Do Won Hong
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Do Won Hong.
Science in China Series F: Information Sciences | 2010
Do Won Hong; Je Yoon Kim; Sang Uk Shin
In this paper, we propose the authentication mechanism for a handoff in cdma2000-WiBro interworking environment. In the interworking environment, the handoff procedure requires the authentication on MS for the access control and the accounting. In the handoff procedure, it is required to perform the EAP-AKA authentication process with cdma2000-HN (home network) because TN (target network) does not have the information for the authentication about MS. This process has relatively long delay. Therefore, the fast handoff authentication mechanism for reducing the long delay in the handoff procedure is needed. Thus this paper proposes the handoff authentication method of using the reactive context transfer and ticket forwarding method, to provide the fast handoff in cdma2000-WiBro interworking environment. The proposed scheme satisfies security requirements on handoff and has the advantage of low signaling overhead in handoff authentication.
international conference on future generation communication and networking | 2007
Sang Su Lee; Ku-Young Chang; Deokgyu Lee; Do Won Hong
In this paper, we discuss a simple encryption scheme in which a secret file is encrypted twice: one by a common encryption algorithm like AES and another by XOR. Despite the first key is revealed by guessing or dictionary-based attack, the attacker can not reconstruct the original secret until knows the files used to derive the second key block according to our scheme. We also give an explanation about the tool in which the proposed scheme is implemented. It consists of 1 main module and 5 sub-modules: main routine, command parser, file 10, buffer manager, cipher, and time handler. The design goals of the tool include encrypting a file with or without the second encryption and modifying times tamp values such as MAC time information. In addition, the second key can be derived from 3 files at most which are selected and specified as input arguments by a user.
Archive | 2010
Jooyoung Lee; Sung Kyong Un; Youngsoo Kim; Geon Kim; Sang Su Lee; Su Hyung Jo; Youn Hee Gil; Woo Yong Choi; Do Won Hong; Hyun Sook Cho
Archive | 2007
Keonwoo Kim; Tae Jun Park; Do Won Hong; Kyo Il Chung
Archive | 2006
Hang Rok Lee; Do Won Hong; Howon Kim
Archive | 2011
Youn Hee Gil; Jooyoung Lee; Su Hyung Jo; Youngsoo Kim; Keon Woo Kim; Sang Su Lee; Woo Yong Choi; Sung Kyong Un; Do Won Hong; Hyun Sook Cho
Archive | 2009
Jooyoung Lee; Su Hyung Jo; Youn-Hee Gil; Youngsoo Kim; Keonwoo Kim; Sang Su Lee; Sung Kyong Un; Do Won Hong
Archive | 2002
Ho Won Kim; Yong Je Choi; Heui Su Ryu; Moo Seop Kim; Do Won Hong; Kyo Il Chung; Young Soo Park
Archive | 2012
Jooyoung Lee; Youn Hee Gil; Do Won Hong; Keon Woo Kim; Youngsoo Kim; Sung Kyong Un; Sang Su Lee; Su Hyung Jo; Woo Yong Choi; Hyun Sook Cho
Archive | 2011
Nam-Su Jho; Do Won Hong