关注
Junbum Shin
Junbum Shin
cryptolab
在 cryptolab.co.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
ScanDal: Static analyzer for detecting privacy leaks in android applications
J Kim, Y Yoon, K Yi, J Shin, S Center
MoST 12 (110), 1, 2012
2682012
Collecting and analyzing multidimensional data with local differential privacy
N Wang, X Xiao, Y Yang, J Zhao, SC Hui, H Shin, J Shin, G Yu
2019 IEEE 35th International Conference on Data Engineering (ICDE), 638-649, 2019
1972019
Collecting and analyzing data from smart device users with local differential privacy
TT Nguyên, X Xiao, Y Yang, SC Hui, H Shin, J Shin
arXiv preprint arXiv:1606.05053, 2016
1932016
Privacy enhanced matrix factorization for recommendation with local differential privacy
H Shin, S Kim, J Shin, X Xiao
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1770-1782, 2018
1472018
New DSA-verifiable signcryption schemes
JB Shin, K Lee, K Shim
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
1162003
Method and apparatus for protecting digital contents stored in usb mass storage device
CS Ahn, J Shin, B Kim
US Patent App. 11/872,161, 2008
652008
PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy
GYN Wang, X Xiao, Y Yang, TD Hoang, H Shin, J Shin, G Yu
IEEE International Conference on Data Engineering (ICDE), 2018
632018
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
592016
Method and apparatus for encrypting message for maintaining message integrity, and method and apparatus for decrypting message for maintaining message integrity
J Shin, J Park
US Patent 8,155,311, 2012
582012
Hardware-assisted on-demand hypervisor activation for efficient security critical code execution on mobile devices
Y Cho, J Shin, D Kwon, MJ Ham, Y Kim, Y Paek
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 565-578, 2016
572016
Method and apparatus for encrypting transport stream of multimedia content, and method and apparatus for decrypting transport stream of multimedia content
CH Lee, J Shin, SY Lee, EH Hong
US Patent 8,281,128, 2012
482012
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
372018
A new appraoch to server-aided secret computation.
SM Hong, JB Shin, H Lee-Kwang, H Yoon
ICISC, 33-45, 1998
261998
Automated Extraction and Presentation of Data Practices in Privacy Policies.
D Bui, KG Shin, JM Choi, J Shin
Proc. Priv. Enhancing Technol. 2021 (2), 88-110, 2021
202021
Method and apparatus for generating firmware update file and updating firmware by using the firmware update file
JY Moon, I Lee, J Shin, S Lee, SH Lee
US Patent App. 11/877,184, 2008
192008
Methods of encrypting and decrypting data and bus system using the methods
H Lee, JM Lee, J Shin
US Patent App. 12/025,829, 2008
172008
Method and apparatus for encrypting data and method and apparatus for decrypting data
J Shin, SY Lee, JM Kim
US Patent App. 12/472,462, 2010
162010
Learning new words from keystroke data with local differential privacy
S Kim, H Shin, C Baek, S Kim, J Shin
IEEE Transactions on Knowledge and Data Engineering 32 (3), 479-491, 2018
142018
Optimization of Montgomery modular multiplication algorithm for systolic arrays
JB Shin, J Kim, H Lee-Kwang
Electronics Letters 34 (19), 1830-1831, 1998
111998
Instant privacy-preserving biometric authentication for hamming distance
J Lee, D Kim, D Kim, Y Song, J Shin, JH Cheon
Cryptology ePrint Archive, 2018
102018
系统目前无法执行此操作,请稍后再试。
文章 1–20