Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Search-and-Compute on Encrypted Data

    Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the user’s sensitive data will be protected from exposure. Given an encrypted database, t...

    Jung Hee Cheon, Miran Kim, Myungsun Kim in Financial Cryptography and Data Security (2015)

  2. No Access

    Chapter and Conference Paper

    Run Away If You Can: Persistent Jamming Attacks against Channel Hop** Wi-Fi Devices in Dense Networks

    Wireless local area networks (WLANs) can adopt channel hop** technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though ...

    Il-Gu Lee, Hyunwoo Choi, Yongdae Kim in Research in Attacks, Intrusions and Defens… (2014)

  3. No Access

    Chapter and Conference Paper

    Private Over-Threshold Aggregation Protocols

    In this paper, we revisit the private k  +  data aggregation problem, and formally define the problem’s security requirements as both data and user privacy goals. To achieve both goals, and to str...

    Myungsun Kim, Abedelaziz Mohaisen in Information Security and Cryptology – ICIS… (2013)

  4. No Access

    Chapter and Conference Paper

    Mutual Private Set Intersection with Linear Complexity

    A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables...

    Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon in Information Security Applications (2012)

  5. No Access

    Chapter and Conference Paper

    Active Binding Technology: A Reuse-Enabling Component Model

    One of the primary obstacles to the reuse of independently-developed binary components on the industrial level lies in that the existing component technologies do not clearly separate component assembly from c...

    Anmo Jeong, Seungnam Jeong, Yoonsun Lim in High Confidence Software Reuse in Large Sy… (2008)

  6. No Access

    Chapter and Conference Paper

    An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses

    Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provide enterprise level integrated...

    Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho Kun Moon in Information Security and Cryptology (2006)

  7. No Access

    Chapter and Conference Paper

    Internet at a Crossroads of Education

    The Internet has grown rapidly in the past few years to impact all aspects of modern life. While many areas of the Internet such as commerce has shown tremendous improvements in providing convenient and comple...

    Myung Kim, Sunsook Noh, Seongmin Cho in Web and Communication Technologies and Int… (2005)

  8. No Access

    Chapter and Conference Paper

    Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption

    The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can tra...

    Myungsun Kim, Jongseong Kim, Kwangjo Kim in Information and Communications Security (2002)

  9. No Access

    Chapter and Conference Paper

    A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem

    We construct an interactive identification scheme based on the bilinear Diffie-Hellman problem and analyze its security. This scheme is practical in terms of key size, communication complexity, and availabilit...

    Myungsun Kim, Kwangjo Kim in Information Security and Privacy (2002)