Nam-Su Jho

Orcid: 0000-0003-1721-5350

According to our database1, Nam-Su Jho authored at least 32 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Partition and mix: generalizing the swap-or-not shuffle.
Des. Codes Cryptogr., 2023

Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm.
IEEE Access, 2023

2022
A Multi-Tree Approach to Mutable Order-Preserving Encoding.
IEICE Trans. Inf. Syst., November, 2022

Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability.
IEICE Trans. Inf. Syst., November, 2022

PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices.
Sensors, 2022

A lightweight D2D security protocol with request-forecasting for next-generation mobile networks.
Connect. Sci., 2022

Rcryptect: Real-time detection of cryptographic function in the user-space filesystem.
Comput. Secur., 2022

On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain.
IEEE Access, 2022

2021
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems.
Secur. Commun. Networks, 2021

Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes.
IEEE Access, 2021

Table Redundancy Method for Protecting Against Fault Attacks.
IEEE Access, 2021

Secure Data Management using Distributed Storages for Stronger Cybersecurity in Cloud Service.
Proceedings of the 2021 World Automation Congress, 2021

2020
Blockchain-Based Data Sharing and Trading Model for the Connected Car.
Sensors, 2020

Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption.
KSII Trans. Internet Inf. Syst., 2020

On the Linear Transformation in White-Box Cryptography.
IEEE Access, 2020

2019
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage.
Wirel. Commun. Mob. Comput., 2019

2018
Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data.
J. Supercomput., 2018

A Key Leakage Preventive White-box Cryptographic Implementation.
IACR Cryptol. ePrint Arch., 2018

2016
Symmetric searchable encryption with efficient range query using multi-layered linked chains.
J. Supercomput., 2016

One-Bit to Four-Bit Dual Conversion for Security Enhancement against Power Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function.
IEICE Trans. Commun., 2015

2014
Bucket Index Ordering Problem in Range Queries.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search.
KSII Trans. Internet Inf. Syst., 2013

2010
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010

2009
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption.
IEEE Trans. Inf. Theory, 2008

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

2007
Multiparty Key Agreement Using Bilinear Map.
IACR Cryptol. ePrint Arch., 2007

2005
Broadcast Encryption π.
IACR Cryptol. ePrint Arch., 2005

One-Way Chain Based Broadcast Encryption Schemes.
Proceedings of the Advances in Cryptology, 2005

New broadcast encryption scheme using tree-based circle.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

2004
Efficient Broadcast Encryption Using Multiple Interpolation Methods.
Proceedings of the Information Security and Cryptology, 2004


  Loading...