Follow
Junbum Shin
Junbum Shin
cryptolab
Verified email at cryptolab.co.kr - Homepage
Title
Cited by
Cited by
Year
ScanDal: Static analyzer for detecting privacy leaks in android applications
J Kim, Y Yoon, K Yi, J Shin, S Center
MoST 12 (110), 1, 2012
2612012
Collecting and analyzing data from smart device users with local differential privacy
TT Nguyên, X Xiao, Y Yang, SC Hui, H Shin, J Shin
arXiv preprint arXiv:1606.05053, 2016
1642016
Collecting and analyzing multidimensional data with local differential privacy
N Wang, X Xiao, Y Yang, J Zhao, SC Hui, H Shin, J Shin, G Yu
2019 IEEE 35th International Conference on Data Engineering (ICDE), 638-649, 2019
1462019
Privacy enhanced matrix factorization for recommendation with local differential privacy
H Shin, S Kim, J Shin, X Xiao
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1770-1782, 2018
1262018
New DSA-verifiable signcryption schemes
JB Shin, K Lee, K Shim
International conference on information security and cryptology, 35-47, 2002
1132002
Method and apparatus for protecting digital contents stored in usb mass storage device
CS Ahn, J Shin, B Kim
US Patent App. 11/872,161, 2008
612008
PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy
GYN Wang, X Xiao, Y Yang, TD Hoang, H Shin, J Shin, G Yu
IEEE International Conference on Data Engineering (ICDE), 2018
572018
Method and apparatus for encrypting message for maintaining message integrity, and method and apparatus for decrypting message for maintaining message integrity
J Shin, J Park
US Patent 8,155,311, 2012
552012
{Hardware-Assisted}{On-Demand} Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices
Y Cho, J Shin, D Kwon, MJ Ham, Y Kim, Y Paek
2016 USENIX Annual Technical Conference (USENIX ATC 16), 565-578, 2016
542016
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
522016
Method and apparatus for encrypting transport stream of multimedia content, and method and apparatus for decrypting transport stream of multimedia content
CH Lee, J Shin, SY Lee, EH Hong
US Patent 8,281,128, 2012
472012
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
292018
A new appraoch to server-aided secret computation.
SM Hong, JB Shin, H Lee-Kwang, H Yoon
ICISC, 33-45, 1998
261998
Methods of encrypting and decrypting data and bus system using the methods
H Lee, JM Lee, J Shin
US Patent App. 12/025,829, 2008
172008
Method and apparatus for generating firmware update file and updating firmware by using the firmware update file
JY Moon, I Lee, J Shin, S Lee, SH Lee
US Patent App. 11/877,184, 2008
172008
Method and apparatus for generating and verifying electronic signature of software data, and computer readable recording medium thereof
J Shin, CH Lee, S Nam, Y Choi, J Park
US Patent 8,806,212, 2014
162014
Method and apparatus for encrypting data and method and apparatus for decrypting data
J Shin, SY Lee, JM Kim
US Patent App. 12/472,462, 2010
162010
Learning new words from keystroke data with local differential privacy
S Kim, H Shin, C Baek, S Kim, J Shin
IEEE Transactions on Knowledge and Data Engineering 32 (3), 479-491, 2018
132018
Automated extraction and presentation of data practices in privacy policies
D Bui, KG Shin, JM Choi, J Shin
Proceedings on Privacy Enhancing Technologies 2021 (2), 88-110, 2021
122021
Optimization of Montgomery modular multiplication algorithm for systolic arrays
JB Shin, J Kim, H Lee-Kwang
Electronics Letters 34 (19), 1830-1831, 1998
111998
The system can't perform the operation now. Try again later.
Articles 1–20