Hyunbum Kim

Learn More
Over years, cloud computing has been rapidly changing the shape of modern computing environment. The problem of how to keep the confidentiality of user data against malicious entities including a cloud service provider has been recognized as a significant issue. This problem becomes even more complicated if a data is shared among multiple users. Recently,(More)
In a wireless sensor network, a subset of sensor nodes provides a barrier-coverage over an area of interest if the sensor nodes are dividing the area into two regions such that any object moving from one region to another is guaranteed to be detected by a sensor node. Recently, Kumar et al. introduced scheduling algorithms for the maximum lifetime(More)
  • 1