TChain

Our paper named “T-Chain: A General Incentive Scheme for Cooperative Computing” has been accepted in IEEE International Conference on Distributed Computing Systems (ICDCS) 2015. The abstract is seen below.

In this paper, we propose a simple, distributed, but highly efficient fairness-enforcing incentive mechanism for cooperative computing. The proposed incentive scheme, called Triangle Chaining (T-Chain), enforces reciprocity to minimize the exploitable aspects of other schemes that allow free-riding. In T-Chain, symmetric key cryptography provides the basis for a lightweight, almost-fair exchange protocol, which is coupled with a pay-it-forward mechanism. This combination increases the opportunities for multi-lateral exchanges and further maximizes the resource utilization of participants, each of whom is assumed to operate solely for his or her own benefit. T-Chain also provides barrier-free entry to newcomers with flexible resource allocation, providing them with immediate benefits, and therefore is suitable for dynamic environments with high churn (i.e., turnover). TChain is distributed and simple to implement, as no trusted third party is required to monitor or enforce the scheme, nor is there any reliance on reputation information or tokens.

Advertisements
Posted in Uncategorized | Leave a comment

Bitcoin

Currently I am studying Bitcoin, a P2P based virtual currency without centralized authorities, which use both proof of work (i.e., a client puzzle) and electronic signature (i.e., public key cryptography) as its key mechanisms. The use of a public ledger (which include all transactions in the system) and  block chaining technique to prevent double spending (which is a de facto problem in this literature) are extremely brilliant ideas, which partially solves Byzantine Agreement (BA) problem. Please refer to the below for details.

 

Posted in Uncategorized | Leave a comment

Book Chapters

booksI will update the list of book chapters here whenever I have new ones. Book chapters may include a list of textbooks that I wrote thus far, which are currently used as textbooks in Korea Military Academy

 

x9788955683691

 

KOR9788955683509
  • 국방컴퓨터과학, 육/해/공군사관학교 전산학교수 공저, ISBN9788955683509, 양서각, 서울 대한민국, 2012

 

x9788955683394

 

x9788955683301

 

x9788956881805

 

untitled
Posted in Uncategorized | Leave a comment

Academic Publication

20150120_171004

I will update my published academic papers here whenever I have new one. Academic papers may include thesis and dissertation, domestic and international conference, and domestic and international journal papers.

 Thesis & Dissertation

International Journals

Domestic Journals

  • Jinchul Yoo, Kyuyong Shin, “A Low Power and Low Noise Comparator for Flash A/D Converters.”, Journal of Korea Military Academy, Volume 60, Number 1, 2004.
  • Kyuyong Shin, Youngho Cho, “Electronic Voting Schemes in Computer Networks based on Public Key Cryptography.”, Journal of Korea Military Academy, Volume 59, Number 3, 2003.

International Conferences

  • P. Rahimzadeh, C. Joe-Wong, Kyuyong Shin, Y. Im, J. Lee and S. Ha, SVC-TChain: Incentivizing Good Behavior in Layered P2P Video Streaming, IEEE INFOCOM 2017 (292 out of 1395 = 20.93% acceptance rate)
  • Carlee Joe-Wong, Youngbin Im, Kyuyong Shin, Sangtae Ha, “A Performance Analysis of Incentive Mechanisms for Cooperative Computing“,  in IEEE International Conference on Distributed Computing Systems (ICDCS), 2016.  (68 out of 386 = 17.6% acceptance rate)
  • Kyuyong Shin, Carlee Joe-Wong, Sangtae Ha, Yung Yi, Injong Rhee, Douglas Reeves, “T-Chain: A General Incentive Scheme for Cooperative Computing.”,  in IEEE International Conference on Distributed Computing Systems (ICDCS), 2015. (70 out of 543 = 12.89% acceptance rate)

Domestic Conferences

Posted in Uncategorized | Leave a comment

About Kyuyong Shin

5-SAN_DIEGO_28_converted

Kyuyong Shin is an associate professor in the Department of Computer Science at Korea Military Academy in Seoul, South Korea since 2009.  He received his Ph.D. degree in the Department of Compute Science at North Carolina State University in 2009. His research interests lie in security issues in cooperatively managed distributed system, which may include  security issues in Peer-to-Peer (P2P), Cloud Computing, Grid Computing, etc.

Academic Background

Teaching

  • Computer Networks for senior (majoring) cadets
  • Information Security for senior (majoring) cadets
  • Programming Language (C & JAVA) for sophomore cadets
  • Introduction to Cyber Warfare for sophomore cadets
  • Introduction to Information Science for freshmen cadets

Research Area

  • Cooperative Distributed Systems including Peer-to-Peer (P2P) Systems
  • P2P- based Video Streaming (Video on Demand or Live Streaming)
  • Incentive Mechanisms for Cooperative Distributed Systems
  • Network Security

Work Experience

  • 2009 – present : Associate Professor, Department of Computer Science, KMA
  • 2014 – 2015 : Visiting Scholar, ITP, University of Colorado Boulder
  • 2013 – 2014 : Cooperation Planning Officer, Office of International Affairs, KMA
  • 2004 – 2005 : Program Development Officer, KMA Leadership Center, KMA
  • 2002 – 2003 : Company Commander, 23rd Infantry Division, ROK Army
  • 2000 – 2001 : Full-time Instructor, Department of Computer Science, KMA
  • 1996 – 1997 : Platoon Leader, 39th Infantry Division, ROK Army
Image | Posted on by | Leave a comment