Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Hyunsoo Kwon"'
Autor:
Kyeong-Hwa Kim, Hyunsoo Kwon
Publikováno v:
Social Sciences, Vol 12, Iss 10, p 580 (2023)
In order to better understand how Korean American students with disabilities go through transitions and how education and services can more effectively target them, this study was designed to examine Korean American parents’ perceptions of transiti
Externí odkaz:
https://doaj.org/article/15b42eed0e5a4c9baf7514caded3bfdd
Publikováno v:
IEEE Access, Vol 10, Pp 75604-75618 (2022)
Range query on encrypted data has been widely studied to achieve fast query processing while keeping data and queries secret. Prior work hides even the ordering information of the data, but sacrifices accuracy (e.g., false positives) and efficiency (
Externí odkaz:
https://doaj.org/article/604c07ea45974ef9b51cba04cc3cfaa1
Publikováno v:
IEEE Access, Vol 10, Pp 70078-70091 (2022)
Bitcoin is the most widely used cryptocurrency for illegal trade in current darknet markets. Owing to the anonymity of its addresses, even though transaction flows are globally visible, Bitcoin clustering remains one of the most challenging and open
Externí odkaz:
https://doaj.org/article/42fe98fd882d4879b472830321c712b7
Autor:
Hyunsoo Kwon, Changhee Hahn
Publikováno v:
IEEE Access, Vol 10, Pp 101957-101971 (2022)
Privacy-preserving similarity search is a method of data retrieval from potentially untrusted hosts based on the similarity between encrypted data items. In this setting, a major concern is how to support searches when multiple users (multireader) re
Externí odkaz:
https://doaj.org/article/45472f78d19745a19a93fa1f0d592c5b
Autor:
Kyeonghwa Kim, Hyunsoo Kwon
Publikováno v:
The Journal of Humanities and Social sciences 21. 14:11-24
Publikováno v:
SERVICES
Public auditing enables efficient integrity checks of data assigned to cloud servers. In this paper, we revisit the public auditing for encrypted data, in which a major concern is how to effectively support data dynamics, i.e., data modification, ins
Publikováno v:
IEEE Transactions on Cloud Computing. 10:1008-1020
Cloud-based Internet of Things (IoT) management services are a promising means of ingesting data from globally dispersed devices. In this setting, it is important to regulate access to data managed by potentially untrusted cloud servers. Attribute-ba
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-13
Autor:
Kyeong-Hwa Kim, Hyunsoo Kwon
Publikováno v:
Journal of special education : theory and practice. 21:83-106
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:1204-1215
HyperText Transfer Protocol (HTTP) cookies are widely used on the web to enhance communication efficiency between a client and a server by storing stateful information. However, cookies may contain private and sensitive information about users. Thus,