1 |
Namje Park, Marie Kim, "Implementation of load management application system using smart grid privacy policy in energy management service environment", Cluster Computing, 17(3), pp. 653-664, Sep. 2014.
DOI
|
2 |
Donghyeok Lee, Namje Park, "Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance", The Journal of Supercomputing, pp.1-16, 2016.
|
3 |
Namje Park, Hongxin Hu, Qun Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)", International Journal of Distributed Sensor Networks, 2016, 2016.
|
4 |
F. Dufaux, T. Ebrahimi, "Scrambling for Privacy Protection in Video Surveillance Systems," IEEE Trans. on Circuits and Systems for Video Technology, 18(8), pp. 1168-1174, 2008.
DOI
|
5 |
P. Agrawal, P.J. Narayanan, "Person De-identification in Videos," IEEE Trans. on Circuits and Systems for Video Technology. 21(3), pp. 299-310, 2011.
DOI
|
6 |
F. Dufaux, T. Ebrahimi, "A Framework for the Validation of Privacy Protection Solutions in Video Surveillance," IEEE International Conference on Multimedia and Expo (ICME), pp. 66-71, 2010.
|
7 |
E. M. Newton, et. al., "Preserving Privacy by De-identifyuing Face Images," IEEE Trans. on Knowledge and Data Engineering, 17(2), pp. 232-243, 2005.
DOI
|
8 |
Cha Gun Sang, Shin Yong Tae, "Personal Video Privacy Issue to Increasing CCTV Installation," Journal of Computing Science and Engineering, 27(12), 2009.
|
9 |
F. Peng, X. Zhu, M. Long, "A ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos," P. Agrawal, P.J. Narayanan, IEEE Trans. on Information Forensics and Security, 8(10), pp.1688-1699, 2013.
DOI
|
10 |
D. A. Rodriguez-Silva, L. Adkinson-Orellana, F. J. Gonzalez-Castano, I. Armino-Franco, "Video surveillance based on cloud storage", 2012 IEEE Fifth International Conference on Cloud Computing, pp. 991-992, 2012.
|
11 |
Lee D, Park N, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment", Personal and Ubiquitous Computing, DOI 101007/s00779-017-1017-1, 2017.
|
12 |
Donghyeok Lee, Namje Park, "A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud", Journal of the Korea Institute of Information Security & Cryptology, 26(4), pp. 929-940, Aug. 2016.
DOI
|
13 |
Donghyeok Lee, Namje Park, "A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud", Journal of the Korea Institute of Information Security & Cryptology, 26(4), pp. 929-940, Aug. 2016.
DOI
|
14 |
Namje Park and Namhi Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle", Sensors, 16(1), pp. 1-16, Dec. 2015.
DOI
|
15 |
Agrawal, Rakesh, et al. "Order preserv- ing encryption for numeric data." Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004.
|
16 |
Dongkook Kim, Hyeok Lee, "Personal Information De-Idenification Trends based on Big Data", Review of Korean Society for Internet Information, 16(2), pp.15-22, Dec. 2015.
|
17 |
Donghyeok Lee, Namje Park, "A Study on Metering Data De-identification Method for Smart Grid Privacy Protection",Korea Institute of Information Security and Cryptology, 26(6), pp.1593-1603, Dec. 2016.
DOI
|
18 |
Aiden A. Bruen and Mario A. Forcinito, "Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century", John Wiley & Sons, Inc., 2005
|