Skip to main content

and
  1. No Access

    Article

    Study on peak misdetection recovery of key exchange protocol using heartbeat

    Various studies have been conducted on a secret key exchange using the inter-pulse interval (IPI) extracted from a pulse wave. The IPI-based key exchange method uses a point where the body can measure an IPI o...

    Juyoung Kim, Kwantae Cho, Yong-Kyun Kim, Kyung-Soo Lim in The Journal of Supercomputing (2019)

  2. No Access

    Chapter and Conference Paper

    A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram

    Recently, various studies have been conducted on secret key generation and authentication using biosignals. PPG signals in biosignals are easy to measure, and signals generated from the inside of the body are ...

    Juyoung Kim, Kwantae Cho, Sang Uk Shin in Advanced Multimedia and Ubiquitous Engineering (2019)

  3. No Access

    Chapter and Conference Paper

    A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange

    Various studies have been conducted on secret key exchange using IPI (Inter Pulse Interval) extracted from a pulse wave. The IPI-based key exchange method uses a point where the body can measure IPI of similar...

    Juyoung Kim, Kwantae Cho, Yong-Kyun Kim in Advanced Multimedia and Ubiquitous Enginee… (2019)

  4. No Access

    Chapter and Conference Paper

    Self-certified Privacy-Preserving Scheme for Vehicle-to-Vehicle Communications

    In vehicular ad hoc networks (VANETs), vehicles should exchange safety-related messages with each other while processing them within short time in their embedded on-board units. Most previous authentication sc...

    Kwantae Cho, Byung-Gil Lee, Dong Hoon Lee in Computer Science and its Applications (2015)

  5. No Access

    Article

    Low-priced and efficient replica detection framework for wireless sensor networks

    A replica attack is one of the most challenging problems in wireless sensor networks. Once a node is physically captured, it can be reprogrammed and replicated into a large number of replicas, and thus malicio...

    Kwantae Cho, Dong Hoon Lee in Peer-to-Peer Networking and Applications (2014)

  6. No Access

    Chapter and Conference Paper

    Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks

    Key establishment is a fundamental service for secure communications between a central device and each biosensor implanted in the human body. It provides and manages the cryptographic keys to enable security s...

    Kwantae Cho, Dong Hoon Lee in Information Security Applications (2012)