Search

Your search keyword '"Youngjoo Shin"' showing total 39 results

Search Constraints

Start Over You searched for: Author "Youngjoo Shin" Remove constraint Author: "Youngjoo Shin" Topic computer science Remove constraint Topic: computer science
39 results on '"Youngjoo Shin"'

Search Results

1. Multibyte Microarchitectural Data Sampling and its Application to Session Key Extraction Attacks

2. Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks

4. Constructing Covert Channel on Intel CPU-iGPU platform

5. Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks

6. Return of version downgrade attack in the era of TLS 1.3

7. Software-based Random Number Generators for Resource Constrained Devices

8. POSTER: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment

9. Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization

10. On the Security of Practical Mail User Agents against Cache Side-Channel Attacks

11. Reinforcing Meltdown Attack by Using a Return Stack Buffer

12. Lightweight and Seamless Memory Randomization for Mission-Critical Services in a Cloud Platform

13. Breaking KASLR Using Memory Deduplication in Virtualized Environments

14. Cache Side-Channel Attack on Mail User Agent

15. Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments

16. FPGA reverse engineering in Vivado design suite based on X-ray project

17. Real-Time Detection on Cache Side Channel Attacks using Performance Counter Monitor

18. High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer

19. A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems

20. CLDSafe: An Efficient File Backup System in Cloud Storage against Ransomware

21. Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience

22. Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage

23. Privacy-Preserving and Updatable Block-Level Data Deduplication in Cloud Storage Services

24. Secure proof of storage with deduplication for cloud storage systems

25. Information Dispersal Algorithm and Proof of Ownership for Data Deduplication in Dispersed Storage Systems

26. An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability

27. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

28. Practical Data Outsourcing Framework with Provably Secure Deduplication in Untrusted Remote Storage

29. Differentially private client-side data deduplication protocol for cloud storage services

30. Efficient and Secure File Deduplication in Cloud Storage

31. SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage

32. A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing

33. Scalable and efficient approach for secure group communication using proxy cryptography

34. Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage

35. MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking

36. Privacy-Preserving Smart Metering with Authentication in a Smart Grid

37. Scalable and efficient approach for secure group communication

38. An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks

39. Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs

Catalog

Books, media, physical & digital resources