Sang-Uk Shin

Orcid: 0000-0002-7048-582X

Affiliations:
  • Pukyong National University, Department of Information Security, Busan, South Korea


According to our database1, Sang-Uk Shin authored at least 44 papers between 1998 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Blockchain-based fair and secure protocol for decentralized data trading.
J. Internet Serv. Inf. Secur., 2022

2021
PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments.
IEICE Trans. Inf. Syst., 2021

Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data.
IEICE Trans. Inf. Syst., 2021

2020
Blockchain-Based Data Sharing and Trading Model for the Connected Car.
Sensors, 2020

PyRos: A State Channel-Based Access Control System for a Public Blockchain Network.
Secur. Commun. Networks, 2020

2019
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage.
Wirel. Commun. Mob. Comput., 2019

Study on peak misdetection recovery of key exchange protocol using heartbeat.
J. Supercomput., 2019

2018
Smart Contract-Based Review System for an IoT Data Marketplace.
Sensors, 2018

Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage.
IEEE Access, 2018

A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2016
DRM cloud framework to support heterogeneous digital rights management systems.
Multim. Tools Appl., 2016

2015
Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment.
Multim. Tools Appl., 2014

Performance of Distributed Text Processing System Using Hadoop.
J. Internet Serv. Inf. Secur., 2014

The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data.
Comput. Sci. Inf. Syst., 2014

2013
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs.
J. Univers. Comput. Sci., 2013

DRM Cloud Architecture and Service Scenario for Content Protection.
J. Internet Serv. Inf. Secur., 2013

Design and implementation of E-discovery as a service based on cloud computing.
Comput. Sci. Inf. Syst., 2013

Certificate-Based Proxy Re-encryption for Public Cloud Storage.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing.
J. Internet Serv. Inf. Secur., 2012

2011
Authentication and Copyright Protection Scheme for H.264/AVC and SVC.
J. Inf. Sci. Eng., 2011

Efficient e-Discovery Process Utilizing Combination Method of Machine Learning Algorithms.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Authentication mechanism for fast handoff in cdma2000-WiBro interworking.
Sci. China Inf. Sci., 2010

2009
An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding.
IEICE Trans. Inf. Syst., 2009

2008
Combined Scheme of Encryption and Watermarking in H.264/Scalable Video Coding (SVC).
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Efficient Selective Encryption Scheme for the H.264/Scalable Video Coding(SVC).
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
A New Fingerprinting Codes for Multimedia Contents.
Proceedings of the Advances in Multimedia Modeling, 2007

Context Aware System for Future Homes.
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007

A Secure DRM Framework for User's Domain and Key Management.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Intelligent Access Control Mechanism for Ubiquitous Applications.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
An Efficient Sealed-Bid Auction Protocol with Two Servers.
J. Inf. Sci. Eng., 2006

A Viable System for Tracing Illegal Users of Video.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

2005
Video Fingerprinting System Using Wavelet and Error Correcting Code.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

A Steganographic Scheme in Digital Images Using Information of Neighboring Pixels.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

An Image Steganography Using Pixel Characteristics.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Simplified Approach to User Controllable Threshold Signatures.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

2001
A New Design of the Hash Functions With All-or-Nothing Property.
J. Inf. Sci. Eng., 2001

Provable Security of KASUMI and 3GPP Encryption Mode f8.
Proceedings of the Advances in Cryptology, 2001

2000
All-or-Nothing Transform and Remotely Keyed Encription Protocols.
Proceedings of the Public Key Cryptography, 2000

1999
Hash Functions and the MAC Using All-or-Nothing Property.
Proceedings of the Public Key Cryptography, 1999

A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption.
Proceedings of the Information Security, Second International Workshop, 1999

1998
A New Hash Function Based on MDx-Family and Its Application to MAC.
Proceedings of the Public Key Cryptography, 1998

A secure hash function based on cellular automata.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998


  Loading...