Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 103
1.
  • Combinatorial Subset Differ... Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast Encryption
    Lee, Jiwon; Lee, Seunghwa; Kim, Jihye ... Sensors, 06/2020, Volume: 20, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    In the Internet of Things (IoT) systems, it is often required to deliver a secure message to a group of devices. The public key broadcast encryption is an efficient primitive to handle IoT ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
2.
  • Azeroth: Auditable Zero-Kno... Azeroth: Auditable Zero-Knowledge Transactions in Smart Contracts
    Jeong, Gweonho; Lee, Nuri; Kim, Jihye ... IEEE access, 2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    With the rapid growth of the blockchain market, privacy and security issues for digital assets are becoming more important. In the most widely used public blockchains, such as Bitcoin and Ethereum, ...
Full text
Available for: NUK, UL, UM, UPUK
3.
  • Forward-Secure Multi-User A... Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs
    Lee, Jeonghyuk; Kim, Jihye; Oh, Hyunok IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    As a solution to mitigate the key exposure problems in the digital signature, the forward security has been proposed. The forward security guarantees the integrity of the messages generated in the ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
4.
  • Simulation-Extractable zk-S... Simulation-Extractable zk-SNARK with a Single Verification
    Kim, Jihye; Lee, Jiwon; Oh, Hyunok IEEE access, 01/2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Among the zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK), the simulation-extractable zk-SNARK (SE-SNARK) introduces a security notion of non-malleability. The existing ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
5.
  • Practical Verifiable Comput... Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment
    Lee, Junghee; Nicopoulos, Chrysostomos; Jeong, Gweonho ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The verifiable computation paradigm has been studied extensively as a means to verifying the result of outsourced computation. In said scheme, the verifier requests computation from the prover and ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
6.
  • An Efficient Non-Linear Cos... An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory
    Oh, Hyunok; Kim, Jihye IEEE transactions on computers, 04/2014, Volume: 63, Issue: 4
    Journal Article
    Peer reviewed

    This paper defines a non-linear cost compression problem, proposes an efficient algorithm, and applies it to a real application of multi level cell memory to minimize energy consumption and latency. ...
Full text
Available for: IJS, NUK, UL
7.
  • A Hardware-Based Correct Execution Environment Supporting Virtual Memory
    Lee, Daehyeon; Shin, Ohsuk; Cha, Yeonghyeon ... IEEE access, 2024, Volume: 12
    Journal Article
    Peer reviewed
    Open access

    The rapid increase in data generation has led to outsourcing computation to cloud service providers, allowing clients to handle large tasks without investing resources. However, this brings up ...
Full text
Available for: NUK, UL, UM, UPUK
8.
  • Hierarchical dataflow modeling of iterative applications
    Hyesun Hong; Hyunok Oh; Soonhoi Ha 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC), 2017-June
    Conference Proceeding

    Even though dataflow models are good at exploiting task-level parallelism of an application, it is difficult to exploit the parallelism of loop structures since they are not explicitly specified in ...
Full text
Available for: IJS, NUK, UL, UM
9.
  • FAS: Forward secure sequent... FAS: Forward secure sequential aggregate signatures for secure logging
    Kim, Jihye; Oh, Hyunok Information sciences, January 2019, 2019-01-00, Volume: 471
    Journal Article
    Peer reviewed

    Audit logs are an elemental part of computer systems due to their forensic value. Safeguarding audit logs on a physically unprotected machine are a challenging work, especially in the presence of ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • Optimal Checkpoint Selectio... Optimal Checkpoint Selection with Dual-Modular Redundancy Hardening
    Kang, Shin-Haeng; Park, Hae-Woo; Kim, Sungchan ... IEEE transactions on computers, 2015-July-1, 2015-7-1, 20150701, Volume: 64, Issue: 7
    Journal Article
    Peer reviewed

    With the continuous scaling of semiconductor technology, failure rate is increasing significantly so that reliability becomes an important issue in multiprocessor system-on-chip (MPSoC) design. We ...
Full text
Available for: IJS, NUK, UL
1 2 3 4 5
hits: 103

Load filters