Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Changhee Hahn"'
Publikováno v:
IEEE Access, Vol 11, Pp 146223-146237 (2023)
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stro
Externí odkaz:
https://doaj.org/article/f83ed0aac89a4aa2b17e7d2daf8908a5
Autor:
Jaehwan Park, Changhee Hahn
Publikováno v:
IEEE Access, Vol 11, Pp 89409-89422 (2023)
Machine learning is widely used for autonomous driving because it can recognize surrounding circumstances feasibly from sensor and determine appropriate actions. Most of these sensors are based on micro-electro-mechanical systems (MEMS), which enable
Externí odkaz:
https://doaj.org/article/e402433c413e414ca37cd17a28c00dc0
Publikováno v:
Applied Sciences, Vol 14, Iss 6, p 2287 (2024)
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations. A major security concern in DSSE is how to preserve forward and backward privacy, whi
Externí odkaz:
https://doaj.org/article/734557aceed8449a8ec3bc0b74643465
Publikováno v:
IEEE Access, Vol 10, Pp 75604-75618 (2022)
Range query on encrypted data has been widely studied to achieve fast query processing while keeping data and queries secret. Prior work hides even the ordering information of the data, but sacrifices accuracy (e.g., false positives) and efficiency (
Externí odkaz:
https://doaj.org/article/604c07ea45974ef9b51cba04cc3cfaa1
Autor:
Hyunsoo Kwon, Changhee Hahn
Publikováno v:
IEEE Access, Vol 10, Pp 101957-101971 (2022)
Privacy-preserving similarity search is a method of data retrieval from potentially untrusted hosts based on the similarity between encrypted data items. In this setting, a major concern is how to support searches when multiple users (multireader) re
Externí odkaz:
https://doaj.org/article/45472f78d19745a19a93fa1f0d592c5b
Autor:
Changhee Hahn, Junbeom Hur
Publikováno v:
ICT Express, Vol 2, Iss 3, Pp 135-139 (2016)
With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identificati
Externí odkaz:
https://doaj.org/article/3dd3a50e9a624364bc820a0de9adfef5
Publikováno v:
Applied Sciences, Vol 10, Iss 21, p 7842 (2020)
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries
Externí odkaz:
https://doaj.org/article/e9a1e8aaacd74048b2e1cb63e37caef4
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:36-52
In privacy-preserving cross-device federated learning, users train a global model on their local data and submit encrypted local models, while an untrusted central server aggregates the encrypted models to obtain an updated global model. Prior work h
Publikováno v:
IEEE Transactions on Information Forensics and Security. 18:1169-1181
Autor:
Changhee Hahn, Jongkil Kim
Publikováno v:
IEEE Internet of Things Journal. 9:22559-22570