Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hyung-jick Lee is active.

Publication


Featured researches published by Hyung-jick Lee.


hawaii international conference on system sciences | 2004

The use of encrypted functions for mobile agent security

Hyung-jick Lee; Jim Alves-Foss; Scott Harrison

Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. The fact that computers have complete control over all the programs makes it very hard to protect mobile agents from untrusted hosts. In this paper we propose a security approach for mobile agents, which protect mobile agents from malicious hosts. Our new approach prevents privacy attacks and integrity attacks to mobile agents from malicious hosts. This approach is an extension of mobile cryptography, as proposed by Sander and Tschudin, and it removes many problems found in the original idea of mobile cryptography while preserving most of the benefits. Although the original idea of mobile cryptography allowed direct computations without decryptions on encrypted mobile agents, it did not provide any practical ways of implementation due to the fact that no homomorphic encryption schemes are found for their approach. Our approach provides a practical idea for implementing mobile cryptography by suggesting a hybrid method that mixes a function composition technique and a homomorphic encryption scheme that we have found. Like the original mobile cryptography, our approach will encrypt both code and data including state information in a way that enables direct computation on encrypted data without decryption.


Archive | 2006

Method and apparatus for saving power by controlling listening periods in wireless telecommunication device having a plurality for power-saving modes

Jae-Min Lee; Ho-Seok Lee; Hyung-jick Lee


Archive | 2008

METHODS OF ENCRYPTING AND DECRYPTING DATA AND BUS SYSTEM USING THE METHODS

Hyung-jick Lee; Jae-Min Lee; Jun-bum Shin


Archive | 2005

Apparatus and method for dynamically managing sub-channels

Seung-seop Shim; Hyung-jick Lee


Archive | 2007

Method and apparatus for checking integrity of firmware

Jin-Mok Kim; Jun-bum Shin; Hyung-jick Lee; Yang-lim Choi


Archive | 2008

Method of merging cells in cognitive radio

Hyung-jick Lee; Ho-Seok Lee; Dae-yong Sim


Archive | 2007

ENCRYPTION-BASED SECURITY PROTECTION METHOD FOR PROCESSOR AND APPARATUS THEREOF

Jin-Mok Kim; Jae-Min Lee; Hyung-jick Lee; Yang-lim Choi; Dae-yong Sim


Archive | 2008

APPARATUS AND METHOD OF TRANSMITTING DATA WHILE SCANNING INCUMBENT USER

Hyung-jick Lee; Ho-Seok Lee; Dae-yong Sim


Web Intelligence and Agent Systems: An International Journal | 2004

The construction of secure mobile agents via evaluating encrypted functions

Hyung-jick Lee; Jim Alves-Foss; Scott Harrison


Archive | 2002

Securing mobile agents through evaluation of encrypted functions

Hyung-jick Lee; Jim Alves-Foss

Collaboration


Dive into the Hyung-jick Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge