Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks

    The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers ...

    Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jaekwang Lee in Information Security Applications (2007)

  2. Chapter and Conference Paper

    Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing

    In this paper, we introduce a new security paradigm, called security clustering, for pervasive computing environment that enables network-wide defend against increasing evolutionary attacks on the heterogeneou...

    Jabeom Gu, Sehyun Park, Jaehoon Nah, Sungwon Sohn, Ohyoung Song in Networking 2004 (2004)

  3. No Access

    Chapter and Conference Paper

    New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI

    Most of Public Key Infrastructures (PKIs) are based on the ITU-T X.509, and the top-down hierarchical structure is extensively employed for the PKI community. However, the prominent drawback of the hierarchica...

    Jaeil Lee, Minsoo Lee, Jabeom Gu in Web and Communication Technologies and Int… (2003)

  4. No Access

    Chapter and Conference Paper

    A PKI-Based Authentication Framework for Next Generation Mobile Internet

    The next generation mobile Internet is expected to develop towards “Always Best Connected (ABC),” or “Any Time, Any Where, Any Service,” and provide completely open environments for interconnection with the ex...

    Jabeom Gu, Sehyun Park, Ohyoung Song in Web and Communication Technologies and Int… (2003)

  5. No Access

    Chapter and Conference Paper

    Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications

    The next generation mobile Internet is expected to develop towards “Always Best Connected (ABC)”, or “Any Time, Any Where, Any Service”, and provide completely open environments for interconnection with the ex...

    Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee in Information Security and Privacy (2003)