Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6

    Many IP traceback mechanisms have been proposed to identify the source of cyber-attacks in the IPv4-based network, the so-called Internet. However, most of existing traceback work is focused on responding to c...

    Jae-hoon Jang, Don-Gu Yeo, Dong-hee Lee in Information Security Applications (2011)

  2. No Access

    Book and Conference Proceedings

    Information Security Applications

    10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

    Heung Youl Youm, Moti Yung in Lecture Notes in Computer Science (2009)

  3. No Access

    Chapter and Conference Paper

    USN Middleware Security Model

    In recent years, USN technology has become one of the major issues in business and academia. This paper analyzes USN services from a security point of view and proposes a security model of USN middleware that ...

    Mijoo Kim, Mi Yeon Yoon, Hyun Cheol Jeong in Information Security Applications (2009)

  4. Chapter and Conference Paper

    Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks

    In the sensor networks, the data packets transmitted by the different devices in the home networking and the industrial application maintain the different levels of importance. In this paper, we propose two me...

    Euijik Kim, Meejoung Kim, Sungkwan Youm in Embedded and Ubiquitous Computing – EUC 20… (2005)

  5. No Access

    Chapter and Conference Paper

    A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature

    This paper is to propose a threshold KCDSA (Korean Certification-based Digital Signature Algorithm) signature scheme. For this goal we present some new secret sharing schemes and a robust multiplication protoc...

    Ho-Sun Yoon, Heung-Youl Youm in Information Security and Cryptology - ICISC’99 (2000)