Hyeong-Il Kim
Orcid: 0000-0003-0267-5514
According to our database1,
Hyeong-Il Kim
authored at least 24 papers
between 2009 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
A secure kNN query processing algorithm using homomorphic encryption on outsourced database.
Data Knowl. Eng., 2019
2017
World Wide Web, 2017
J. Inf. Process. Syst., 2017
Bitmap-based distributed index structure and encrypted query processing schemes for outsourcing mobile sensitive data.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017
A Privacy-Preserving kNN Classification Algorithm Using Yao's Garbled Circuit on Cloud Computing.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data.
Data Knowl. Eng., 2016
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2016
Efficient and secure top-k query processing algorithm using garbled circuit based secure protocols on outsourced databases.
Proceedings of the Sixth International Conference on Emerging Databases: Technologies, 2016
A Range Query Processing Algorithm Hiding Data Access Patterns in Outsourced Database Environment.
Proceedings of the Data Mining and Big Data, First International Conference, 2016
A kNN query processing algorithm using a tree index structure on the encrypted database.
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016
2015
A hierarchical CRT-based user access control scheme using resource set tree on the cloud system.
Proceedings of the 2015 International Conference on Big Data and Smart Computing, 2015
Proceedings of the 6th International Conference on Ambient Systems, 2015
2014
A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases.
Secur. Commun. Networks, 2014
A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing.
Int. J. Data Warehous. Min., 2014
A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data.
Proceedings of the International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014
2013
J. Comput. Sci. Technol., 2013
Performance Analysis of MapReduce-Based Distributed Systems for Iterative Data Processing Applications.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Linear Function Based Transformation Scheme for Preserving Database Privacy in Cloud Computing.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013
2012
Grid-based cloaking area creation scheme supporting continuous location-based services.
Proceedings of the ACM Symposium on Applied Computing, 2012
2011
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011
2009
A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based Services.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009
An Efficient High-Dimensional Indexing Scheme Using a Clustering Technique for Content-Based Retrieval.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009