Learn More
For the Personal Cloud Storage, security is an important issue. There is latent threat when it comes to the data loss or leakage which may be committed by malicious Cloud Service Provider (CSP) employee. The most basic solution is to encrypt user's data. However, when the encryption key is directly managed by CSP or user's device, then there is latent(More)
There are various kinds of sensor network implementations on the Earth. They are different with respect to the topology, communication protocol between nodes, sensor types supported, sensing value types, etc. In addition to these sensor networks, RFID and mobile RFID is the member of a ubiquitous sensor network infrastructure (called as USN in Korea). To(More)
sharing scheme is a cryptographic technology that safely manages password keys by dividing them into segments. Existing (k, n) threshold secret sharing scheme has a problem of allowing recovery of original secret information by collecting k or more random segments among divided secret information segments. To resolve such problem, this paper proposes a one(More)
The ubiquitous computing environment has been realized with the proliferation of wireless communication technologies, which has improved our lives in many ways. A mobile ecosystem is a representative example. We are using various services with a smartphone based on the well-organized wireless network. However, the development of the smartphone environment(More)
As distributed denial-of-service (DDoS) attacks have caused serious economic and social problems. In this paper, we propose the Service-oriented DDoS Detection Mechanism using a Pseudo State (SDM-P), which runs on network devices to defend against DDoS attacks without sacrificing performance in terms of data forwarding. In addition, we verified the(More)
Mobile RFID is a new application that provides a valuable service to users with mobile communication. Current RFID authentication schemes are not viable to use in mobile RFID environment. Since unlike in regular RFID environments, whereas the communication channel between the server and the reader is assumed to be secure, the communication channel between(More)
We have developed a user-level dynamic binary instrumentation (DBI) tool on ARM architecture to enable applying various analysis techniques such as performance evaluation, profiling, and bug detection. Most of existing DBI tools are based on the x86 architecture. As demands for the similar approaches mainly performed in x86 are getting higher in an embedded(More)
In the environment like the Cloud computing or the picture archiving and communications systems (PACS) of the hospital, the user’s data is stored in the storage of a third party. In such entrusted management environment, security is an important issue for the user’s private data. The most basic solution is to encrypt user’s private data. However, if the(More)