Learn More
Face image retrieval is an important issue in the practical applications such as mug shot searching and surveillance systems. However, it is still a challenging problem because face images are fairly similar due to the same geometrical configuration of facial features. In this paper, we present a face image retrieval method which is robust to the variations(More)
While users increasingly use such large multimedia data, more people use the cloud computing technology. It is necessary to manage large data in an efficient way, and to consider transmission efficiency for multimedia data of different quality. To this end, an important thing is to ensure efficient distribution of important resources (CPU, network and(More)
Repackaging is the one of the most common techniques used by Android malwares. Recently, as one approach to prevent the repackaged malwares, it is considered to use the trust agency that guarantees the app developer. However, these approaches have no or limited secure channel to deploy the guaranteed apps. No secure channel poses another security issue of(More)
Recently, smart home appliances and wearable devices have been developed through many companies. Most devices can be interacted with various sensors, have communication function to connect the Internet by themselves. Those devices will provide a wide range of services to users through a mutual exchange of information. However, due to the nature of the IoT(More)
In various computing environments, hardware security modules are needed for protecting cryptographic keys and security services from threats of information leakage. For that protection, the modules normally have the methods of password-based access control and message encryption. Nowadays, a password itself can be easily exposed by a variety of password(More)
While the number of smartphones increased, the security threats such as violating privacy and malicious code in smart environment increased. In general, the software security scheme is mainly used to protect mobile device from the security threat. However, this security scheme can be easily manipulated and changed. In this paper, we propose MTM hardware(More)
Recently emerging mobile devices have powerful capabilities and access personal and private data ever than before. Whenever we want to use various services, we would encounter unexpected security problems unless we carefully approve and manage app's permissions. To make secure execution environment for users or apps, we propose strict and light-weight(More)
Recently users want to have more powerful devices and capabilities to satisfy their demands ever than before. However, there are many vulnerabilities caused by uncontrolled and over-privileged permission at run time. Without this concern to correctly control the permission at execution time, we propose dynamically enforce permission technique in the paper.(More)