Transactions on Services Computing 13 (6), 1021-1033, 2017
552017
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning
C Hahn, H Kim, M Kim, J Hur
IEEE Transactions on Dependable and Secure Computing 20 (1), 36-52, 2021
482021
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience
D Koo, Y Shin, J Yun, J Hur
Applied Sciences 8 (12), 2532, 2018
452018
Trust management for resilient wireless sensor networks
J Hur, Y Lee, SM Hong, H Yoon
Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006
422006
A reliable adaptive forwarding approach in named data networking
Z Rezaeifar, J Wang, H Oh, SB Lee, J Hur
Future Generation Computer Systems 96, 538-551, 2019
342019
Removing escrow from ciphertext policy attribute-based encryption
J Hur, D Koo, SO Hwang, K Kang
Computers & Mathematics with Applications 65 (9), 1310-1317, 2013
332013
Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images
X Sun, J Park, K Kang, J Hur
2017 IEEE international conference on systems, man, and cybernetics (SMC …, 2017
322017
Enabling fast public auditing and data dynamics in cloud services
C Hahn, H Kwon, D Kim, J Hur
IEEE Transactions on Services Computing 15 (4), 2047-2059, 2020
302020
A practical de-mixing algorithm for bitcoin mixing services
Y Hong, H Kwon, J Lee, J Hur
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and …, 2018
302018
The system can't perform the operation now. Try again later.
Articles 1–20