YoungIl Kim

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In 2012, Sonwanshi et al. proposed an efficient smart card based remote user authentication scheme using hash function. They claimed that the scheme resists most current possible attacks. However, in the following year, Das et al. found that Sonwanshi et al.'s scheme is vulnerable to offline password guessing attack. In this paper, we point out that there(More)
ion There are several laboratory-based mobile wireless testbeds such as the MeshTest and the CMU Wireless Emulator. These testbeds provide powerful computing network platforms for users who want to perform controlled, repeatable, mobile experiments in the lab. However, such systems can only use 10-15 nodes in an experiment. The Virtual Mesh Testbed (VMT)(More)
—Security of ubiquitous computing systems is becoming more important along with extensive spread of the Internet applications. In this paper, we propose a key generation method for one-time password of Mobile-OTP systems by employing changed location and angle of fingerprint features. Fingerprint, as one powerful personal authentication tool, can create(More)
— The purpose of this study was to propose the method to recognize gestures based on inertia sensor which recognizes the movements of the user using inertia sensor, simulated gesture recognition improvement using various neural network learning algorithms (Backpropagation, Fast-Backpropagation, and Levenberg-Marquardt) and lets the user enjoy the game by(More)
  • 1