Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Min-kyu Choi is active.

Publication


Featured researches published by Min-kyu Choi.


International Conference on Security Technology | 2009

Symmetric-Key Encryption for Wireless Internet SCADA

Rosslin John Robles; Min-kyu Choi

Traditionally SCADA is connected only in a limited private network. With new technology and facilities, there are also demands of connecting SCADA though the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data viewing and generation. Aside from connecting SCADA to the internet, there are also operators who want to connect their system wirelessly. This can save budget for communication lines. Along with the advantages it brings, are security issues regarding wireless internet SCADA. In this paper, we discuss internet SCADA, its connection through wireless communication and the security issues surrounding it. To answer the security issues, a symmetric-key encryption for wireless internet SCADA is proposed.


2008 International Symposium on Ubiquitous Multimedia Computing | 2008

Application of Role-Based Access Control for Web Environment

Rosslin John Robles; Min-kyu Choi; Sang-Soo Yeo; Tai-hoon Kim

Most access control approaches are based on individual users. Access control should also cover the enterprise wide systems. Role-based access control (RBAC) with the support of cookies is the solution to this problem. Cookies can be used to support RBAC on the Web by storing userspsila role information. However, cookies also have some technical drawbacks. In particular, they do not always accurately identify users or they can be used for security attacks. In this paper, we discuss the implementation of role-based access control with role hierarchies on the Web by secure cookies.


2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security | 2009

Research on Critical Infrastructures and Critical Information Infrastructures

Feruza Sattarova Yusufovna; Farkhod Alisherov Alisherovich; Min-kyu Choi; Eun-suk Cho; Furkhat Tadjibayev Abdurashidovich; Tai-hoon Kim

A research on current condition and problems of critical infrastructures and critical information infrastructures is described in this paper. This article includes issues, the discussion of problems and comments about each of the common Critical Infrastructures from an international, national, local and individual perspective. There are many threats to these infrastructures. And it remains a challenge to the society to deliver solutions to problems such as these. Also the situation in Korea on each sector of Critical Infrastructure is considered in the article.


2009 International e-Conference on Advanced Science and Technology | 2009

A Paradigm Solution to P2P Security Issues

Rosslin John Robles; Min-kyu Choi; Eun-suk Cho

File sharing is a common practice since the introduction of computer networks. It involves using technology that allows network users to share files that are stored on their individual computers. Peer-to-peer or simply P2P applications, such as those used to share multimedia files, are some of the most common forms of file-sharing technology. However, P2P applications are vulnerable to security risks that may put your information or your computer in jeopardy. In this paper, Issues and solution in P2P Sharing are discussed. We also suggest a method in file sharing which include the splitting of the file into chunks before the sending process. Our methods process and applicability is also covered.


International Conference on Security-Enriched Urban Computing and Smart Grid | 2010

Hybridization of GA and ANN to Solve Graph Coloring

Timir Maitra; Anindya Jyoti Pal; Min-kyu Choi; Tai-hoon Kim

A recent and very promising approach for combinatorial optimization is to embed local search into the framework of evolutionary algorithms. In this paper, we present one efficient hybrid algorithms for the graph coloring problem. Here we have considered the hybridization of Boltzmann Machine (BM) of Artificial Neural Network with Genetic Algorithms. Genetic algorithm we have used to generate different coloration of a graph quickly on which we have applied boltzmann machine approach. Unlike traditional approaches of GA and ANN the proposed hybrid algorithm is guranteed to have 100% convergence rate to valid solution with no parameter tuning. Experiments of such a hybrid algorithm are carried out on large DIMACS Challenge benchmark graphs. Results prove very competitive. Analysis of the behavior of the algorithm sheds light on ways to further improvement.


2008 Advanced Software Engineering and Its Applications | 2008

Design Diverse-Multiple Version Connector: A Fault Tolerant Component Based Architecture

Farzana Yousuf; Aamer Nadeem; Zahid Zaman; Tai-hoon Kim; Min-kyu Choi

Component based software engineering (CBSE) is a new archetype to construct the systems by using reusable components ldquoas it isrdquo. To achieve high dependability in such systems, there must be appropriate fault tolerance mechanism in them at the architectural level. This paper presents a fault tolerant component based architecture that relies on the C2 architectural style and is based on design diverse and exception handling fault tolerance strategies. The proposed fault tolerant component architecture employs special-purpose connectors called design diverse-multiple version connectors (DD-MVC). These connectors allow design diverse n-versions of components to run in parallel. The proposed architecture has a fault tolerant connector (FTC), which detects and tolerates different kinds of errors. The proposed architecture adjusts the tradeoff between dependability and efficiency at run time and exhibits the ability to tolerate the anticipated and unanticipated faults effectively. The applicability of proposed architecture is demonstrated with a case study.


international conference on future generation information technology | 2012

Secure contents design and implement of smart home management system in OISCS

Min-kyu Choi; Goreti Marreiros; Myunggwon Hwang; Zita Vale; Hoon Ko

Optimal Intelligent Supervisory Control System (OISCS) is the program which has an evaluation / a monitor and a control functions for home / office devices from outdoor [1][2]. For their controlling, we usually use Mobile Devices (MD). Also, we can avoid energy wasting by using MDs. However, because they use a network system, all security problems will belong to MDs such as a man in the middle attack. If attackers take transferring contents between MDs and a home/a office, they can see inside. It will be potential troubles. To avoid it, we designed and implemented to all contents which are transferring in network.


AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology | 2010

Directed graph pattern synthesis in LSB technique on video steganography

Debnath Bhattacharyya; Arup Kumar Bhaumik; Min-kyu Choi; Tai-hoon Kim

In this paper, we propose a data hiding and extraction procedure for high resolution AVI videos. Although AVI videos are large in size but it can be transmitted from source to target over network after processing the source video by using these Data hiding and Extraction procedure securely. There are two different procedures, which are used here at the senders end and receivers end respectively. The procedures are used here as the key of Data Hiding and Extraction.


Archive | 2009

Biometric Authentication: A Review

Debnath Bhattacharyya; Rahul Ranjan; A Farkhod Alisherov; Min-kyu Choi


Archive | 2008

Wireless Network Security: Vulnerabilities, Threats and Countermeasures

Min-kyu Choi; Rosslin John Robles; Chang-hwa Hong; Tai-hoon Kim

Collaboration


Dive into the Min-kyu Choi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge