default search action
Hyeong-Il Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j8]Hyeong-Il Kim, Hyeong-Jin Kim, Jae-Woo Chang:
A secure kNN query processing algorithm using homomorphic encryption on outsourced database. Data Knowl. Eng. 123 (2019) - 2017
- [j7]Hyeong-Il Kim, HyeonSik Yang, Min Yoon, Jae-Woo Chang:
Development of a CUBRID-Based Distributed Parallel Query Processing System. J. Inf. Process. Syst. 13(3): 518-532 (2017) - [j6]Seung-Tae Hong, Hyeong-Il Kim, Jae-Woo Chang:
An efficient key management scheme for user access control in outsourced databases. World Wide Web 20(3): 467-490 (2017) - [c16]Hyeong-Jin Kim, Hyeong-Il Kim, Jae-Woo Chang:
A Privacy-Preserving kNN Classification Algorithm Using Yao's Garbled Circuit on Cloud Computing. CLOUD 2017: 766-769 - [c15]Hyunjo Lee, Hyeong-Jin Kim, Jae-Woo Chang, Hyeong-Il Kim:
Bitmap-based distributed index structure and encrypted query processing schemes for outsourcing mobile sensitive data. BigComp 2017: 288-295 - 2016
- [j5]Hyeong-Il Kim, Seung-Tae Hong, Jae-Woo Chang:
Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl. Eng. 104: 32-44 (2016) - [c14]Hyeong-Il Kim, Hyeong-Jin Kim, Jae-Woo Chang:
A kNN query processing algorithm using a tree index structure on the encrypted database. BigComp 2016: 93-100 - [c13]Hyeong-Il Kim, Hyeong-Jin Kim, Jae-Woo Chang:
A Range Query Processing Algorithm Hiding Data Access Patterns in Outsourced Database Environment. DMBD 2016: 434-446 - [c12]Hyeong-Il Kim, Young-Sung Shin, Hyeong-Jin Kim, Jae-Woo Chang:
Efficient and secure top-k query processing algorithm using garbled circuit based secure protocols on outsourced databases. EDB 2016: 124-134 - [c11]Hyeong-Il Kim, Hyeong-Jin Kim, Jae-Woo Chang:
A Privacy-Preserving Top-k Query Processing Algorithm in the Cloud Computing. GECON 2016: 277-292 - 2015
- [c10]Hyeong-Il Kim, Min Yoon, MunChul Choi, Jae-Woo Chang:
A New Middleware for Distributed Data Processing in CUBRID DBMS. ANT/SEIT 2015: 654-658 - [c9]Seung-Tae Hong, Hyeong-Il Kim, TaeHoon Kim, Jae-Woo Chang:
A hierarchical CRT-based user access control scheme using resource set tree on the cloud system. BigComp 2015: 87-94 - 2014
- [j4]Min Yoon, Miyoung Jang, Hyeong-Il Kim, Jae-Woo Chang:
A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j3]Min Yoon, Hyeong-Il Kim, Mi-Young Jang, Jae-Woo Chang:
A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing. Int. J. Data Warehous. Min. 10(4): 26-49 (2014) - [j2]Hyeong-Il Kim, Al-Amin Hossain, Jae-Woo Chang:
A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases. Secur. Commun. Networks 7(10): 1498-1509 (2014) - [c8]Hyeong-Il Kim, Seung-Tae Hong, Jae-Woo Chang:
Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data. BigComp 2014: 77-82 - 2013
- [j1]Hyeong-Il Kim, Jae-Woo Chang:
k-Nearest Neighbor Query Processing Algorithms for a Query Region in Road Networks. J. Comput. Sci. Technol. 28(4): 585-596 (2013) - [c7]Min Yoon, Hyeong-Il Kim, Miyoung Jang, Jae-Woo Chang:
Linear Function Based Transformation Scheme for Preserving Database Privacy in Cloud Computing. ICPADS 2013: 498-503 - [c6]Hyeong-Il Kim, Mi-Young Jang, Min Yoon, Jae-Woo Chang:
A New Grid-Based Cloaking Scheme for Continuous Queries in Centralized LBS Systems. MUE 2013: 345-352 - [c5]Min Yoon, Hyeong-Il Kim, Dong Hoon Choi, Heeseung Jo, Jae-Woo Chang:
Performance Analysis of MapReduce-Based Distributed Systems for Iterative Data Processing Applications. MUSIC 2013: 293-299 - 2012
- [c4]Hyunjo Lee, Byeong-Seok Oh, Hyeong-Il Kim, Jae-Woo Chang:
Grid-based cloaking area creation scheme supporting continuous location-based services. SAC 2012: 537-543 - 2011
- [c3]Hyeong-Il Kim, Young-Sung Shin, Jae-Woo Chang:
A Grid-Based Cloaking Scheme for Continuous Queries in Distributed Systems. CIT 2011: 75-82
2000 – 2009
- 2009
- [c2]Hyunjo Lee, Hyeong-Il Kim, Jae-Woo Chang:
An Efficient High-Dimensional Indexing Scheme Using a Clustering Technique for Content-Based Retrieval. CSE (1) 2009: 318-323 - [c1]Jung-Ho Um, Hyeong-Il Kim, Young-Ho Choi, Jae-Woo Chang:
A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based Services. HPCC 2009: 362-368
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint