Name
Papers
Collaborators
HYEONG-IL KIM
25
20
Citations 
PageRank 
Referers 
74
11.46
172
Referees 
References 
407
224
Search Limit
100407
Title
Citations
PageRank
Year
A secure kNN query processing algorithm using homomorphic encryption on outsourced database40.402019
An efficient key management scheme for user access control in outsourced databases.10.362017
A Privacy-Presering Knn Classification Algorithm Using Yao'S Garbled Circuit On Cloud Computing00.342017
Development Of A Cubrid-Based Distributed Parallel Query Processing System00.342017
Efficient and secure top-k query processing algorithm using garbled circuit based secure protocols on outsourced databases.00.342016
A kNN query processing algorithm using a tree index structure on the encrypted database20.412016
Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data70.732016
A Range Query Processing Algorithm Hiding Data Access Patterns In Outsourced Database Environment10.362016
A Privacy-Preserving Top-k Query Processing Algorithm in the Cloud Computing.00.342016
A New Middleware for Distributed Data Processing in CUBRID DBMS00.342015
A hierarchical CRT-based user access control scheme using resource set tree on the cloud system10.352015
A Signature-Based Data Security Technique For Energy-Efficient Data Aggregation In Wireless Sensor Networks40.402014
A New Spatial Transformation Scheme For Preventing Location Data Disclosure In Cloud Computing30.392014
A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases00.342014
Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data100.612014
Linear Function Based Transformation Scheme for Preserving Database Privacy in Cloud Computing10.352013
k-Nearest Neighbor Query Processing Algorithms for a Query Region in Road Networks50.412013
Performance Analysis of MapReduce-Based Distributed Systems for Iterative Data Processing Applications.00.342013
A New Grid-Based Cloaking Scheme for Continuous Queries in Centralized LBS Systems.10.362013
Grid-based cloaking area creation scheme supporting continuous location-based services120.662012
A Grid-Based Cloaking Scheme for Continuous Queries in Distributed Systems20.392011
A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based Services60.492009
An Efficient High-Dimensional Indexing Scheme Using a Clustering Technique for Content-Based Retrieval00.342009
Concurrent error detection in self-timed VLSI101.371994
VLSI implementation of a self-checking self-exercising memory system40.721991