Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Do Won Hong is active.

Publication


Featured researches published by Do Won Hong.


Science in China Series F: Information Sciences | 2010

Authentication mechanism for fast handoff in cdma2000-WiBro interworking

Do Won Hong; Je Yoon Kim; Sang Uk Shin

In this paper, we propose the authentication mechanism for a handoff in cdma2000-WiBro interworking environment. In the interworking environment, the handoff procedure requires the authentication on MS for the access control and the accounting. In the handoff procedure, it is required to perform the EAP-AKA authentication process with cdma2000-HN (home network) because TN (target network) does not have the information for the authentication about MS. This process has relatively long delay. Therefore, the fast handoff authentication mechanism for reducing the long delay in the handoff procedure is needed. Thus this paper proposes the handoff authentication method of using the reactive context transfer and ticket forwarding method, to provide the fast handoff in cdma2000-WiBro interworking environment. The proposed scheme satisfies security requirements on handoff and has the advantage of low signaling overhead in handoff authentication.


international conference on future generation communication and networking | 2007

A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme

Sang Su Lee; Ku-Young Chang; Deokgyu Lee; Do Won Hong

In this paper, we discuss a simple encryption scheme in which a secret file is encrypted twice: one by a common encryption algorithm like AES and another by XOR. Despite the first key is revealed by guessing or dictionary-based attack, the attacker can not reconstruct the original secret until knows the files used to derive the second key block according to our scheme. We also give an explanation about the tool in which the proposed scheme is implemented. It consists of 1 main module and 5 sub-modules: main routine, command parser, file 10, buffer manager, cipher, and time handler. The design goals of the tool include encrypting a file with or without the second encryption and modifying times tamp values such as MAC time information. In addition, the second key can be derived from 3 files at most which are selected and specified as input arguments by a user.


Archive | 2010

Remote forensics system based on network

Jooyoung Lee; Sung Kyong Un; Youngsoo Kim; Geon Kim; Sang Su Lee; Su Hyung Jo; Youn Hee Gil; Woo Yong Choi; Do Won Hong; Hyun Sook Cho


Archive | 2007

DEVICE AND METHOD OF ELECTRONIC VOTING USING MOBILE TERMINAL

Keonwoo Kim; Tae Jun Park; Do Won Hong; Kyo Il Chung


Archive | 2006

Tag authentication apparatus and method for radio frequency identification system

Hang Rok Lee; Do Won Hong; Howon Kim


Archive | 2011

METHOD FOR DATA ANALYSIS AND DIGITAL FORENSICS AND SYSTEM USING THE SAME

Youn Hee Gil; Jooyoung Lee; Su Hyung Jo; Youngsoo Kim; Keon Woo Kim; Sang Su Lee; Woo Yong Choi; Sung Kyong Un; Do Won Hong; Hyun Sook Cho


Archive | 2009

APPARATUS AND METHOD FOR COLLECTING EVIDENCE DATA

Jooyoung Lee; Su Hyung Jo; Youn-Hee Gil; Youngsoo Kim; Keonwoo Kim; Sang Su Lee; Sung Kyong Un; Do Won Hong


Archive | 2002

Encryption apparatus applying kasumi encryption algorithm

Ho Won Kim; Yong Je Choi; Heui Su Ryu; Moo Seop Kim; Do Won Hong; Kyo Il Chung; Young Soo Park


Archive | 2012

Forensic index method and apparatus by distributed processing

Jooyoung Lee; Youn Hee Gil; Do Won Hong; Keon Woo Kim; Youngsoo Kim; Sung Kyong Un; Sang Su Lee; Su Hyung Jo; Woo Yong Choi; Hyun Sook Cho


Archive | 2011

ORDER-PRESERVING ENCRYPTION AND DECRYPTION APPARATUS AND METHOD THEREOF

Nam-Su Jho; Do Won Hong

Collaboration


Dive into the Do Won Hong's collaboration.

Top Co-Authors

Avatar

Sang Su Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sung Kyong Un

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyun Sook Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Su Hyung Jo

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Woo Yong Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Youngsoo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Keonwoo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ku Young Chang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kyo Il Chung

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge