Smart contract-based review system for an IoT data marketplace JS Park, TY Youn, HB Kim, KH Rhee, SU Shin Sensors 18 (10), 3577, 2018 | 109 | 2018 |
Combined scheme of encryption and watermarking in H. 264/Scalable Video Coding (SVC) SW Park, SU Shin New Directions in Intelligent Interactive Multimedia, 351-361, 2008 | 67 | 2008 |
Efficient selective encryption scheme for the H. 264/scalable video coding (SVC) SW Park, SU Shin 2008 Fourth International Conference on Networked Computing and Advanced …, 2008 | 49 | 2008 |
An image steganography using pixel characteristics YR Park, HH Kang, SU Shin, KR Kwon Computational Intelligence and Security: International Conference, CIS 2005 …, 2005 | 47 | 2005 |
Efficient client-side deduplication of encrypted data with public auditing in cloud storage TY Youn, KY Chang, KH Rhee, SU Shin IEEE Access 6, 26578-26587, 2018 | 46 | 2018 |
Provable Security of KASUMI and 3GPP Encryption Mode f8 JS Kang, SU Shin, D Hong, O Yi Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001 | 45 | 2001 |
Certificate-based proxy re-encryption for public cloud storage C Sur, Y Park, SU Shin, KH Rhee, C Seo 2013 Seventh International Conference on Innovative Mobile and Internet …, 2013 | 42 | 2013 |
A secrecy scheme for MPEG video data using the joint of compression and encryption M Mambo, Y Zheng, SU Shin, KS Sim, KH Rhee Information Security: Second InternationalWorkshop, ISW’99 Kuala Lumpur …, 1999 | 41 | 1999 |
Blockchain-based data sharing and trading model for the connected car BG Jeong, TY Youn, NS Jho, SU Shin Sensors 20 (11), 3141, 2020 | 34 | 2020 |
A steganographic scheme in digital images using information of neighboring pixels YR Park, HH Kang, SU Shin, KR Kwon Advances in Natural Computation: First International Conference, ICNC 2005 …, 2005 | 34 | 2005 |
A steganographic scheme in digital images using information of neighboring pixels YR Park, HH Kang, SU Shin, KR Kwon Advances in Natural Computation: First International Conference, ICNC 2005 …, 2005 | 34 | 2005 |
An efficient encryption and key management scheme for layered access control of H. 264/scalable video coding SW Park, SU Shin IEICE TRANSACTIONS on Information and Systems 92 (5), 851-858, 2009 | 25 | 2009 |
Blockchain-based user-centric records management system SW Noh, Y Park, C Sur, SU Shin, KH Rhee Int J Control Autom 10 (11), 133-144, 2017 | 23 | 2017 |
DRM Cloud Architecture and Service Scenario for Content Protection. H Lee, C Seo, SU Shin J. Internet Serv. Inf. Secur. 3 (3/4), 94-105, 2013 | 23 | 2013 |
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data T Lee, H Lee, KH Rhee, US Shin Computer Science and Information Systems 11 (3), 1037-1054, 2014 | 22 | 2014 |
Intelligent access control mechanism for ubiquitous applications TH Lim, SU Shin 6th IEEE/ACIS International Conference on Computer and Information Science …, 2007 | 20 | 2007 |
Authentication and Copyright Protection Scheme for H. 264/AVC and SVC. SW Park, SU Shin J. Inf. Sci. Eng. 27 (1), 129-142, 2011 | 18 | 2011 |
Implementation and performance of distributed text processing system using hadoop for e-discovery cloud service T Lee, H Kim, KH Rhee, SU Shin Journal of Internet Services and Information Security (JISIS) 4 (1), 12-24, 2013 | 17 | 2013 |
A new hash function based on MDx-family and its application to MAC SU Shin, KH Rhee, DH Ryu, SJ Lee Public Key Cryptography: First International Workshop on Practice and Theory …, 1998 | 15 | 1998 |
Authorized client-side deduplication using CP-ABE in cloud storage TY Youn, NS Jho, KH Rhee, SU Shin Wireless Communications and Mobile Computing 2019, 2019 | 13 | 2019 |