Search Results - "Seo, Minhye"
-
1
Fair and Secure Multi-Party Computation with Cheater Detection
Published in Cryptography (01-09-2021)“…Secure multi-party computation (SMC) is a cryptographic protocol that allows participants to compute the desired output without revealing their inputs. A…”
Get full text
Journal Article -
2
Functional encryption for set intersection in the multi-client setting
Published in Designs, codes, and cryptography (01-01-2022)“…Functional encryption for set intersection (FE-SI) in the multi-client environment is that each client i encrypts a set X i associated with time T by using its…”
Get full text
Journal Article -
3
Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management
Published in Applied sciences (01-12-2023)“…Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data…”
Get full text
Journal Article -
4
Enhanced Authentication for Decentralized IoT Access Control Architecture
Published in Cryptography (01-09-2023)“…The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people,…”
Get full text
Journal Article -
5
Guidelines for the Design of Solid CO2 Adsorbents for Mobile Carbon Capture in Heavy-Duty Vehicles: A Review
Published in The Korean journal of chemical engineering (01-01-2024)“…The transportation sector is the largest contributor to carbon dioxide (CO 2 ) emissions, largely due to heavy-duty vehicles (HDVs) that inevitably rely on…”
Get full text
Journal Article -
6
Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System
Published in Journal of advanced transportation (01-01-2018)“…Passive keyless entry and start system has been widely used in modern cars. Car owners can open the door or start the engine merely by having the key in their…”
Get full text
Journal Article -
7
Optimization of Operating Conditions for CO2 Methanation Process Using Design of Experiments
Published in Energies (Basel) (01-12-2021)“…In this study, the Taguchi experimental design method using an L16 orthogonal array was attempted in order to investigate the optimal operating conditions for…”
Get full text
Journal Article -
8
Recycling of Cement Kiln Dust as a Raw Material for Cement
Published in Environments (Basel, Switzerland) (01-10-2019)“…Cement kiln dust (CKD) is a major by-product of cement manufacturing and has the potential to be recycled as a raw material if the high concentrations of…”
Get full text
Journal Article -
9
An Improved Fuzzy Vector Signature with Reusability
Published in Applied sciences (01-10-2020)“…Fuzzy vector signature (FVS) is a new primitive where a fuzzy (biometric) data w is used to generate a verification key (VKw), and, later, a distinct fuzzy…”
Get full text
Journal Article -
10
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication
Published in IEEE access (2019)“…Fuzzy authentication uses non-deterministic or noisy data, like biometrics, as an authentication factor. Although the data is extracted from the same…”
Get full text
Journal Article -
11
Effect of NF3 Gas on Stabilization of Alkaline Earth Metal-CU Mordenite Catalysts During N2O Decomposition Reaction
Published in Archives of metallurgy and materials (01-01-2019)“…Mordenite-zeolite supported Ca-Cu and Ba-Cu catalysts (Ca-Cu/MOR and Ba-Cu MOR) were successfully fabricated for direct decomposition of both NF3 and N2O gases…”
Get full text
Journal Article -
12
Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing
Published in IEEE transactions on intelligent transportation systems (01-09-2022)“…As autonomous driving technology continues to develop, communication for vehicles is becoming more important to provide an efficient and secure driving…”
Get full text
Journal Article -
13
P‐13.2: Low‐Temperature Cross‐linkable Small Molecules for Fully Solution‐Processed Multilayer OLEDs
Published in SID International Symposium Digest of technical papers (01-09-2019)Get full text
Journal Article -
14
Design and assessment of a novel mobile carbon capture system: Energy and exergy analyses
Published in Energy conversion and management (15-01-2024)“…•System description and simulation.•Energy and exergy analyses of various MCC systems.•Comparison of various systems in terms of SEC.•Analysis of sensitivity…”
Get full text
Journal Article -
15
New technique for chosen-ciphertext security based on non-interactive zero-knowledge
Published in Information sciences (01-07-2019)“…In this study, we propose a new method for conversion from a one-way (OW)-secure key encapsulation mechanism (KEM) into a chosen-ciphertext (CCA) secure KEM in…”
Get full text
Journal Article -
16
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method
Published in International journal of information security (01-08-2020)“…Lattice-based cryptography is a promising candidate for post-quantum cryptosystems, and a large amount of research has been conducted on learning with errors…”
Get full text
Journal Article -
17
Highly stable barium zirconate supported nickel oxide catalyst for dry reforming of methane: From powders toward shaped catalysts
Published in International journal of hydrogen energy (14-06-2018)“…We report the barium zirconate supported NiOx catalysts (NiOx/BZO) for dry reforming of methane and feasibility test for their industrial application by using…”
Get full text
Journal Article -
18
Synthesis and characterization of electroactive polymers containing carbazole and harmane groups
Published in Molecular Crystals and Liquid Crystals (11-02-2018)“…We have synthesized three types of polymers: carbazole (P1), norharmane (P2), and carbazole and harmane copolymer (P3). The optical properties and…”
Get full text
Journal Article -
19
Construction of a New Biometric-Based Key Derivation Function and Its Application
Published in Security and communication networks (01-01-2018)“…Biometric data is user-identifiable and therefore methods to use biometrics for authentication have been widely researched. Biometric cryptosystems allow for a…”
Get full text
Journal Article