[go: up one dir, main page]

Follow
Myungsun Kim
Myungsun Kim
The University of Suwon
Verified email at suwon.ac.kr - Homepage
Title
Cited by
Cited by
Year
Search-and-compute on encrypted data
JH Cheon, M Kim, M Kim
International Conference on Financial Cryptography and Data Security, 142-159, 2015
902015
Optimized search-and-compute circuits and their application to query evaluation on encrypted data
JH Cheon, M Kim, M Kim
IEEE Transactions on Information Forensics and Security 11 (1), 188-199, 2015
852015
A secure smart-metering protocol over power-line communication
S Kim, EY Kwon, M Kim, JH Cheon, S Ju, Y Lim, M Choi
IEEE Transactions on Power Delivery 26 (4), 2370-2379, 2011
852011
Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger
H Chung, K Han, C Ju, M Kim, JH Seo
Ieee Access 10, 42081-42096, 2022
692022
Key management method using hierarchical node topology, and method of registering and deregistering user using the same
S Han, B Kim, M Kim, Y Yoon, S Lee, JH Lee
US Patent 8,983,071, 2015
692015
Mutual authentication method between devices using mediation module and system therefor
H Ju, M Kim, JY Moon
US Patent App. 11/865,821, 2008
622008
Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations
JH Cheon, HW Chung, M Kim, KW Lee
Cryptology ePrint Archive, 2016
572016
Home network system and method therefor
YJ Jang, M Kim, S Nam, JH Lee
US Patent 7,979,913, 2011
572011
Multi-media device having function of backing up broadcasting contents in home network environment and method of backing up the broadcasting contents
B Kim, M Kim, S Nam, S Choi
US Patent App. 11/234,416, 2006
552006
On the efficiency of FHE-based private queries
M Kim, HT Lee, S Ling, H Wang
IEEE Transactions on Dependable and Secure Computing 15 (2), 357-363, 2016
542016
Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP)
S Han, M Kim, J Cho, Y Choi
US Patent 7,424,613, 2008
532008
A new identification scheme based on the bilinear Diffie-Hellman problem
M Kim, K Kim
Australasian Conference on Information Security and Privacy, 362-378, 2002
452002
Method and apparatus for checking proximity between devices using hash chain
JH Lee, M Kim, S Han, Y Yoon, S Lee, B Kim
US Patent 8,122,487, 2012
432012
Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs
A Mohaien, DF Kune, EY Vasserman, M Kim, Y Kim
IEEE Transactions on Dependable and Secure Computing 10 (6), 380-393, 2013
392013
Private compound wildcard queries using fully homomorphic encryption
M Kim, HT Lee, S Ling, BHM Tan, H Wang
IEEE Transactions on Dependable and Secure Computing 16 (5), 743-756, 2017
362017
Method of controlling content access and method of obtaining content key using the same
S Han, M Kim, Y Yoon, S Lee, B Kim, JH Lee
US Patent 8,341,402, 2012
312012
Mutual private set intersection with linear complexity
M Kim, HT Lee, JH Cheon
International Workshop on Information Security Applications, 219-231, 2011
302011
Method of authenticating device using certificate, and digital content processing device for performing device authentication using the same
Y You, M Kim, YJ Jang
US Patent App. 10/927,239, 2005
282005
Better security for queries on encrypted databases
M Kim, HT Lee, S Ling, SQ Ren, BHM Tan, H Wang
Cryptology ePrint Archive, 2016
262016
Method of creating domain based on public key cryptography
Y You, M Kim, Y Choi, YJ Jang
US Patent 7,996,322, 2011
262011
The system can't perform the operation now. Try again later.
Articles 1–20