2022
Study on Message Exposure to Administrator in Secure Messaging Protocol MLS
- Songhui Kwon, Hyoung-Kee Choi
-
Journal of the Korea Institute of Information Security & Cryptology, v.32, no.2, pp.255-266, Apr. 2022
2021
Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO)
- Ji-Hyun Nam, Hyoung-Kee Choi
-
Journal of the Korea Institute of Information Security & Cryptology, v.31, no.5, pp.941-950, Oct. 2021
2020
Automatic Detection and Analysis of Desktop Bus’ (D-Bus) Privilege Bypass in Tizen
- Dongsung Kim, Hyoung-Kee Choi
-
Journal of the Korea Institute of Information Security & Cryptology, v.30, no.6, pp.1023-1030, Dec. 2020
A Study of Attacks to Bypass CFI on Android Application Environment
- Juyeop Lee, Hyoung-Kee Choi
-
Journal of the Korea Institute of Information Security & Cryptology, v.30, no.5, pp.881-893, Oct. 2020
2019
Implementation of Covert Channel Using Mutex Shared Resources in Virtual Machine
- Giwan Go, Hyoung-Kee Choi
-
Journal of the Korea Institute of Information Security & Cryptology, v.29, no.5, pp.961-971, Oct. 2019
Comparative Analysis on Security Protocols of WPA3 Standard for Secure Wireless LAN Environments
- Ji-Hyun Nam, Juyeop Lee, Songhui Kwon, Hyoung-Kee Choi
- Journal of the Korean Institute of Communications and Information Sciences, v.44, no.10, pp.1878-1887, Oct. 2019
Implementing Android App Hardening Detector and Analyzing Status of App Protection
- Dongmin Jo, Hyoung-Kee Choi
- Journal of the Korean Institute of Communications and Information Sciences, v.44, no.6, pp.1084-1091, Jun. 2019
2018
A Popularity-based Caching for Privacy Preserving in Named Data Networking
- Ji-Yeon Yang, Hyoung-Kee Choi
- KNOM Review, v.21, no.1, pp.38-48, Aug. 2018
2017
Secure and Efficient Binding Updates in Host-Based Distributed Mobility Management
- Seyeong Lee, Hyoung-Kee Choi, EJin Kim
- Journal of the Korean Institute of Information Security and Cryptology, v.27, no.2, pp.397-408, Apr. 2017
2016
Malicious Traffic Detection Using K-means
- Dong Hyuk Shin, Kwang Kue An, Sung Chune Choi, Hyoung-Kee Choi
- Journal of Korean Institute of Communications and Information Sciences, Information Sciences, v.41, no.2, pp.277-284, Feb. 2016
2015
Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice
- Se-Yeong Lee, Jae-Gyoun Park, Sung-Dae Hong, Hyoung-Kee Choi
- Journal of KIISE, Information network, v.42, no.1, pp.22-32, Jan. 2015
2014
Building More Secure Femtocell with Improved Proxy Signature
- Hyoung-Kee Choi, Chan-Kyu Han, Seung-Ryong Kim
- Journal of the Korean Institute of Information Security and Cryptology, v.24, No.1, pp.75-86, Feb. 2014
2013
An Group-based Security Protocol for Machine Type Communications in LTE-Advanced
- Dae-Sung Choi, Hyoung-Kee Choi
- Journal of the Korean Institute of Information Security and Cryptology, v.23, no.5, pp.885-896, Oct. 2013
2012
Evaluation of Authentication Signaling Load in 3GPP LTE/SAE Networks
- Sung-Yong Kang, Chan-Kyu Han, Hyoung-Kee Choi
- Journal of the Korean Institute of Information Security and Cryptology, v.22, no.2, pp.213-224, Apr. 2012
Security Weaknesses of Handover Key Management in 3GPP LTE Network
- Chan-Kyu Han, Hyoung-Kee Choi
- Journal of the Korean Institute of Information Security and Cryptology, v.22, no.1, pp.25-31, Feb. 2012
2011
Optimal Handover Key Refresh Interval in 3GPP LTE/SAE Network
- Chan-Kyu Han, Hyoung-Kee Choi
- The KIPS transactions. Part C / v.18C no.4, pp. 237-242, Aug. 2011
2005 ~ 2010
Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation
- In-Hwan Kim, Hyoung-Kee Choi, Jung-Yoon Kim
- Journal of KIISE, Information network, v.37, no.6, pp.420-430, Dec. 2010
DoS Attack Prevention Using Methods for Reduction of Memory Usage in 802.11i 4-Way Handshake
- Jung-Yoon Kim, In-Hwan Kim, Hyoung-Kee Choi
- Journal of the Korean Institute of Information Security and Cryptology, v.20, no.5, pp.89-98, Oct. 2010
Weaknesses of the New Design of Wearable Token System Proposed by Sun et al.
- Jung-Yoon Kim, Hyoung-Kee Choi
- Journal of the Korean Institute of Information Security and Cryptology, v.20, no.5, pp.81-88, Oct. 2010
Clue for Secure Route Optimization in Mobile IPv6
- Se-Hwan Song, Hyoung-Kee Choi, Jung-Yoon Kim
- The KIPS transactions. Part C / v.17C no.2, pp. 153-158, Apr. 2010 PDF
A Design of Flexible Testbed for Network Security Evaluation
- Lee-Jin Lim, Hyoung-Kee Choi, Ki-Yoon Kim
- Journal of KIISE, Information network, v.37, no.1, pp.16-26, Feb. 2010
Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement
- Eun-Chul Cha, Chan-Kyu Han, Hyoung-Kee Choi
- The KIPS transactions. Part C / v.16C no.3, pp. 299-306, Jun. 2009
Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2
- Jung-Yoon Kim, Se-Hwa Song, In-Hwan Kim, In-Yong Hwang, Seok-Jung Kim, Hyoung-Kee Choi
- Journal of KIISE, Information Network, v.36, no.3, pp.184-190, Jun. 2009 PDF
An Anomalous Event Detection System Based on Information Theory
- Chan-Kyu Han, Hyoung-Kee Choi
- Journal of KIISE, Information Network, v.36, no.3, pp.173-183, Jun. 2009
An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems
- Jung-Yoon Kim, Hyoung-Kee Choi
- The KIPS Transactions. Part C / v.16C no.2, pp. 199-208, Apr. 2009 PDF
An Analysis Method of User Preference by using Web Usage Data in User Device
- Seung-Hwa Lee, Hyoung-Kee Choi, Eun-Seok Lee
- Journal of KIISE, Information network, v.15, no.3, pp.189-199, Mar. 2009
Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme
- Ki-Eun Shin, Hyoung-Kee Choi
- The KIPS transactions. Part C / v.16C no.1, pp. 21-26, Feb. 2009
Evaluation of Security Protocols for the Session Initiation Protocol
- Eun-Chul Cha, Hyoung-Kee Choi
- The KIPS transactions. Part C / v.14C no.1, pp. 55-64, Feb. 2007
Spam Message Filtering with Bayesian Approach for Internet Communities
- Bum-Bae Kim, Hyoung-Kee Choi
- The KIPS transactions. Part C / v.13C no.6, pp. 733-740, Oct. 2006
A Symptom Based Taxonomy for Network Security
- Ki-Yoon Kim, Hyoung-Kee Choi, Dong-Hyun Choi, Byung-Hee Lee, Yoon-Seung Choi, Hyo-Chan Bang, Jung-Chan Na
- The KIPS transactions. Part C / v.13C no.4, pp. 405-414, Aug. 2006
Implementation and Experimental Results of Neural Network and Genetic Algorithm based Spam Filtering Technique
- Bum-Bae Kim, Hyoung-Kee Choi
- The KIPS transactions. Part C / v.13C no.2, pp. 259-266, Apr. 2006
Security Issues in IPv6 and SCTP
- Hyoung-Kee Choi
- The Committee on Korean Network Operations and Management Review, Vol. 8, No. 1, pp. 58-66, Aug. 2005