Zobrazeno 1 - 10
of 83
pro vyhledávání: '"SooHyung Kim"'
Publikováno v:
IEEE Access, Vol 12, Pp 16462-16473 (2024)
Recently, Chait et al. proposed a new aggregate signature scheme under the RSA setting (IEEE Access, 2023). In this paper, we show that Chait et al.’s aggregate signature scheme is insecure when two signers collude with their own secret keys, by pr
Externí odkaz:
https://doaj.org/article/9953a73a23784166b8158a4038691aea
Publikováno v:
IEEE Access, Vol 11, Pp 86754-86769 (2023)
Federated learning is a promising approach for training machine learning models using distributed data from multiple mobile devices. However, privacy concerns arise when sensitive data are used for training. In this paper, we discuss the challenges o
Externí odkaz:
https://doaj.org/article/ea49f310cfa94e868bf3ba0f1f74ca1c
Publikováno v:
IEEE Access, Vol 11, Pp 30970-30981 (2023)
In this study, we proposed a multitask network architecture for three attributes, landmark, head pose, and occlusion, from a face image. A 2-stacked hourglass with three task-specific heads is the proposed network architecture. We also designed three
Externí odkaz:
https://doaj.org/article/f33122bfcaa9457391a524d80310f93c
Publikováno v:
IEEE Access, Vol 10, Pp 133206-133218 (2022)
Recently, threshold ECDSA schemes have received much attention from the security community, due to the need of efficient key management in the blockchain system. For the practical use of threshold cryptosystem, a key recovery protocol is essential fo
Externí odkaz:
https://doaj.org/article/66dbf39501124a1ab456aed2b16391c8
Publikováno v:
IEEE Access, Vol 9, Pp 62038-62042 (2021)
An identity-based revocation (IBR) scheme is a useful one-to-many cryptographic message transmission method in which a message can be encrypted using receivers’ identities such as e-mail addresses as public keys and a trusted message sender who hol
Externí odkaz:
https://doaj.org/article/8d806e5d81e04f69ab52d104427e2651
Publikováno v:
IEEE Access, Vol 8, Pp 83248-83264 (2020)
With the popularization of smart devices, companies are adopting bring-your-own-device or mobile office policies that utilize personal smart devices for work. However, as work data are stored on individual smart devices, critical security threats are
Externí odkaz:
https://doaj.org/article/ed77631501114f76bb3ec3a449a3fcea
Publikováno v:
IEEE Access, Vol 7, Pp 69892-69906 (2019)
Fuzzy authentication uses non-deterministic or noisy data, like biometrics, as an authentication factor. Although the data is extracted from the same individual or source, it can be different for each measurement. As a result, one of the main issues
Externí odkaz:
https://doaj.org/article/b86eb9b270594a9ebe7e2a1519c52aa0
Publikováno v:
BMC Medical Informatics and Decision Making, Vol 17, Iss 1, Pp 1-12 (2017)
Abstract Background Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to ano
Externí odkaz:
https://doaj.org/article/25f4e892c58a4acbbc1af6c761b48de3
Autor:
Soohyung Kim, Chang Gyu Choi
Publikováno v:
The Journal of Korea Real Estate Analysists Association. 29:37-58
Autor:
Soohyung Kim, Yeosong Yoon
Publikováno v:
Journal of Corporate Accounting & Finance.