Domestic Journal

 

2022
 

Study on Message Exposure to Administrator in Secure Messaging Protocol MLS

  • Songhui Kwon, Hyoung-Kee Choi
  • Journal of the Korea Institute of Information Security & Cryptology, v.32, no.2, pp.255-266, Apr. 2022

 

2021
 

Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO)

  • Ji-Hyun Nam, Hyoung-Kee Choi
  • Journal of the Korea Institute of Information Security & Cryptology, v.31, no.5, pp.941-950, Oct. 2021

 

2020
 

Automatic Detection and Analysis of Desktop Bus’ (D-Bus) Privilege Bypass in Tizen 

  • Dongsung Kim, Hyoung-Kee Choi
  • Journal of the Korea Institute of Information Security & Cryptology, v.30, no.6, pp.1023-1030, Dec. 2020

 

A Study of Attacks to Bypass CFI on Android Application Environment

  • Juyeop Lee, Hyoung-Kee Choi
  • Journal of the Korea Institute of Information Security & Cryptology, v.30, no.5, pp.881-893, Oct. 2020

 

2019
 

Implementation of Covert Channel Using Mutex Shared Resources in Virtual Machine

  • Giwan Go, Hyoung-Kee Choi
  • Journal of the Korea Institute of Information Security & Cryptology, v.29, no.5, pp.961-971, Oct. 2019

 

Comparative Analysis on Security Protocols of WPA3 Standard for Secure Wireless LAN Environments

  • Ji-Hyun Nam, Juyeop Lee, Songhui Kwon, Hyoung-Kee Choi
  • Journal of the Korean Institute of Communications and Information Sciences, v.44, no.10, pp.1878-1887, Oct. 2019

 

Implementing Android App Hardening Detector and Analyzing Status of App Protection

  • Dongmin Jo, Hyoung-Kee Choi
  • Journal of the Korean Institute of Communications and Information Sciences, v.44, no.6, pp.1084-1091, Jun. 2019

 

2018
 

A Popularity-based Caching for Privacy Preserving in Named Data Networking

  • Ji-Yeon Yang, Hyoung-Kee Choi
  • KNOM Review, v.21, no.1, pp.38-48, Aug. 2018

 

2017
 

Secure and Efficient Binding Updates in Host-Based Distributed Mobility Management

  • Seyeong Lee, Hyoung-Kee Choi, EJin Kim
  • Journal of the Korean Institute of Information Security and Cryptology, v.27, no.2, pp.397-408, Apr. 2017

 

2016
 

Malicious Traffic Detection Using K-means

  • Dong Hyuk Shin, Kwang Kue An, Sung Chune Choi, Hyoung-Kee Choi
  • Journal of Korean Institute of Communications and Information Sciences, Information Sciences, v.41, no.2, pp.277-284, Feb. 2016

 

2015
 

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice

  • Se-Yeong Lee, Jae-Gyoun Park,  Sung-Dae Hong, Hyoung-Kee Choi
  • Journal of KIISE, Information network, v.42, no.1, pp.22-32, Jan. 2015

 

2014
 

Building More Secure Femtocell with Improved Proxy Signature

  • Hyoung-Kee Choi, Chan-Kyu Han, Seung-Ryong Kim
  • Journal of the Korean Institute of Information Security and Cryptology, v.24, No.1, pp.75-86, Feb. 2014

 

2013

 

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced

  • Dae-Sung Choi, Hyoung-Kee Choi
  • Journal of the Korean Institute of Information Security and Cryptology, v.23, no.5, pp.885-896, Oct. 2013

 

2012

 

Evaluation of Authentication Signaling Load in 3GPP LTE/SAE Networks

  • Sung-Yong Kang, Chan-Kyu Han, Hyoung-Kee Choi
  • Journal of the Korean Institute of Information Security and Cryptology, v.22, no.2, pp.213-224, Apr. 2012

 

Security Weaknesses of Handover Key Management in 3GPP LTE Network

  • Chan-Kyu Han, Hyoung-Kee Choi
  • Journal of the Korean Institute of Information Security and Cryptology, v.22, no.1, pp.25-31, Feb. 2012

 

2011

 

Optimal Handover Key Refresh Interval in 3GPP LTE/SAE Network

  • Chan-Kyu Han, Hyoung-Kee Choi
  • The KIPS transactions. Part C / v.18C no.4, pp. 237-242, Aug. 2011

 

2005 ~ 2010

 

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation

  • In-Hwan Kim, Hyoung-Kee Choi, Jung-Yoon Kim
  • Journal of KIISE, Information network, v.37, no.6, pp.420-430, Dec. 2010

 

DoS Attack Prevention Using Methods for Reduction of Memory Usage in 802.11i 4-Way Handshake

  • Jung-Yoon Kim, In-Hwan Kim, Hyoung-Kee Choi
  • Journal of the Korean Institute of Information Security and Cryptology, v.20, no.5, pp.89-98, Oct. 2010

 

Weaknesses of the New Design of Wearable Token System Proposed by Sun et al.

  • Jung-Yoon Kim, Hyoung-Kee Choi
  • Journal of the Korean Institute of Information Security and Cryptology, v.20, no.5, pp.81-88, Oct. 2010

 

Clue for Secure Route Optimization in Mobile IPv6

  • Se-Hwan Song, Hyoung-Kee Choi, Jung-Yoon Kim
  • The KIPS transactions. Part C / v.17C no.2, pp. 153-158, Apr. 2010 PDF

 

A Design of Flexible Testbed for Network Security Evaluation

  • Lee-Jin Lim, Hyoung-Kee Choi, Ki-Yoon Kim
  • Journal of KIISE, Information network, v.37, no.1, pp.16-26, Feb. 2010

 

Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement

  • Eun-Chul Cha, Chan-Kyu Han, Hyoung-Kee Choi
  • The KIPS transactions. Part C / v.16C no.3, pp. 299-306, Jun. 2009

 

Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2

  • Jung-Yoon Kim, Se-Hwa Song, In-Hwan Kim, In-Yong Hwang, Seok-Jung Kim, Hyoung-Kee Choi
  • Journal of KIISE, Information Network, v.36, no.3, pp.184-190, Jun. 2009 PDF

 

An Anomalous Event Detection System Based on Information Theory

  • Chan-Kyu Han, Hyoung-Kee Choi
  • Journal of KIISE, Information Network, v.36, no.3, pp.173-183, Jun. 2009

 

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems

  • Jung-Yoon Kim, Hyoung-Kee Choi
  • The KIPS Transactions. Part C / v.16C no.2, pp. 199-208, Apr. 2009 PDF

 

An Analysis Method of User Preference by using Web Usage Data in User Device

  • Seung-Hwa Lee, Hyoung-Kee Choi, Eun-Seok Lee
  • Journal of KIISE, Information network, v.15, no.3, pp.189-199, Mar. 2009

 

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme

  • Ki-Eun Shin, Hyoung-Kee Choi
  • The KIPS transactions. Part C / v.16C no.1, pp. 21-26, Feb. 2009

 

Evaluation of Security Protocols for the Session Initiation Protocol

  • Eun-Chul Cha, Hyoung-Kee Choi
  • The KIPS transactions. Part C / v.14C no.1, pp. 55-64, Feb. 2007

 

Spam Message Filtering with Bayesian Approach for Internet Communities

  • Bum-Bae Kim, Hyoung-Kee Choi
  • The KIPS transactions. Part C / v.13C no.6, pp. 733-740, Oct. 2006

 

A Symptom Based Taxonomy for Network Security

  • Ki-Yoon Kim, Hyoung-Kee Choi, Dong-Hyun Choi, Byung-Hee Lee, Yoon-Seung Choi, Hyo-Chan Bang, Jung-Chan Na
  • The KIPS transactions. Part C / v.13C no.4, pp. 405-414, Aug. 2006

 

Implementation and Experimental Results of Neural Network and Genetic Algorithm based Spam Filtering Technique

  • Bum-Bae Kim, Hyoung-Kee Choi
  • The KIPS transactions. Part C / v.13C no.2, pp. 259-266, Apr. 2006

 

Security Issues in IPv6 and SCTP

  • Hyoung-Kee Choi
  • The Committee on Korean Network Operations and Management Review, Vol. 8, No. 1, pp. 58-66, Aug. 2005