Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dae-youb Kim is active.

Publication


Featured researches published by Dae-youb Kim.


IEEE Transactions on Consumer Electronics | 2011

Proxy-assisted content sharing using content centric networking (CCN) for resource-limited mobile consumer devices

Ji-Hoon Lee; Dae-youb Kim

Rapid developments in mobile technology have transformed mobile phones into personal multimedia devices. Due to these advancements, user created mobile content is on the increase, both in terms of quality and quantity. In addition, content sharing is getting popular in home networks as well as in social community networks. To keep pace with such movements, the new networking technology named as content centric networking (CCN) optimized for content sharing has appeared. However, it has little consideration for mobile consumer devices. So, this paper indicates that the proxy-based CCN scheme can provide lower communication overhead, shorter download time, and lower energy consumption in mobile environments.


international conference on consumer electronics | 2011

Proxy-based mobility management scheme in mobile content centric networking (CCN) environments

Ji-Hoon Lee; Dae-youb Kim; Myeong-Wuk Jang; Byoung-Joon Lee

The increase of user generated mobile content raises the need of mobile content sharing. Moreover, content centric networking (CCN) is known for the new efficient network architecture appropriate for con tent s haring. However, it has little consideration for mobile devices. So, this p aper indicates that the proxy-based CCN scheme can provide low er communication overhead and shorter download time in mobile environments.


international conference on consumer electronics | 2012

Mobility management for mobile consumer devices in content centric networking (CCN)

Ji-Hoon Lee; Dae-youb Kim; Myeong-Wuk Jang; Byoung-Joon Lee

Due to rapid developments in mobile technology and various multimedia features like messaging, web, and camera, user created mobile content is on the increase and at the same time is shared in real-time. To keep pace with such movements, the new networking technology named content centric networking (CCN) has appeared. However, it does not take mobile consumer devices into consideration. So, this paper proposes a mobility management scheme for mobile consumer devices having content data in CCN environment to provide faster service access latency and lower routing overhead.


international conference on consumer electronics | 2012

Privacy protected content sharing in extended home environment over Content-Centric Networking

Eunah Kim; Dae-youb Kim; Mi-Suk Huh; Byoung-Joon Lee

Today, consumers possess a huge amount of personal contents due to increasing mobile devices and home appliances. This leads to extension of content sharing domain and thus, privacy protection of consumers becomes more important. In this paper, we propose a privacy protection mechanism providing the fine-grained access control on contents in the extended home environment. Our access control scheme is based on content encryption and supports a notion of groups and flexible access policy definition in content hierarchy using Access Control List (ACL). Though our proposed scheme is built on the hierarchical named content following CCN naming, it is also applicable to general hierarchies of named content or file systems as well.


The Kips Transactions:partc | 2008

CAS-based Security System for IPTV

Dae-youb Kim; Hak-soo Ju

ABSTRACT IPTV is well known services of TPS (Triple play service). Since TPS supplies the bundle service, service providers can supply low-priced services for their subscribers. To supply high quality contents stably, it is an essential requirement to make payment for the services. According to the type of services, either CAS or DRM is used to protect the pay-contents service. Also IPTV uses or will use these security systems to protect the service. In this paper, we will describe security problems when a IPTV service provider chooses either CAS or DRM, and then propose a new security system to solve the problems. Key Words: IPTV, CAS, DRM 1. 서 론 1) TPS (Triple Play Service)는 방송, 통신 그리고 데이터 서비스를 하나의 서비스로 구성하여 제공하는 융합 서비스로 IPTV는 TPS의 대표적인 예다. IPTV 서비스는 주문형 서비스(Video on Demand, VoD) 뿐만 아니라 방송 서비스를 인터넷 환경에서 제공할 수 있다는 장점 때문에 다양한 소비 계층의 욕구를 만족시킬 수 있을 것으로 기대되고 있다 [1] . 그러나 이와 같은 서비스의 발전은 콘텐츠의 불법 복사 및 배포라는 새로운 문제에 직면했다. 그러므로 서비스 제공자(Service Provider, SP)가 고품질의 콘텐츠를 안정적으로 공급하기 위해서는 콘텐츠 사용 제어 및 요금 징수를 위한 보안 시스템이 반드시 필요하다. 콘텐츠 보호 및 사용


international conference on consumer electronics | 2012

Secure virtual personal cloud service based on CCN/VPC

Mi-Suk Huh; Dae-youb Kim; Eunah Kim; Byoung-Joon Lee

Content-centric networking based virtual private community (CCN/VPC) has been proposed for easy and secure content sharing between members in extended home domains. In this paper, we further introduce a virtual personal cloud (vpCloud) service based on CCN/VPC, and propose more scalable and intuitive membership management including enrollment process and member list-based association. The proposed enrollment and association mechanism are optimally designed for distributed consumer environment, whereof the service provider support is not necessary. We also propose a revocation process which is included in the membership management.


international conference on consumer electronics | 2010

CAS key distribution model with revocation

Dae-youb Kim; Ji-Hoon Lee; Mi-Suk Huh

To protect digital contents, CAS encrypts the contents with content encryption keys. Hence, it has been a main issue how to manage the content encryption keys efficiently as well as securely. To face this problem, CAS usually uses a hierarchical key structure and distributes the hierarchical keys to subscribers using smart cards. However, since the smart cards can be revoked so that the saved keys can also leak out, CAS should have a scheme to control the leak of the keys. In this paper, to control the revoked cards efficiently, we propose the key distribution model of CAS using a group key management scheme.


The Kips Transactions:partc | 2012

Threshold Encryption Scheme based on Cocks` IBE Scheme

Sergey V. Bezzateev; Dae-youb Kim

Since one of weak points of public crypto-systems is to require the verification of public key, identity based crypto-systems were proposed as an alternative. However, such techniques need a private key generator which can be a single point of failure. To improve such weakness, threshold identity-based crypto-systems were proposed. In this paper, we propose a new threshold identity-based encryption scheme which is constructed to extend an identity-based encryption scheme by Cocks. Since the proposed scheme is based on quadratic residues, it has smaller complexity of encryption. And we prove that the proposed scheme is secure against a chosen identity attack.


2012 XIII International Symposium on Problems of Redundancy in Information and Control Systems | 2012

Threshold identity based encryption scheme on quadratic residues

Alexandra Afanasyeva; Sergey V. Bezzateev; Evgeny Linsky; Vitaly Petrov; Dae-youb Kim

A new threshold identity-based encryption scheme secure against a chosen identity attack is proposed in this paper. The construction extends the identity-based encryption scheme by Cocks.


international conference on consumer electronics | 2010

Adaptive P2P rate control mechanism to balance throughput enhancement and fairness guarantee

Ji-Hoon Lee; Dae-youb Kim; Seungwoo Jeon

This paper proposes an adaptive P2P rate control scheme to provide fairness between P2P traffic and traditional Internet traffics and throughput improvement. The proposed scheme adjusts P2P traffic volume through the temporary transmission interrupts when network experiences congestion.

Collaboration


Dive into the Dae-youb Kim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ji-Hoon Lee

Korea National University of Transportation

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge