Efficient data authentication in an environment of untrusted third-party distributors MJ Atallah, YS Cho, A Kundu 2008 IEEE 24th International Conference on Data Engineering, 696-704, 2008 | 46 | 2008 |
LAAC: A location-aware access control protocol YS Cho, L Bao, MT Goodrich 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems …, 2006 | 37 | 2006 |
Secure access control for location-based applications in WLAN systems YS Cho, L Bao 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 852-857, 2006 | 21 | 2006 |
Private combinatorial group testing MJ Atallah, KB Frikken, M Blanton, YS Cho Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 12 | 2008 |
Private Discovery of Shared Interests⋆ MJ Atallah, YS Cho InternationalConference on Information and Communications Security (ICICS'07), 2007 | 5 | 2007 |
Protocols for Region Locality Among Mobile Devices Y Cho, L Bao, M Goodrich Technical Report, 2005 | 2 | 2005 |
Detecting a Corrupted Area in a 2-Dimensional Space YS Cho Technical Report at arXiv.org, 2014 | | 2014 |
Third-party grid-data integrity verification MJ Atallah, YS Cho, A Kundu Proceedings of the 9th Annual Information Security Symposium, 1-1, 2008 | | 2008 |