Home > 연구활동 > 주요논문
● Please refer to the following URL for recent paper lists:
https://scholar.google.co.kr/citations?hl=ko&user=_pOaEf4AAAAJ&view_op=list_works&sortby=pubdate
Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-based Credit Scoring Data
KW Cho, BG Jeong, SU Shin
IEICE Trans. Inf. & Syst. E104-D (11) // 2021
Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP
KW Cho, MH Jeon, SU Shin
Journal of Digital Convergence 19 (8) // 2021
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network
S Noh, SU Shin, KH Rhee
Security and Communication Networks 2020 // 2020
Development of Blockchain-based Food Supply Chain Using IoT Sensors
JI Sim, WR Kim, MH Jeon, DE Oh, BG Jeong, SU Shin
Proceedings of the Korea Information Processing Society Conference, 224-227 // 2020
Blockchain-Based Data Sharing and Trading Model for the Connected Car
BG Jeong, TY Youn, NS Jho, SU Shin
Sensors 20 (11), 314 // 2020
A Decentralized Copyright Management Model using Mydata Concept
H Kim, W Shin, SU Shin
Journal of Korea Multimedia Society 23 (2), 262-273 // 2020
Study on peak misdetection recovery of key exchange protocol using heartbeat
J Kim, K Cho, YK Kim, KS Lim, SU Shin
The Journal of Supercomputing 75 (6), 3288-330 // 2019
Authorized client-side deduplication using CP-ABE in cloud storage
TY Youn, NS Jho, KH Rhee, SU Shin
Wireless Communications and Mobile Computing 2019 // 2019
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage
Y Taek-Young, NS Jho, KH Rhee, SU Shin
Wireless Communications & Mobile Computing (Online) 2019 // 2019
Smart contract-based review system for an IoT data marketplace
JS Park, TY Youn, HB Kim, KH Rhee, SU Shin
Sensors 18 (10), 3577 // 2018
Authorized client-side deduplication using access policy-based convergent encryption
TY Youn, KY Chang, KH Rhee, SU Shin
Journal of Internet Technology 19 (4), 1229-1240 // 2018
Efficient client-side deduplication of encrypted data with public auditing in cloud storage
TY Youn, KY Chang, KH Rhee, SU Shin
IEEE Access 6, 26578-26587 // 2018
A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange
J Kim, K Cho, YK Kim, KS Lim, SU Shin
Advanced Multimedia and Ubiquitous Engineering, 353-358 // 2018
A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram
J Kim, K Cho, SU Shin
Advanced Multimedia and Ubiquitous Engineering, 359-365 // 2018
Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage
JS Park, SU Shin
Journal of Korea Multimedia Society 21 (8), 909-916 // 2018
Blockchain-based user-centric records management system
SW Noh, Y Park, C Sur, SU Shin, KH Rhee
Int J Control Autom 10 (11), 133-144 // 2017
DRM cloud framework to support heterogeneous digital rights management systems
H Lee, S Park, C Seo, SU Shin
Multimedia Tools and Applications 75 (22), 14089-14109 6 // 2016
Authorized convergent encryption for client-side deduplication
TY Youn, KY Chang, KH Rhee, SU Shin
IT CoNvergence PRActice (INPRA) 4 (2), 9-17 // 2016
Survey on the Key Generation of the Convergent Encryption for Deduplication in Cloud Computing
KW Seong, BD Lee, H Park, SUK Shin
Proceedings of the Korea Information Processing Society Conference, 730-732 // 2015
Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services
H Lee, H Kim, C Seo, SU Shin
Advances in Computer Science and Ubiquitous Computing, 437-443 // 2015
Efficient DRM mechanism of scalable contents based on H. 264/SVC in convergence environment
SW Park, JN Kim, SU Shin
Multimedia tools and applications 73 (2), 841-855 // 2014
A Query Recommending Scheme for an efficient evidence search in e-Discovery
H Lee, S Han, T Lee, SU Shin
16th International Conference on Advanced Communication Technology, 1237-1241 // 2014
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data
T Lee, H Lee, KH Rhee, US Shin
Computer Science and Information Systems 11 (3), 1037-1054 // 2014
Analysis of Accountability for Trust DRM Cloud Service and Design of Monitoring Tool
H Lee, C Seo, SU Shin
Journal of Digital Convergence 12 (12), 303-311 // 2014
DRM Cloud Architecture and Service Scenario for Content Protection.
H Lee, C Seo, SU Shin
J. Internet Serv. Inf. Secur. 3 (3/4), 94-105 // 2013
Implementation and performance of distributed text processing system using hadoop for e-discovery cloud service
T Lee, H Kim, KH Rhee, SU Shin
Journal of Internet Services and Information Security (JISIS) 4 (1), 12-24 // 2013
A Distributed Text Processing System based on Hadoop for Digital Investigation
T Lee, H Kim, C Seo, SU Shin
International Conference on Convergence Technology 2 (1), 257-258 // 2013
DRM Proxy of DRM-as-a-Service for Content Protection
H Lee, W Shin, SU Shin
International Conference on Convergence Technology 2 (1), 287-288 // 2013
Certificate-based proxy re-encryption for public cloud storage
C Sur, Y Park, SU Shin, KH Rhee, C Seo
2013 Seventh International Conference on Innovative Mobile and Internet … // 2013
Methods of performance evaluation on e-Discovery
HM Lee, H Kim, TR Lee, SU Shin
Proceedings of the Korea Information Processing Society Conference, 599-602 // 2013
Design and Implementation of E-Discovery as a Service based on Cloud Computing
T Lee, H Kim, KH Rhee, US Shin
Computer Science and Information Systems 10 (2), 703-724 // 2013
Design and Implementation of DRM Proxy for DRM Cloud Service
H Lee, C Heo, C Seo, SU Shin
KIPS Transactions on Computer and Communication Systems 2 (12), 553-560 // 2013
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs.
Y Park, C Sur, SU Shin, KH Rhee, C Seo
J. UCS 19 (16), 2385-2403 // 2013
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing.
T Lee, H Kim, KH Rhee, SU Shin
J. Internet Serv. Inf. Secur. 2 (3/4), 65-76 // 2012
E-Discovery Process Model and Alternative Technologies for an Effective Litigation Response of the Company
TR Lee, SU Shin
Journal of Digital Convergence 10 (8), 287-297 // 2012
Implementation of fast stream cipher AA128 suitable for real time processing applications
GH Kim, GY Cho, KH Rhee, SU Shin
Journal of the Korea Institute of Information and Communication Engineering … // 2012
Cloud-Based DRM Service Model for Secure Contents Service
H Lee, C Seo, SU Shin
Journal of Digital Convergence 10 (10), 465-473 8 // 2012
A Study on Digital Forensic Software as a Service on Cloud Computing
BM Koo, TR Lee, H Kim, SU Shin
International Conference on Internet & Cloud Computing Technology (ICICCT … // 2012
Efficient e-discovery process utilizing combination method of machine learning algorithms
TR Lee, BM Goo, H Kim, SU Shin
2011 Seventh International Conference on Computational Intelligence and … // 2011
Secure service mechanism of video surveillance system based on h. 264/svc
SW Park, JW Han, SU Shin
ICIMU 2011: Proceedings of the 5th international Conference on Information … // 2011
Load balancing with transmission power control in femtocell networks
K Lee, S Kim, S Lee, J Ma
13th International Conference on Advanced Communication Technology … // 2011
e-Discovery support tool design and implementation of the AGENT module
JY Kim, TR Lee, BM Goo, SU Shin
13th International Conference on Advanced Communication Technology … // 2011
Design and Implementation of a tool for ESI Categorization and Search in e-Discovery
H Kim, TR Lee, SU Shin
Proceedings of the Korea Information Processing Society Conference, 819-822 // 2011
Collection and Analysis of the Digital Evidence for Android and iOS Smart Phones
BM Goo, JY Kim, TR Lee, SU Shin
Journal of the Korea Institute of Information Security & Cryptology 21 (1 … // 2011
Authentication and Copyright Protection Scheme for H. 264/AVC and SVC.
SW Park, SU Shin
J. Inf. Sci. Eng. 27 (1), 129-142 // 2011
A study on e-discovery support tools for information management
TR Lee, JY Kim, BM Goo, SU Shin
한국멀티미디어학회 국제학술대회, 27-30 // 2010
Domain Key Based Efficient Redistribution Mechanism of Scalable Contents
SW Park, SU Shin
Journal of the Korea Institute of Information Security & Cryptology 20 (1 … // 2010
Authentication mechanism for fast handoff in cdma2000-WiBro interworking
JY Kim, SU Shin
Science in China Series F: Information Sciences 53 (1), 137-146 // 2010
An efficient encryption and key management scheme for layered access control of H. 264/scalable video coding
SW Park, SU Shin
IEICE TRANSACTIONS on Information and Systems 92 (5), 851-858 // 2009
An Efficient Authentication Scheme based on Fragile Watermarking for H. 264/AVC and SVC
SW Park, SU Shin
Proceedings of the Korea Information Processing Society Conference, 1486-1488 // 2009
A practical key management scheme using the frame-based features for layered access control of H. 264/SVC
SW Park, D Yi, SU Shin
2008 International Symposium on Information Theory and Its Applications, 1-5 1 // 2008
Efficient selective encryption scheme for the H. 264/scalable video coding (SVC)
SW Park, SU Shin
2008 Fourth International Conference on Networked Computing and Advanced … // 2008
A new forensic image format for high capacity disk storage
SS Lee, TS Park, SU Shin, SK Un, DW Hong
2008 International Conference on Information Security and Assurance (isa … // 2008
Combined scheme of encryption and watermarking in H. 264/Scalable Video Coding (SVC)
SW Park, SU Shin
New Directions in Intelligent Interactive Multimedia, 351-361 // 2008
JOINT OF ENCRYPTION AND FINGERPRINTING IN BUYER-SELLER PROTOCOL
SW Park, TH Lim, JH Lee, HJ Lee, SU Shin
한국멀티미디어학회 국제학술대회, 288-291 // 2007
A Secure DRM Framework for User’s Domain and Key Management
J Lee, S Lee, S Shin
International Conference on Autonomic and Trusted Computing, 420-429 // 2007
Intelligent access control mechanism for ubiquitous applications
TH Lim, SU Shin
6th IEEE/ACIS International Conference on Computer and Information Science … // 2007
A new fingerprinting codes for multimedia contents
JH Lee, TH Lim, KW Kim, SU Shin
International Conference on Multimedia Modeling, 510-519 // 2007
A new fingerprinting codes for multimedia contents
JH Lee, TH Lim, KW Kim, SU Shin
International Conference on Multimedia Modeling, 510-519 // 2007
Intelligent Context-Aware System for Home Automation
SU Shin, TH Lim
The Journal of the Korea Contents Association 7 (4), 74-82 // 2007
Context Aware System for Future Homes
TH Lim, JH Lee, SU Shin
Advances in Intelligent Web Mastering, 210-216 2 // 2007
INTELLIGENT ACCESS CONTROL SCHEME FOR HOME APPLICATIONS
TH Lim, SU Shin
한국멀티미디어학회 국제학술대회, 495-498 // 2006
A viable system for tracing illegal users of video
H Kang, B Kurkoski, Y Park, S Shin, K Yamaguchi, K Kobayashi
International Workshop on Intelligence and Security Informatics, 156-158 // 2006
An efficient sealed-bid auction protocol with two servers
SU Shin
Journal of information science and engineering 22 (6), 1505-1518 // 2006
Steganographic Method on Spatial Domain Using Modular Characteristic
YR Park, SU Shin
Journal of the Korea Institute of Information Security & Cryptology 16 (2 … // 2006
A Study on Steganographic Method for Binary Images
SH Ha, HH Kang, HJ Lee, SU Shin, YR Park
Journal of Korea Multimedia Society 9 (2), 215-225 // 2006
A Study on Digital Watermarking for Copyright Notification and Protection
YR Park, JH Sung, HH Kang, SU Shin
Journal of Korea Multimedia Society 9 (4), 505-514 // 2006
An image steganography using pixel characteristics
YR Park, HH Kang, SU Shin, KR Kwon
International Conference on Computational and Information Science, 581-588 // 2005
A steganographic scheme in digital images using information of neighboring pixels
YR Park, HH Kang, SU Shin, KR Kwon
International Conference on Natural Computation, 962-967 // 2005
A steganographic scheme in digital images using information of neighboring pixels
YR Park, HH Kang, SU Shin, KR Kwon
International Conference on Natural Computation, 962-967 // 2005
Video fingerprinting system using wavelet and error correcting code
H Kang, B Kurkoski, Y Park, H Lee, S Shin, K Yamaguchi, K Kobayashi
International Workshop on Information Security Applications, 150-164 // 2005
Other Applications of Natural Computation-A Steganographic Scheme in Digital Images Using Information of Neighboring Pixels
YR Park, HH Kang, SU Shin, KR Kwon
Lecture Notes in Computer Science 3612, 962-967 // 2005
Watermarking and Information Hiding-An Image Steganography Using Pixel Characteristics
YR Park, HH Kang, SU Shin, KR Kwon
Lecture Notes in Computer Science 3802, 581-588 // 2005
A Novel Blind Watermarking Scheme Using Block Indexing
HH Kang, SU Shin, SW Han
The Journal of the Korea Contents Association 5 (6), 331-342 // 2005
A simplified approach to user controllable threshold signatures
JP Yang, SU Shin, KH Rhee
Proceedings. IEEE International Conference on e-Commerce Technology, 2004 … // 2004
Provable Security of 3GPP Integrity Algorithm f9
D Hong, SU Shin, H Ryu, KI Chung
The KIPS Transactions: PartC 9 (4), 573-580 // 2002
Provable security of KASUMI and 3GPP encryption mode f8
JS Kang, SU Shin, D Hong, O Yi
International Conference on the Theory and Application of Cryptology and … // 2001
A new design of the hash functions with all-or-nothing property
SU Shin, KH Rhee
Journal of Information Science and Engineering 17 (6), 945-957 2 // 2001
A new design of the hash functions with all-or-nothing property
SU Shin, KH Rhee
Journal of Information Science and Engineering 17 (6), 945-957 2 // 2001
OFB 모드와 3GPP f8 암호화 모드의 안전성
신상욱, 홍도원, 강주성, 이옥연
정보보호학회논문지 11 (4), 55-66 // 2001
3GPP MAC 알고리즘 안전성 분석
홍도원, 신상욱, 강주성, 이옥연
정보보호학회논문지 11 (2), 59-65 // 2001
A fast asymmetric key encryption algorithm for bulk data
SU Shin, KH Rhee
Journal of applied mathematics & informatics 8 (3), 943-957 // 2001
All-or-nothing transform and remotely keyed encryption protocols
SU Shin, W Shin, KH Rhee
International Workshop on Public Key Cryptography, 178-195 // 2000
A secrecy scheme for MPEG video data using the joint of compression and encryption
SU Shin, KS Sim, KH Rhee
International Workshop on Information Security, 191-201 // 1999
Hash functions and the MAC using all-or-nothing property
SU Shin, KH Rhee, JW Yoon
International Workshop on Public Key Cryptography, 263-275 // 1999
A new hash function based on MDx-family and its application to MAC
SU Shin, KH Rhee, DH Ryu, SJ Lee
International Workshop on Public Key Cryptography, 234-246 // 1998
A Variable Length Block Algorithm with Double Involution-BADI
IS Lee, KS Sim, HJ Kim, W Shin, SU Shin, KH Rhee
Proceedings of the Korea Multimedia Society Conference, 216-221 // 1998
A Statistical Test for the Nonlinear Combiner Logic
DO Sung, SU Shin, KH Rhee
The Transactions of the Korea Information Processing Society 3 (2), 225-230 // 1996