MoonSang Kwon

  • Citations Per Year
Learn More
Normally computer users use a passphrase or a password to encrypt secret values in computer systems. In this case, to prevent the brute–force attack, the password should be long enough and difficult to guess. But, such kind of passwords are also difficult for the human beings to remember. In this paper, we propose a method for protecting secret keys. A(More)
One of the popular network security programs supporting host access control is the ’TCP Wrapper’ [13]. TCP Wrapper is a software–only system and many computers connected to the Internet are using it. But, TCP Wrapper does ’IP address–based’ access control. IP address is not such a reliable source when authenticating a host. In this paper, we point out two(More)
  • 1