Sang-Uk Shin
Orcid: 0000-0002-7048-582XAffiliations:
- Pukyong National University, Department of Information Security, Busan, South Korea
According to our database1,
Sang-Uk Shin
authored at least 44 papers
between 1998 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
J. Internet Serv. Inf. Secur., 2022
2021
PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments.
IEICE Trans. Inf. Syst., 2021
Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data.
IEICE Trans. Inf. Syst., 2021
2020
Secur. Commun. Networks, 2020
2019
Wirel. Commun. Mob. Comput., 2019
J. Supercomput., 2019
2018
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage.
IEEE Access, 2018
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
2016
Multim. Tools Appl., 2016
2015
Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2014
Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment.
Multim. Tools Appl., 2014
J. Internet Serv. Inf. Secur., 2014
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data.
Comput. Sci. Inf. Syst., 2014
2013
J. Univers. Comput. Sci., 2013
J. Internet Serv. Inf. Secur., 2013
Comput. Sci. Inf. Syst., 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing.
J. Internet Serv. Inf. Secur., 2012
2011
J. Inf. Sci. Eng., 2011
Efficient e-Discovery Process Utilizing Combination Method of Machine Learning Algorithms.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Sci. China Inf. Sci., 2010
2009
An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding.
IEICE Trans. Inf. Syst., 2009
2008
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
2007
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006
2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004
2001
J. Inf. Sci. Eng., 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Public Key Cryptography, 2000
1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Information Security, Second International Workshop, 1999
1998
Proceedings of the Public Key Cryptography, 1998
A secure hash function based on cellular automata.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998