Young-joo Shin

Learn More
Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing. Proof of Storage with Deduplication (POSD) [1] is the first solution that addresses the issue for the cloud storage. However, the validity of the POSD scheme stands on the strong assumption that all clients are honest in terms of generating(More)
Wireless mesh networks can extend the network service region by just adding APs. However wireless mesh networks also have the same security problems as the traditional wireless LAN. Until now, many methods have been proposed to solve the authentication problem, particularly for the fast handoff, in the traditional wireless LAN. However, previous methods are(More)
PURPOSE Local recurrence is a major concern in patients who have undergone surgery for ductal carcinoma in situ (DCIS). The present study assessed whether the expression levels of hormone receptors, human epidermal growth factor receptor 2 (HER2), and Ki-67, as well as resection margin status, tumor grade, age at diagnosis, and adjuvant hormonal therapy and(More)
PURPOSE The purpose of this study was to compare in vivo kinematics, range of motion, and functional outcomes in patients that received either a high-flexion cruciate retaining or a high-flexion cruciate substituting knee. METHODS Forty-eight high-flexion cruciate retaining (CR) and 47 high-flexion cruciate substituting (PS) knees were included in this(More)
Suppressor of cytokine signaling (SOCS) family is an important negative regulator of cytokine signaling and deregulation of SOCS has been involved in many types of cancer. All cervical cancer cell lines tested showed lower expression of SOCS1, SOCS3, and SOCS5 than normal tissue or cell lines. The immunohistochemistry result for SOCS proteins in human(More)
Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by confining the impact of a membership change in a local area. However, many of the previous decentralized solutions reveal the plain text to the intermediate relaying proxies,or require the key distribution(More)
Cardiac glycosides are clinically used for cardiac arrhythmias. In this study, we investigated the mechanism responsible for anti-cancer and radiosensitizing effects of lanatoside C in colorectal cancer cells. Lanatoside C-treated cells showed classic patterns of autophagy, which may have been caused by lanatoside C-induced mitochondrial aggregation or(More)
Cloud storage service providers apply data client-side deduplication across multiple users to achieve cost savings of network bandwidth and disk storage. However, deduplication can be used as a side channel by attackers who try to obtain sensitive information of other users' data. We propose a differentially private client-side deduplication protocol. A(More)
Explosion of multimedia content brings forth the needs of efficient resource utilization using the state of the arts cloud computing technologies such as data deduplication. In the cloud computing environments, achieving both data privacy and integrity is the challenging issue for data outsourcing service. Proof of Storage with Deduplication (POSD) is a(More)