Nam-Su Jho
Orcid: 0000-0003-1721-5350
According to our database1,
Nam-Su Jho
authored at least 32 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm.
IEEE Access, 2023
2022
IEICE Trans. Inf. Syst., November, 2022
Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability.
IEICE Trans. Inf. Syst., November, 2022
PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices.
Sensors, 2022
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks.
Connect. Sci., 2022
Rcryptect: Real-time detection of cryptographic function in the user-space filesystem.
Comput. Secur., 2022
On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain.
IEEE Access, 2022
2021
Secur. Commun. Networks, 2021
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes.
IEEE Access, 2021
Secure Data Management using Distributed Storages for Stronger Cybersecurity in Cloud Service.
Proceedings of the 2021 World Automation Congress, 2021
2020
Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption.
KSII Trans. Internet Inf. Syst., 2020
2019
Wirel. Commun. Mob. Comput., 2019
2018
Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data.
J. Supercomput., 2018
IACR Cryptol. ePrint Arch., 2018
2016
Symmetric searchable encryption with efficient range query using multi-layered linked chains.
J. Supercomput., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
2015
IEICE Trans. Commun., 2015
2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
KSII Trans. Internet Inf. Syst., 2013
2010
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010
2009
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.
Proceedings of the Advances in Information Security and Assurance, 2009
2008
IEEE Trans. Inf. Theory, 2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
2007
2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005
2004
Proceedings of the Information Security and Cryptology, 2004