Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hyeran Mun is active.

Publication


Featured researches published by Hyeran Mun.


Mathematical and Computer Modelling | 2012

Enhanced secure anonymous authentication scheme for roaming service in global mobility networks

Hyeran Mun; Kyusuk Han; YangSun Lee; Chan Yeob Yeun; Hyo Hyun Choi

Abstract User authentication scheme is an important issue for providing secure roaming service to users of mobile devices. In 2008, Wu, Lee and Tsaur proposed an enhanced anonymous authentication for roaming environment. In this paper, we show weaknesses of Wu–Lee–Tsaur’s schemes such as failing to achieve anonymity and perfect forward secrecy, and disclosing of legitimate user’s password. Therefore, we propose a new enhanced scheme that uses Elliptic Curve Diffie–Hellman (ECDH) to overcome these weaknesses and improve performance. We also demonstrate that our scheme not only overcomes these weaknesses but also provides mutual authentication and resistance to a man-in-the-middle attack. Compared with previous schemes that use public key cryptosystem with certificates, our scheme is more efficient. Moreover, our scheme does not use timestamps, so it is not required to synchronize the time.


ubiquitous computing | 2012

Secure and efficient public key management in next generation mobile networks

Kyusuk Han; Hyeran Mun; Taeshik Shon; Chan Yeob Yeun; Jong Hyuk Park

Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management problems have arisen, because the public key computation is still the large overhead to USIM, and the mobile equipment has potential threats of the key leakage or loss. In order to solve such shortcomings, we improve the key-insulated models and propose “Trust Delegation” model that the overall security computations are operated in ME, while the initial private key still remains in the secure storage in USIM. Our model is resilient against not only key exposure but also key loss. Finally, we show that the overall transactions can be reduced to one-third than current 3GPP Generic Authentication Architecture.


multimedia and ubiquitous engineering | 2010

A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM)

Hyeran Mun; Sin-Hyo Kim; Jung Yeon Hwang; Byung Ho Chung

In this paper, we propose a privacy-enhanced contents sharing mechanism with SRM. For user anonymity, our approach makes use of anonymously authenticated key exchange based on group signature schemes. In addition, our mechanism not only provides anonymous authentication and key exchange, but also supports a variety of anonymous access control.


Archive | 2011

CONTENT PROTECTION APPARATUS AND CONTENT ENCRYPTION AND DECRYPTION APPARATUS USING WHITE-BOX ENCRYPTION TABLE

Yun-Kyung Lee; Sin Hyo Kim; Byung Ho Chung; Hyeran Mun; Sang-Woo Lee; Sokjoon Lee; Jung Yeon Hwang; Gun Tae Bae; Hyun Sook Cho


Archive | 2011

Authentication system and authentication method using barcodes

Jung Yeon Hwang; Sokjoon Lee; Gun Tae Bae; Byung Ho Chung; Sin Hyo Kim; Yun-Kyung Lee; Sang-Woo Lee; Hyeran Mun; Hyun Sook Cho


Archive | 2011

DATA ENCODING AND DECODING APPARATUS AND METHOD THEREOF FOR VERIFYING DATA INTEGRITY

Yun-Kyung Lee; Sin Hyo Kim; Byung Ho Chung; Sang Woo Lee; Hyeran Mun; Sokjoon Lee; Gun Tae Bae; Jung Yeon Hwang; Hyun Sook Cho


Archive | 2011

GROUP SIGNATURE SYSTEM AND METHOD PROVIDING CONTROLLABLE LINKABILITY

Jung Yeon Hwang; Sokjoon Lee; Gun Tae Bae; Yun-Kyung Lee; Hyeran Mun; Sang-Woo Lee; Sin Hyo Kim; Byung Ho Chung; Hyrun Sook Cho


Archive | 2011

METHOD OF VERIFYING KEY VALIDITY AND SERVER FOR PERFORMING THE SAME

Sokjoon Lee; Jung-Yeon Hwang; Gun-Tae Bae; Byungho Chung; Sin-Hyo Kim; Hyeran Mun; Sang-Woo Lee; Yun-Kyung Lee; Hyun-Sook Cho


Archive | 2011

CONTENT PROTECTION APPARATUS AND METHOD USING BINDING OF ADDITIONAL INFORMATION TO ENCRYPTION KEY

Sin-Hyo Kim; Yun-Kyung Lee; Byungho Chung; Hyeran Mun; Sang-Woo Lee; Sokjoon Lee; Jung-Yeon Hwang; Gun-Tae Bae; Hyun-Sook Cho


Archive | 2011

Method and system for tracking illegal distributor and preventing illegal content distribution

Sang-Woo Lee; Yun-Kyung Lee; Sin Hyo Kim; Byung Ho Chung; Hyeran Mun; Sokjoon Lee; Gun Tae Bae; Jung Yeon Hwang; Hyun Sook Cho

Collaboration


Dive into the Hyeran Mun's collaboration.

Top Co-Authors

Avatar

Byung Ho Chung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sokjoon Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Yun-Kyung Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jung Yeon Hwang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sang-Woo Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Gun Tae Bae

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sin Hyo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyun Sook Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sin-Hyo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge