default search action
Sang-Uk Shin
Person information
- affiliation: Pukyong National University, Department of Information Security, Busan, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j22]Mi Hyeon Jeon, Sang Uk Shin:
Blockchain-based fair and secure protocol for decentralized data trading. J. Internet Serv. Inf. Secur. 12(3): 30-48 (2022) - 2021
- [j21]Seolah Jang, Sandi Rahmadika, Sang Uk Shin, Kyung-Hyune Rhee:
PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments. IEICE Trans. Inf. Syst. 104-D(11): 1839-1849 (2021) - [j20]Kang Woo Cho, Byeong-Gyu Jeong, Sang Uk Shin:
Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data. IEICE Trans. Inf. Syst. 104-D(11): 1857-1868 (2021) - 2020
- [j19]Si-Wan Noh, Sang-Uk Shin, Kyung-Hyune Rhee:
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network. Secur. Commun. Networks 2020: 8891183:1-8891183:13 (2020) - [j18]Byeong-Gyu Jeong, Taek-Young Youn, Nam-Su Jho, Sanguk Shin:
Blockchain-Based Data Sharing and Trading Model for the Connected Car. Sensors 20(11): 3141 (2020)
2010 – 2019
- 2019
- [j17]Juyoung Kim, Kwantae Cho, Yong-Kyun Kim, Kyung-Soo Lim, Sang Uk Shin:
Study on peak misdetection recovery of key exchange protocol using heartbeat. J. Supercomput. 75(6): 3288-3301 (2019) - [j16]Taek-Young Youn, Nam-Su Jho, Kyung Hyune Rhee, Sang-Uk Shin:
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage. Wirel. Commun. Mob. Comput. 2019: 7840917:1-7840917:11 (2019) - 2018
- [j15]Taek-Young Youn, Ku-Young Chang, Kyung-Hyune Rhee, Sang-Uk Shin:
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage. IEEE Access 6: 26578-26587 (2018) - [j14]Ji-Sun Park, Taek-Young Youn, Hye-Bin Kim, Kyung-Hyune Rhee, Sang-Uk Shin:
Smart Contract-Based Review System for an IoT Data Marketplace. Sensors 18(10): 3577 (2018) - [c21]Juyoung Kim, Kwantae Cho, Yong-Kyun Kim, Kyung-Soo Lim, Sang Uk Shin:
A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange. MUE/FutureTech 2018: 353-358 - [c20]Juyoung Kim, Kwantae Cho, Sang Uk Shin:
A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram. MUE/FutureTech 2018: 359-365 - 2016
- [j13]Hyejoo Lee, Suwan Park, Changho Seo, Sang-Uk Shin:
DRM cloud framework to support heterogeneous digital rights management systems. Multim. Tools Appl. 75(22): 14089-14109 (2016) - 2015
- [c19]Hyejoo Lee, Hyunil Kim, Changho Seo, Sang-Uk Shin:
Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services. CSA/CUTE 2015: 437-443 - 2014
- [j12]Tae Rim Lee, Hyejoo Lee, Kyung Hyune Rhee, Sang-Uk Shin:
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data. Comput. Sci. Inf. Syst. 11(3): 1037-1054 (2014) - [j11]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Performance of Distributed Text Processing System Using Hadoop. J. Internet Serv. Inf. Secur. 4(1): 12-24 (2014) - [j10]Su-Wan Park, Jeong-Nyeo Kim, Sang-Uk Shin:
Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment. Multim. Tools Appl. 73(2): 841-855 (2014) - 2013
- [j9]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Design and implementation of E-discovery as a service based on cloud computing. Comput. Sci. Inf. Syst. 10(2): 703-724 (2013) - [j8]Hyejoo Lee, Changho Seo, Sang-Uk Shin:
DRM Cloud Architecture and Service Scenario for Content Protection. J. Internet Serv. Inf. Secur. 3(3/4): 94-105 (2013) - [j7]Youngho Park, Chul Sur, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs. J. Univers. Comput. Sci. 19(16): 2385-2403 (2013) - [c18]Chul Sur, Youngho Park, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:
Certificate-Based Proxy Re-encryption for Public Cloud Storage. IMIS 2013: 159-166 - 2012
- [j6]Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing. J. Internet Serv. Inf. Secur. 2(3/4): 65-76 (2012) - 2011
- [j5]Su-Wan Park, Sang-Uk Shin:
Authentication and Copyright Protection Scheme for H.264/AVC and SVC. J. Inf. Sci. Eng. 27(1): 129-142 (2011) - [c17]Taerim Lee, Bon Min Goo, Hun Kim, Sang-Uk Shin:
Efficient e-Discovery Process Utilizing Combination Method of Machine Learning Algorithms. CIS 2011: 1109-1113 - 2010
- [j4]Dowon Hong, Je Yoon Kim, Sang-Uk Shin:
Authentication mechanism for fast handoff in cdma2000-WiBro interworking. Sci. China Inf. Sci. 53(1): 137-146 (2010)
2000 – 2009
- 2009
- [j3]Su-Wan Park, Sang-Uk Shin:
An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding. IEICE Trans. Inf. Syst. 92-D(5): 851-858 (2009) - 2008
- [c16]Su-Wan Park, Sang-Uk Shin:
Efficient Selective Encryption Scheme for the H.264/Scalable Video Coding(SVC). NCM (1) 2008: 371-376 - [p1]Su-Wan Park, Sang-Uk Shin:
Combined Scheme of Encryption and Watermarking in H.264/Scalable Video Coding (SVC). New Directions in Intelligent Interactive Multimedia 2008: 351-361 - 2007
- [c15]Tae-Hum Lim, Sang-Uk Shin:
Intelligent Access Control Mechanism for Ubiquitous Applications. ACIS-ICIS 2007: 955-960 - [c14]Jin-Heung Lee, Sanggon Lee, Sanguk Shin:
A Secure DRM Framework for User's Domain and Key Management. ATC 2007: 420-429 - [c13]Tae-Hum Lim, Jin-Heung Lee, Sang-Uk Shin:
Context Aware System for Future Homes. AWIC 2007: 210-216 - [c12]Jin-Heung Lee, Tea-Hun Lim, Keon-Woo Kim, Sang-Uk Shin:
A New Fingerprinting Codes for Multimedia Contents. MMM (2) 2007: 510-519 - 2006
- [j2]Sang-Uk Shin:
An Efficient Sealed-Bid Auction Protocol with Two Servers. J. Inf. Sci. Eng. 22(6): 1505-1518 (2006) - [c11]Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi:
A Viable System for Tracing Illegal Users of Video. WISI 2006: 156-158 - 2005
- [c10]Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon:
An Image Steganography Using Pixel Characteristics. CIS (2) 2005: 581-588 - [c9]Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon:
A Steganographic Scheme in Digital Images Using Information of Neighboring Pixels. ICNC (3) 2005: 962-967 - [c8]Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi:
Video Fingerprinting System Using Wavelet and Error Correcting Code. WISA 2005: 150-164 - 2004
- [c7]Jong-Phil Yang, Sang-Uk Shin, Kyung Hyune Rhee:
A Simplified Approach to User Controllable Threshold Signatures. CEC 2004: 273-280 - 2001
- [j1]Sang-Uk Shin, Kyung Hyune Rhee:
A New Design of the Hash Functions With All-or-Nothing Property. J. Inf. Sci. Eng. 17(6): 945-957 (2001) - [c6]Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi:
Provable Security of KASUMI and 3GPP Encryption Mode f8. ASIACRYPT 2001: 255-271 - 2000
- [c5]Sang-Uk Shin, Weon Shin, Kyung Hyune Rhee:
All-or-Nothing Transform and Remotely Keyed Encription Protocols. Public Key Cryptography 2000: 178-195
1990 – 1999
- 1999
- [c4]Sang-Uk Shin, Kyeong Seop Sim, Kyung Hyune Rhee:
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption. ISW 1999: 191-201 - [c3]Sang-Uk Shin, Kyung Hyune Rhee, Jae Woo Yoon:
Hash Functions and the MAC Using All-or-Nothing Property. Public Key Cryptography 1999: 263-275 - 1998
- [c2]Jae Woo Yoon, Sang-Uk Shin, Kyung Hyune Rhee:
A secure hash function based on cellular automata. ICISC 1998: 93-105 - [c1]Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee:
A New Hash Function Based on MDx-Family and Its Application to MAC. Public Key Cryptography 1998: 234-246
Coauthor Index
aka: Kyung-Hyune Rhee
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint