Follow
YounSun Cho
YounSun Cho
Computer Science, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Efficient data authentication in an environment of untrusted third-party distributors
MJ Atallah, YS Cho, A Kundu
2008 IEEE 24th International Conference on Data Engineering, 696-704, 2008
462008
LAAC: A location-aware access control protocol
YS Cho, L Bao, MT Goodrich
2006 3rd Annual International Conference on Mobile and Ubiquitous Systems …, 2006
372006
Secure access control for location-based applications in WLAN systems
YS Cho, L Bao
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 852-857, 2006
212006
Private combinatorial group testing
MJ Atallah, KB Frikken, M Blanton, YS Cho
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
122008
Private Discovery of Shared Interests⋆
MJ Atallah, YS Cho
InternationalConference on Information and Communications Security (ICICS'07), 2007
52007
Protocols for Region Locality Among Mobile Devices
Y Cho, L Bao, M Goodrich
Technical Report, 2005
22005
Detecting a Corrupted Area in a 2-Dimensional Space
YS Cho
Technical Report at arXiv.org, 2014
2014
Third-party grid-data integrity verification
MJ Atallah, YS Cho, A Kundu
Proceedings of the 9th Annual Information Security Symposium, 1-1, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–8