Efficient privacy-preserving machine learning for blockchain network H Kim, SH Kim, JY Hwang, C Seo Ieee Access 7, 136481-136495, 2019 | 125 | 2019 |
Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin US Patent App. 12/096,415, 2008 | 88 | 2008 |
Terminal apparatus, server apparatus, blockchain and method for FIDO universal authentication using the same S Kim, SR Cho, Y Cho, HUH Se-Young, SH Kim, SH Kim, Y Kim, JH Noh, ... US Patent 10,771,459, 2020 | 46 | 2020 |
Workflow-Based Authorization Service in the Grid SH Kim, KH Kim, J Kim, SJ Hong, S Kim Journal of Grid Computing 2, 43-55, 2004 | 29 | 2004 |
Method and apparatus for authenticated key exchange using password and identity-based signature J Hwang, S Kim, SH Kim, SH Kim, JH Noh, SR Cho, Y Cho, J Cho, SH Jin US Patent 10,263,969, 2019 | 22 | 2019 |
Method and apparatus for transmitting message in heterogeneous federated environment, and method and apparatus for providing service using the message SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin US Patent App. 12/095,560, 2010 | 21 | 2010 |
Apparatus and method for inputting user password SH Kim, T Kwon, SH Kim, DS Choi, JH Noh, S Cho, YS Cho, SH Jin US Patent App. 13/286,772, 2012 | 20 | 2012 |
Internet Access Time Control Method Using Authentication Assertion JH Noh, T Kim, SH Kim, DS Choi, SR Cho, YS Cho, SH Jin US Patent App. 11/720,911, 2008 | 20 | 2008 |
Apparatus and method for sharing user control enhanced digital identity S Cho, Y Cho, J Noh, D Choi, S Kim, S Kim, S Jin US Patent 8,321,918, 2012 | 18 | 2012 |
Server, system and method for managing identity SH Kim, YS Cho, JM Cho, SR Cho, DS Choi, JH Noh, SH Kim, KS Jung, ... US Patent App. 12/795,254, 2011 | 18 | 2011 |
Transactions Certification Method And System To Protect Privacy On Details Of Electronic Transactions YS Cho, JH Noh, SR Cho, DS Choi, T Kim, SH Kim, SH Jin, DW Hong, ... US Patent App. 11/573,175, 2008 | 18 | 2008 |
Recommendation system for user's decision about the sharing of private information to other party and method thereof S Kim, S Jin, CHO Jinman, Y Cho, S Cho, D Choi, J Noh, S Kim, ... US Patent App. 12/499,969, 2010 | 16 | 2010 |
Method for authentication using one-time identification information and system J Kwansoo, S Kim, KIM Deokjin, S Jin, Y Cho, CHO Jinman, S Cho, ... US Patent App. 12/498,417, 2010 | 15 | 2010 |
Apparatus and method for sharing identity in ubiquitous environment S Kim, Y Cho, S Cho, D Choi, J Noh, S Kim, S Jin US Patent App. 12/747,691, 2010 | 12 | 2010 |
Entry and exit control method and apparatus, and user terminal and server for the same YS Cho, SH Kim, SH Kim, SH Kim, JH Noh, SR Cho, JM Cho, SH Jin, ... US Patent App. 15/190,104, 2017 | 11 | 2017 |
Key tree construction and key distribution method for hierarchical role-based access control JH Noh, KIM Deokjin, SH Kim, SH Kim, SR Cho, YS Cho, J Cho, DS Choi, ... US Patent 8,447,037, 2013 | 11 | 2013 |
Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computing SH Kim, IY Ko, SH Kim Computers & Security 66, 1-19, 2017 | 10 | 2017 |
Robust authenticated key exchange using passwords and identity-based signatures JY Hwang, SH Kim, D Choi, SH Jin, B Song Security Standardisation Research: Second International Conference, SSR 2015 …, 2015 | 10 | 2015 |
Implicit secondary authentication for sustainable sms authentication G Ryu, SH Kim, D Choi Sustainability 11 (1), 279, 2019 | 8 | 2019 |
Open id authentication method using identity selector SH Kim, DS Choi, DJ Kim, SH Kim, JH Noh, KS Jung, SR Cho, YS Cho, ... US Patent App. 12/413,152, 2009 | 8 | 2009 |