Attribute-based access control with efficient revocation in data outsourcing systems J Hur, DK Noh IEEE Transactions on Parallel and Distributed Systems 22 (7), 1214-1221, 2010 | 1071 | 2010 |
Improving security and efficiency in attribute-based data sharing J Hur IEEE transactions on knowledge and data engineering 25 (10), 2271-2282, 2011 | 520 | 2011 |
Secure data deduplication with dynamic ownership management in cloud storage J Hur, D Koo, Y Shin, K Kang IEEE Transactions on knowledge and data engineering 28 (11), 3113-3125, 2016 | 179 | 2016 |
Attribute-based secure data sharing with hidden policies in smart grid J Hur IEEE Transactions on Parallel and Distributed Systems 24 (11), 2171-2180, 2013 | 137 | 2013 |
A survey of secure data deduplication schemes for cloud storage systems Y Shin, D Koo, J Hur ACM computing surveys (CSUR) 49 (4), 1-38, 2017 | 129 | 2017 |
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage D Koo, J Hur, H Yoon Computers & Electrical Engineering 39 (1), 34-46, 2013 | 120 | 2013 |
Secure data retrieval for decentralized disruption-tolerant military networks J Hur, K Kang IEEE/ACM transactions on networking 22 (1), 16-26, 2012 | 110 | 2012 |
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing D Koo, J Hur Future Generation Computer Systems 78, 739-752, 2018 | 103 | 2018 |
Unveiling hardware-based data prefetcher, a hidden source of information leakage Y Shin, HC Kim, D Kwon, JH Jeong, J Hur Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 72 | 2018 |
Privacy-preserving identity-based broadcast encryption J Hur, C Park, SO Hwang Information Fusion 13 (4), 296-303, 2012 | 66 | 2012 |
Security considerations for handover schemes in mobile WiMAX networks J Hur, H Shim, P Kim, H Yoon, NO Song 2008 IEEE wireless communications and networking conference, 2531-2536, 2008 | 66 | 2008 |
Decentralized server-aided encryption for secure deduplication in cloud storage Y Shin, D Koo, J Yun, J Hur IEEE Transactions on Services Computing 13 (6), 1021-1033, 2017 | 55 | 2017 |
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning C Hahn, H Kim, M Kim, J Hur IEEE Transactions on Dependable and Secure Computing 20 (1), 36-52, 2021 | 49 | 2021 |
Improving security and reliability in Merkle tree-based online data authentication with leakage resilience D Koo, Y Shin, J Yun, J Hur Applied Sciences 8 (12), 2532, 2018 | 45 | 2018 |
Trust management for resilient wireless sensor networks J Hur, Y Lee, SM Hong, H Yoon Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006 | 42 | 2006 |
A reliable adaptive forwarding approach in named data networking Z Rezaeifar, J Wang, H Oh, SB Lee, J Hur Future Generation Computer Systems 96, 538-551, 2019 | 34 | 2019 |
Removing escrow from ciphertext policy attribute-based encryption J Hur, D Koo, SO Hwang, K Kang Computers & Mathematics with Applications 65 (9), 1310-1317, 2013 | 33 | 2013 |
Novel hybrid CNN-SVM model for recognition of functional magnetic resonance images X Sun, J Park, K Kang, J Hur 2017 IEEE international conference on systems, man, and cybernetics (SMC …, 2017 | 32 | 2017 |
Enabling fast public auditing and data dynamics in cloud services C Hahn, H Kwon, D Kim, J Hur IEEE Transactions on Services Computing 15 (4), 2047-2059, 2020 | 30 | 2020 |
A practical de-mixing algorithm for bitcoin mixing services Y Hong, H Kwon, J Lee, J Hur Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and …, 2018 | 30 | 2018 |