International Conference

 

2019

 

A Dive into Windows Hello: Is it Really More Secure Than a Password?

  • Ejin Kim, Hyoung-Kee Choi
  • CanSecWest 2019, Mar.

 

2018

 

Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch

  • Dongsung Kim, Hyoung-Kee Choi
  • DEF CON 26, Aug.

 

PPNDN:Popularity-based Caching for Privacy Preserving in Named Data Networking

  • Ji-Yeon Yang, Hyoung-Kee Choi
  • ICIS 2018, May.

 

2017

 

Efficient Protocol for Searchable Encryption and Secure Deletion on Cloud Storages

  • Joon-Woo Yu, Hyoung-Kee Choi
  • ICCE 2017, January.

 

2016

 

An Immediate Authentication Protocol for Exchanging Safety Messages in Heterogeneous VANET

  • Ji-Young Park, Hyoung-Kee Choi
  • WCSE 2016, pp. 687-694, June.

 

Extraction of TLS master secret key in windows

  • Hyoseok Lee, Hyoung-Kee Choi
  • ICTC 2016, pp. 667-671, October.

 

Efficient Design for Secure Multipath TCP against Eavesdropper in Initial Handshake

  • Dong-Yong KimHyoung-Kee Choi
  • ICTC 2016, pp. 667-671, October.

 

2015

 

Improvement of Security Protocol for Machine Type Communications in LTE-Advanced

  • Hyoung-Kee Choi, Chan-Kyu Han, Dae-Sung Choi
  • IWCMC 2015, pp. 1301-1036, August.

 

Secure Binding Update without IPsec in Host-based Distributed Mobility Management

  • Se-Yeong Lee, Jong-Hyouk Lee, Hyoung-Kee Choi
  • USENIX Security 2015.

 

2014

 

A Group-based Security Protocol for Machine Type Communications in LTE-Advanced

  • Dae-Sung Choi, Sung-Dae Hong, Hyoung-Kee Choi
  • IEEE INFOCOM 2014.

 

2012

 

IP based Security Architecture of Virtual Network in Cloud Computing System

  • Jong-Sung Yang, Hyoung-Kee Choi
  • IWCMC 2012, pp. 709-715, August.

 

An Efficient and Versatile Key Management Protocol for Secure Smart Grid Communications

  • Jung-Yoon Kim, Hyoung-Kee Choi
  • WCNC 2012, April.

 

2010

 

An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications

  • Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
  • VTC 2010-Fall, pp. 1-6, September.

 

2009

 

An Authentication Framework for Mobile RFID Systems

  • Yi-Jin Im, Hyoung-Kee Choi
  • WISTP 2009, September.

 

Secure Authentication and Key Agreement Protocol or Bluetooth using Identity-based Cryptography

  • Do-Hyun Kwon, Hyoung-Kee Choi
  • WISTP 2009, September.

 

An Adaptation of Proxy Signature for Secure and Serverless Authentication in 3GPP Release 8 Networks

  • Chan-Kyu Han, Hyoung-Kee Choi
  • IWSEC 2009, pp. 65-80, October.

 

A Practical Security Framework for a VANET-based Entertainment Service

  • Ki-Eun Shin, Hyoung-Kee Choi, Jongmin Jeong
  • ACM PH2HW2N 2009, pp. 175-182, October.

 

A Self-Certified Signcryption Scheme for Mobile Communications

  • Ki-Eun Shin, Hyoung-Kee Choi
  • USENIX Security 09, August.

 

Building Femtocell More Secure with Improved Proxy Signature

  • Chan-Kyu Han, Hyoung-Kee Choi
  • GLOBECOM 2009, November.

 

Evaluation of Authentication Signaling Loads in 3GPP LTE/SAE Networks

  • Chan-kyu Han, Hyoung-Kee Choi, Jung Woo Baek, Ho Woo Lee
  • LCN 2009, October.

 

Performance Evaluation of End-to-End Security Protocols in IEEE 802.16e

  • Jung-Yoon Kim, Sung-Hyun Eum, Se-Hwa Song, In-Hwan Kim, In-Yong Hwang, Seok-Joong Kim, Hyoung-Kee Choi
  • APIS 2009, pp. 468-471, January.

 

1999 ~ 2008

 

EAP-Kerberos II:An Adaptation of Kerberos to EAP for Mutual Authentication

  • Sung-Hyun Eum, Hyoung-Kee Choi
  • ITST 2008, pp. 78-83, October.

 

Source Authentication for IPTV System

  • Ki-Eun Shin, Hyoung-Kee Choi
  • WISA2008, pp. 78-83, September.

 

A Novel Authentication Scheme for Binding Update in Mobile IPv6

  • Se-hwa Song, Hyoung-Kee Choi
  • USENIX Security 08, July – August.

 

Anomaly Detection based on Probabilistic Properties of Hidden Markov Models

  • Eunyoung Lee, Chan-Kyu Han, Hyoung-Kee Choi
  • ITC-CSCC 2008, pp. 177-180, July.

 

Source Authentication Protocol for IP-TV

  • Ki-Eun Shin, Hyoung-Kee Choi
  • ITC-CSCC 2008, pp. 629-632, July.

 

Spam Traffic Characterization

  • Jung-Yoon Kim, Hyoung-Kee Choi
  • ITC-CSCC 2008, pp. 961-964, July.

 

Characterizing User Behavior and Data Service Patterns in Cellular Networks

  • Chong-Wook Kwon, Yae Hoe Kim, Hyoung-Kee Choi
  • ITC-CSCC 2008, pp. 1649-1652, July.

 

Simulation of Performance Enhancement in the AAA Protocol

  • Ji-Sun Kim, Eun-Chul Cha, Hyoung-Kee Choi
  • ITC-CSCC 2008, pp. 1581-1584, July.

 

Analysis and Improvement of the 802.11i 4-Way Handshake

  • In-Hwan Kim, Sung-Hyun Eum, Hyoung-Kee Choi
  • ITC-CSCC 2008, pp. 1741-1744, July.

 

A robust Session Key Distribution in 802.11i

  • Sung-Hyun Eum, Sung-Jae Cho, Hyoung-Kee Choi, and Hyunseung Choo
  • ICCSA 2008, pp. 201-206, June – July.

 

Design of a Flexible Testbed for Evaluation of Network Security

  • Ki-Yoon Kim, Hyoung-Kee Choi, and Yi-Jin Im
  • 2008 International Symposium, pp. ⅲ-2-1 – ⅲ-2-11, June – July.

 

An Adoption of Kerberos to 3G Network for Mutual Authentication: Challenges and Evaluations

  • Chan-kyu Han, Hyoung-Kee Choi
  • SPECTS 2008, pp. 063s23_133, June.

 

A Scalable Security Protocol for Dynamic Group Communications

  • Jung-yoon Kim, Hyoung-Kee Choi, Sung-Hyun Eum
  • HotMobile 2008, February.

 

An Enhanced Fast Handoff Protocol Using Temporary Handoff Key (THK)

  • Sung-Jae Cho, Hyoung-Kee Choi
  • APIS 2008, pp. 89-92, January.

 

A Secure 4-Way Handshake in 802.11i using cookie

  • Sung-Hyun Eum, Yae-Hoe Kim, Hyoung-Kee Choi
  • APIS 2008, pp. 247-250, January.

 

Evaluation of Security Protocols for the Session Initiation Protocol

  • Eun-Chul Cha, Hyoung-Kee Choi, Sung-Jae Cho
  • ICCCN 2007, pp. 611-618.

 

A Prototype for community Spam Filter based on Machine Learning Algorithm

  • Bumbae Kim, Hyoung-Kee Choi
  • ITC-CSCC 2007, pp. 1061-1062.

 

Entropy based Worm and DDoS Attack Detection in Stub networks

  • Chan-kyu Han, Hyoung-Kee Choi
  • ITC-CSCC 2007, pp. 149-150.

 

Entropy based Worm and DDoS Attack Detection in Stub networks

  • Chan-kyu Han, Hyoung-Kee Choi
  • ICUIMC 2007, pp. 505-508.

 

A study of performance improvement in EAP

  • Eun-Chul Cha, Hyoung-Kee Choi
  • ICUIMC 2007, pp. 149-158.

 

A Symptom-based Taxonomy for Network Security

  • Ki-Yoon Kim, Hyoung-Kee Choi
  • YUST International Symposium, pp. Ⅲ-4-1 – Ⅲ-4-1-16, 2006.

 

A novel spam filtering technique with the neural network and the genetic algorithm

  • Jae Eun Chung, Hyoung-Kee Choi, Bumbae Kim
  • ITC-CSCC 2005, pp. 963-964.

 

An empirical study of keep-alive connections in HTTP

  • Hyoung-Kee Choi, John Limb and John Copeland
  • In proceedings of ATS, 2002.

 

A Behavioral Model of Web Traffic

  • Hyoung-Kee Choi, John O. Limb
  • ICNP 1999, pp. 327-334.