Jae-Wook Jung

Learn More
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been(More)
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication(More)
PURPOSE The purpose of this study was to compare and differentiate the clinical characteristics of intermittent exotropia (X(T)) in children and adults. METHODS This study included 398 patients with X(T): 360 children ranging in age from 1 to 14 years and 38 adults over 15 years of age. Patients with neurological abnormalities or developmental delays were(More)
A 76-year-old man with no notable medical history was scheduled for a robot-assisted radical prostatectomy. After the operation, he was given sugammadex. Two minutes later, ventricular premature contraction bigeminy began, followed by cardiac arrest. Cardiac arrest occurred three times and cardiopulmonary resuscitation was done. The patient recovered after(More)
Spinal cord stimulation (SCS) in trials involving external stimulation are easily conducted under local anesthesia. However, implantation of a permanent SCS system is painful, and can be intolerable in some patients. Epidural anesthesia can be used to perform the SCS implantation without discomfort if the patient can localize the area of paresthesia.(More)
A city is a dynamic entity, which environment is continuously changing over time. Accordingly, its virtual city models also need to be regularly updated to support accurate model-based decisions for various applications, including urban planning, emergency response and autonomous navigation. A concept of continuous city modeling is to progressively(More)
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user(More)
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this(More)
A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An's scheme provides more improved user authentication than Das's scheme. But An's scheme is not secure against denial of service attack in login phase, forgery attack. Li et al. pointed out them and proposed(More)
A 15-year-old adolescent with unilateral multiple adrenal pheochromocytoma had an episode of subcortical intracerebral hemorrhage and seizure 6 weeks before the surgery. He was pretreated with terazosin, losartan, atenolol and levetiracetam for 2 weeks. Dexmedetomidine was started in the preoperative waiting area, and a combination of dexmedetomidine and(More)