{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:16:02Z","timestamp":1757780162553,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["2019-0-00203"],"award-info":[{"award-number":["2019-0-00203"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s00779-019-01299-w","type":"journal-article","created":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T07:02:42Z","timestamp":1566802962000},"page":"345-353","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing"],"prefix":"10.1007","volume":"26","author":[{"given":"Jinsu","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4434-8933","authenticated-orcid":false,"given":"Namje","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"1299_CR1","unstructured":"Christos S, Kostas E. Psannis, Andreas P, Yutaka I, Kim B-G (2018) Algorithms for efficient digital media transmission over IoT and cloud networking. Journal of Multimedia Information System 5(1):1\u201310"},{"issue":"1","key":"1299_CR2","first-page":"173","volume":"38","author":"Y-L Wu","year":"2017","unstructured":"Wu Y-L, Tao Y-H, Chang C-J (2017) A comparative review on privacy concerns and safety demands of closed-circuit television among Taiwan, Japan, and the United Kingdom. J Inf Optim Sci 38(1):173\u2013196","journal-title":"J Inf Optim Sci"},{"key":"1299_CR3","doi-asserted-by":"crossref","unstructured":"Meng Y, Xing W, Guohang Z, Linlin S (2017) Joint and collaborative representation with local adaptive convolution feature for face recognition with single sample per person. Pattern Recogn 66:117\u2013128","DOI":"10.1016\/j.patcog.2016.12.028"},{"issue":"1","key":"1299_CR4","first-page":"6","volume":"5","author":"DJ Robertson","year":"2018","unstructured":"Robertson DJ (2018) Face recognition: security contexts, super-recognizers, and sophisticated fraud. The Journal of The United States Homeland Defence and Security Information Analysis Center (HDIAC) 5(1):6\u201310","journal-title":"The Journal of The United States Homeland Defence and Security Information Analysis Center (HDIAC)"},{"key":"1299_CR5","doi-asserted-by":"crossref","unstructured":"Choudhary A, Rekha Vig (2017) Face recognition using multiresolution wavelet combining discrete cosine transform and Walsh transform. Proceedings of the 2017 International Conference on Biometrics Engineering and Application. ACM,","DOI":"10.1145\/3077829.3077835"},{"key":"1299_CR6","doi-asserted-by":"crossref","unstructured":"Vaesileios Memos, Kostas E. Psannis*, Yutaka Ishibashi, Byung-Gyu Kim, Brij Gupta (2017) An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework, Elsevier, Future Generation Computer Systems","DOI":"10.1016\/j.future.2017.04.039"},{"key":"1299_CR7","unstructured":"Stergiou C, Psannis KE, Kim B.-G, Gupta B (2016) Secure integration of IoT and cloud computing, Elsevier, Future Generation Computer Systems"},{"key":"1299_CR8","unstructured":"Ya W, Tianlong B, Chunhui D, Ming Z\u00a0(2017) Face recognition in real-world surveillance videos with deep learning method. Image, Vision and Computing (ICIVC), 2017 2nd International Conference on. IEEE"},{"key":"1299_CR9","doi-asserted-by":"crossref","unstructured":"Donghyeok L,\u00a0Namje P\u00a0(2017) Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance. J Supercomput 73(3):1119","DOI":"10.1007\/s11227-017-1967-0"},{"key":"1299_CR10","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"AP Plageras","year":"2018","unstructured":"Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor BIG data collection-processing and analysis in smart buildings. Futur Gener Comput Syst 82:349\u2013357","journal-title":"Futur Gener Comput Syst"},{"key":"1299_CR11","doi-asserted-by":"crossref","unstructured":"Marek P, Ondrej K, Vladimir K, Vaclav S\u00a0(2012) Cloud computing environments for biomedical data services. Intelligent Data Engineering and Automated Learning-IDEAL 2012:336\u2013343","DOI":"10.1007\/978-3-642-32639-4_41"},{"key":"1299_CR12","unstructured":"Joongheon K, Yeongjong M, Woojoo L, Daehun N\u00a0(2017) Dynamic security-level maximization for stabilized parallel deep learning architectures in surveillance applications. Privacy-Aware Computing (PAC), 2017 IEEE Symposium on. IEEE"},{"issue":"3","key":"1299_CR13","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s10586-014-0367-y","volume":"17","author":"N Park","year":"2014","unstructured":"Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust Comput 17(3):653\u2013664","journal-title":"Clust Comput"},{"key":"1299_CR14","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez-Silva DA, Adkinson-Orellana L, Gonz'lez-Casta\u00f1o FJ, Armi\u00f1o-Franco I, Gonz'lez-Mart\u00ednez D (2012) Video surveillance based on cloud storage. Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE","DOI":"10.1109\/CLOUD.2012.44"},{"key":"1299_CR15","unstructured":"Hyunjung L, Chunwoo P,\u00a0Soodong K\u00a0(2014) A framework for effectively managing dynamism of IoT devices. Journal of KIISE 41(8):545\u2013556"},{"key":"1299_CR16","unstructured":"Namje P, Hongxin H, Qun J (2016)Security and privacy mechanisms for sensor middleware and application in internet of things (IoT), International Journal of Distributed Sensor Networks, Vol. 2016"},{"key":"1299_CR17","doi-asserted-by":"crossref","unstructured":"Ramachandra, Raghavendra, and Christoph Busch (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Computing Surveys(CSUR), 50(1)","DOI":"10.1145\/3038924"},{"key":"1299_CR18","doi-asserted-by":"publisher","unstructured":"Namje P, Donghyeok L (2017) Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment, Pers Ubiquit Comput, https:\/\/doi.org\/10.1007\/s00779-017-1017-1, pp.1\u20138","DOI":"10.1007\/s00779-017-1017-1"},{"key":"1299_CR19","doi-asserted-by":"crossref","unstructured":"Namje P, Namhi K\u00a0(2015) Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors 16(1):1\u201316","DOI":"10.3390\/s16010020"},{"key":"1299_CR20","doi-asserted-by":"crossref","unstructured":"Hossain M (2014) Anwar. Framework for a cloud-based multimedia surveillance system. International Journal of Distributed Sensor Networks 10(5)","DOI":"10.1155\/2014\/135257"},{"key":"1299_CR21","doi-asserted-by":"publisher","unstructured":"Donghyeok L, Namje P\u00a0(2016) Teaching book and tools of elementary network security learning using gamification mechanism. Journal of the Korea Institute of Information Security & Cryptology 26(3):787\u2013797. https:\/\/doi.org\/10.13089\/JKIISC.2016.26.3.787","DOI":"10.13089\/JKIISC.2016.26.3.787"},{"key":"1299_CR22","doi-asserted-by":"crossref","unstructured":"Namje P, Jin K, Seungjoo K, Dongho W, and Howon K (2006) \u201cWIPI mobile platform with secure Service for Mobile RFID network environment\u201d, Advanced Web and Network Technologies, and Applications, LNCS, Vol. 3842, pp. 741\u2013748","DOI":"10.1007\/11610496_100"},{"key":"1299_CR23","doi-asserted-by":"publisher","unstructured":"Namje P,\u00a0Hyochan B\u00a0(2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Security and Communication Networks, John Wiley&Sons Ltd 9(6):500\u2013512. https:\/\/doi.org\/10.1002\/sec.1108","DOI":"10.1002\/sec.1108"},{"key":"1299_CR24","doi-asserted-by":"crossref","unstructured":"Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication, Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"1299_CR25","doi-asserted-by":"publisher","unstructured":"Cheolhee P, Dowon H, Changho S\u00a0(2016) A secure and practical encrypted data de-duplication with proof of ownership in cloud storage. Korea Information Science Society 43(10):1165\u20131172. https:\/\/doi.org\/10.5626\/JOK.2016.43.10.1165","DOI":"10.5626\/JOK.2016.43.10.1165"},{"key":"1299_CR26","doi-asserted-by":"publisher","unstructured":"Namje P\u00a0(2013) UHF\/HF dual-band integrated mobile RFID\/NFC linkage method for mobile device-based business application. The Journal of The Korean Institute of Communication Sciences 38(10):841\u2013851. https:\/\/doi.org\/10.7840\/kics.2013.38C.10.841","DOI":"10.7840\/kics.2013.38C.10.841"},{"key":"1299_CR27","unstructured":"Donghyeok L, Namje P (2017) Institutional improvements for security of IoT devices. Journal of KIISC 27(3):607\u2013615"},{"key":"1299_CR28","doi-asserted-by":"crossref","unstructured":"Namje P\u00a0(2014) Design and implementation of mobile VTS middleware for efficient IVEF service. Journal of KICS 39C(6):466\u2013475","DOI":"10.7840\/kics.2014.39C.6.466"},{"key":"1299_CR29","doi-asserted-by":"crossref","unstructured":"Kaaniche, Nesrine, and Maryline Laurent (2014) A secure client side deduplication scheme in cloud storage environments, New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. IEEE, pp.1\u20137","DOI":"10.1109\/NTMS.2014.6814002"},{"key":"1299_CR30","doi-asserted-by":"crossref","unstructured":"Puzio P, Molva R, Onen M, Loureiro S (2013) ClouDedup: secure deduplication with encrypted data for cloud storage, Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on. Vol. 1. IEEE, pp. 363\u2013370","DOI":"10.1109\/CloudCom.2013.54"},{"key":"1299_CR31","unstructured":"Park N, Park J, Kim H (2015) Inter-authentication and session key sharing procedure for secure M2M\/IoT environment. International Information Institute (Tokyo)\u00a0INFORMATION, Japan 18(1):261\u2013266"},{"key":"1299_CR32","doi-asserted-by":"publisher","unstructured":"Donghyeok L, Namje P (2017) A secure almanac synchronization method for open IoT maritime cloud environment. Journal of Korean Institute of Information Technology 15(2):79\u201390. https:\/\/doi.org\/10.14801\/jkiit.2017.15.2.79","DOI":"10.14801\/jkiit.2017.15.2.79"},{"key":"1299_CR33","unstructured":"Jeongho Kim (2015) The weight of the mobile device user authentication protocol study the cloud service communications environment, Master\u2019s thesis, Soongsil University"},{"key":"1299_CR34","unstructured":"Tang, Yang, and Junfeng Yang (2015) Secure deduplication of general computations, USENIX Annual Technical Conference, pp.319\u2013331"},{"issue":"1","key":"1299_CR35","first-page":"103","volume":"12","author":"Y-J Yoo","year":"2014","unstructured":"Yoo Y-J, Kim S-J, Ko YW (2014) Cloud file synchronization scheme using bidirectional data deduplication. Journal of KIIT 12(1):103\u2013110","journal-title":"Journal of KIIT"},{"key":"1299_CR36","doi-asserted-by":"publisher","unstructured":"Kim J, Park N, Kim G, Seunghun CCTV video processing metadata security scheme using character order preserving-transformation in the emerging multimedia. Electronics 8(4):412. https:\/\/doi.org\/10.3390\/electronics8040412","DOI":"10.3390\/electronics8040412"},{"key":"1299_CR37","doi-asserted-by":"publisher","unstructured":"Donghyeok Lee, Namje Park, Geonwoo Kim, and Seunghun Jin, \u201cDe-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment\u201d, Peer-to-Peer Networking and Applications, DOI https:\/\/doi.org\/10.1007\/s12083-018-0637-1, pp. 1\u201310, 2018","DOI":"10.1007\/s12083-018-0637-1"},{"key":"1299_CR38","unstructured":"Park N (2018) The core competencies of SEL-based innovative creativity education. International Journal of Pure and Applied Mathematics 118(19a):837\u2013849"},{"issue":"2","key":"1299_CR39","first-page":"417","volume":"28","author":"D Lee","year":"2018","unstructured":"Lee D, Park N (2018) A study on COP-transformation based metadata security scheme for privacy protection in intelligent video surveillance. Journal of KIISC 28(2):417\u2013428","journal-title":"Journal of KIISC"},{"key":"1299_CR40","unstructured":"Park N (2018) STEAM education program: training program for financial engineering career. International Journal of Pure and Applied Mathematics 118(19a):819\u2013835"},{"issue":"5\u20136","key":"1299_CR41","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1007\/s00779-015-0840-5","volume":"19","author":"P Riedl","year":"2015","unstructured":"Riedl P, Mayrhofer R, M\u00f6ller A, KranzEmail M, Lettner F, Holzmann C, Koelle M (2015) Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Pers Ubiquit Comput 19(5\u20136):941\u2013954","journal-title":"Pers Ubiquit Comput"},{"issue":"2","key":"1299_CR42","doi-asserted-by":"publisher","first-page":"154","DOI":"10.5626\/JOK.2019.46.2.154","volume":"46","author":"D Lee","year":"2019","unstructured":"Lee D, Park N (2019) Privacy protection method based on multi-object authentication in intelligent CCTV environment. Journal of KIISE 46(2):154\u2013160","journal-title":"Journal of KIISE"},{"issue":"5\u20136","key":"1299_CR43","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/s00779-015-0859-7","volume":"19","author":"R Kirkham","year":"2015","unstructured":"Kirkham R, Bartindale T, Evans M, Olivier P (2015) Build me a Ubicomp: bespoke ubiquitous accessibility in live television production environments. Pers Ubiquit Comput 19(5\u20136):853\u2013880","journal-title":"Pers Ubiquit Comput"},{"issue":"5","key":"1299_CR44","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s00779-017-1044-y","volume":"21","author":"L Qiu","year":"2017","unstructured":"Qiu L, Liu Z, Pereira GCCF, Seo H (2017) Implementing RSA for sensor nodes in smart cities. Pers Ubiquit Comput 21(5):807\u2013813","journal-title":"Pers Ubiquit Comput"},{"issue":"2.33","key":"1299_CR45","first-page":"151","volume":"7","author":"D Lee","year":"2018","unstructured":"Lee D, Park N (2018) ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment. Journal of IJET 7(2.33):151\u2013154","journal-title":"Journal of IJET"},{"key":"1299_CR46","unstructured":"Park N (2017) Information exchange between VTSCs for secure next-generation vessel traffic system. International Information Institute (Tokyo) INFORMATION, Japan\u00a020(2B):1309\u20131316"},{"key":"1299_CR47","unstructured":"Lee D, Park N (2017) Technology and policy post-security management framework for IoT electrical safety management. The transactions of The Korean Institute of Electrical Engineers 66(12):1879\u20131888"},{"issue":"5","key":"1299_CR48","doi-asserted-by":"publisher","first-page":"91","DOI":"10.14801\/jkiit.2018.16.5.91","volume":"16","author":"D Lee","year":"2018","unstructured":"Lee D, Park N (2018) A proposal of privacy-enhanced deduplication technique in a cloud environment. Journal of KIIT 16(5):91\u2013102","journal-title":"Journal of KIIT"},{"key":"1299_CR49","doi-asserted-by":"publisher","unstructured":"Liu S, MengjingYu ML, Xu Q (2019) The research of virtual face based on Deep Convolutional Generative Adversarial Networks using TensorFlow. Journal of Physica A:SMA 521:667\u2013680. https:\/\/doi.org\/10.1016\/j.physa.2019.01.036","DOI":"10.1016\/j.physa.2019.01.036"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01299-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-019-01299-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01299-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T12:10:52Z","timestamp":1647605452000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-019-01299-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["1299"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01299-w","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"9 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}