Hyeran Mun
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hyeran Mun.
Mathematical and Computer Modelling | 2012
Hyeran Mun; Kyusuk Han; YangSun Lee; Chan Yeob Yeun; Hyo Hyun Choi
Abstract User authentication scheme is an important issue for providing secure roaming service to users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous authentication for roaming environment. In this paper, we show weaknesses of Wu–Lee–Tsaur’s schemes such as failing to achieve anonymity and perfect forward secrecy, and disclosing of legitimate user’s password. Therefore, we propose a new enhanced scheme that uses Elliptic Curve Diffie–Hellman (ECDH) to overcome these weaknesses and improve performance. We also demonstrate that our scheme not only overcomes these weaknesses but also provides mutual authentication and resistance to a man-in-the-middle attack. Compared with previous schemes that use public key cryptosystem with certificates, our scheme is more efficient. Moreover, our scheme does not use timestamps, so it is not required to synchronize the time.
ubiquitous computing | 2012
Kyusuk Han; Hyeran Mun; Taeshik Shon; Chan Yeob Yeun; Jong Hyuk Park
Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management problems have arisen, because the public key computation is still the large overhead to USIM, and the mobile equipment has potential threats of the key leakage or loss. In order to solve such shortcomings, we improve the key-insulated models and propose “Trust Delegation” model that the overall security computations are operated in ME, while the initial private key still remains in the secure storage in USIM. Our model is resilient against not only key exposure but also key loss. Finally, we show that the overall transactions can be reduced to one-third than current 3GPP Generic Authentication Architecture.
multimedia and ubiquitous engineering | 2010
Hyeran Mun; Sin-Hyo Kim; Jung Yeon Hwang; Byung Ho Chung
In this paper, we propose a privacy-enhanced contents sharing mechanism with SRM. For user anonymity, our approach makes use of anonymously authenticated key exchange based on group signature schemes. In addition, our mechanism not only provides anonymous authentication and key exchange, but also supports a variety of anonymous access control.
Archive | 2011
Yun-Kyung Lee; Sin Hyo Kim; Byung Ho Chung; Hyeran Mun; Sang-Woo Lee; Sokjoon Lee; Jung Yeon Hwang; Gun Tae Bae; Hyun Sook Cho
Archive | 2011
Jung Yeon Hwang; Sokjoon Lee; Gun Tae Bae; Byung Ho Chung; Sin Hyo Kim; Yun-Kyung Lee; Sang-Woo Lee; Hyeran Mun; Hyun Sook Cho
Archive | 2011
Yun-Kyung Lee; Sin Hyo Kim; Byung Ho Chung; Sang Woo Lee; Hyeran Mun; Sokjoon Lee; Gun Tae Bae; Jung Yeon Hwang; Hyun Sook Cho
Archive | 2011
Jung Yeon Hwang; Sokjoon Lee; Gun Tae Bae; Yun-Kyung Lee; Hyeran Mun; Sang-Woo Lee; Sin Hyo Kim; Byung Ho Chung; Hyrun Sook Cho
Archive | 2011
Sokjoon Lee; Jung-Yeon Hwang; Gun-Tae Bae; Byungho Chung; Sin-Hyo Kim; Hyeran Mun; Sang-Woo Lee; Yun-Kyung Lee; Hyun-Sook Cho
Archive | 2011
Sin-Hyo Kim; Yun-Kyung Lee; Byungho Chung; Hyeran Mun; Sang-Woo Lee; Sokjoon Lee; Jung-Yeon Hwang; Gun-Tae Bae; Hyun-Sook Cho
Archive | 2011
Sang-Woo Lee; Yun-Kyung Lee; Sin Hyo Kim; Byung Ho Chung; Hyeran Mun; Sokjoon Lee; Gun Tae Bae; Jung Yeon Hwang; Hyun Sook Cho