Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seo-Il Kang is active.

Publication


Featured researches published by Seo-Il Kang.


international conference on computational science and its applications | 2006

Authentication for single/multi domain in ubiquitous computing using attribute certification

Deok-Gyu Lee; Seo-Il Kang; Dae-Hee Seo; Im-Yeong Lee

The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) and user ownself space (SD: Single Domain) that realize authentication through device in case of moved users direct path who device differs.


international conference on hybrid information technology | 2006

A Study on the Electronic Voting System using blind Signature for Anonymity

Seo-Il Kang; Im-Yeong Lee

Development of IT has accelerated the establishment of electronic government, and convenience and efficiency have been enhanced by providing services of civil affairs and government and public offices to the people thru the internet. The electronic government service has been required to not only the service of civil affairs but also the electronic service of the voting system based on the democratic principle. Electronic voting system creates and manages data, so that it should not influence on the result of voting due to the interruption of third party or system error. Therefore, in order to study safe electronic voting system, the existing scheme of providing anonymity should be studied and anonymous and receipt-free system should be provided by utilizing the method of blind signature . Also, an eligible voter can know the result of voting by providing the paper receipt.


2008 International Symposium on Ubiquitous Multimedia Computing | 2008

Mobile Network Service Using Ticket Issuance in the AAA System

Seo-Il Kang; Deok-Gyu Lee; Im-Yeong Lee

A ubiquitous network environment is a system where the user can avail of the networkpsilas services anytime, anywhere. This service is referred to as authentication, authorization, accounting (AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with the authentication and efficiency of the mobile device. In a one method is that is required the mobile device contacts to the home authentication server through the external authentication server every time. Another one is to use a medium server to provide authentication between them. Thus, this paper aims to determine the best method to use ticketing, where tickets are provided through a mobile device by completing authentication and authorization features. Also, it can efficiently provide mobile verification processing.


international conference on computational science and its applications | 2005

A study on the e-cash system with anonymity and divisibility

Seo-Il Kang; Im-Yeong Lee

The micropayment system offers ways of payment in electronic commercial trades in accordance with the purchase of a commodity. The ways of payment include credit cards, on-line money transfer, electronic cash, and others. Electronic cash has been developed to complement the weaknesses of real currency for the sake of electronic commercial trades, and has many requirements and security measures to be met so as to be used like real currency. The author has analyzed the anonymity of electronic cash, among the many requirements and security measures, in order to come up with effective and safe ways to offer anonymity for the micropayment system.


computer science and its applications | 2009

Group Key Management Using Device ID in Ad-hoc Network

Jong Sik Moon; Im-Yeong Lee; Seo-Il Kang

An arbitrary mobile device configures Ad-hoc network to provide the transmission of a data and services using wireless communications. A mobile device requires authentication and encryption key management to securely communicate in the Adhoc network. This paper examines the trend of the authentication in the Ad-hoc network and the group key management and suggests the method for ID-based mutual authentication and group key establishment. ID-based mutual authentication in proposed scheme uses zero knowledge in the absence of shared information and is applied to establish a session key and group key. In addition, the proposed scheme is applied to Ad-hoc network to increase the efficiency and security. KeywordsGroup key management; authentication; zero knowledge; Ad-hoc network


The Kips Transactions:partc | 2008

A Study on User Authentication for Roaming in Mobile Device

Seo-Il Kang; Choon-Sik Park; Im-Yeong Lee

ABSTRACT In ubiquitous environment, a user has been provided with service and mobility using various devices. The users’ network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc…) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.Keywords:Roaming, Authentication, Mobile Device, Security protocol (그림 1) 무선 통신 서비스의 흐름도 1. 서 론 1) IT기술의 발달로 사용자는 다양한 모바일 디바이스(모바일 폰, PDA, 노트북 등)를 이용 하며 길거리나 기차, 도서관 등 여러 장소에서 무선 통신 서비스를 제공 받을 수 있다. (그림 1 참조)모바일 디바이스는 와이브로, HSDPA(High Speed DownlinkPacket Access), 무선 랜 등의 무선 통신 기술을 이용한다[1,2,6]. 사용자의 인증 및 보안 기술은 무선 통신에 따라 차별성을 갖는데 모바일 폰의 경우 통신 회사의 인증 센터 및 3G 통신에서는 USIM(Universal Subscriber Identity Module)카드를 이용한다. 무선 랜의 경우 인증 서버인


conference on multimedia modeling | 2007

A study on key distribution and ID registration in the AAA system for ubiquitous multimedia environments

Seo-Il Kang; Deok-Gyu Lee; Im-Yeong Lee

Media environment has been rapidly changed these days. Internet provides multimedia environment and has become a part of our everyday life as a new advertisement media. Authentication methods typically involve an authentication server in the home network from the authentication server of the external network, and then the external network is notified with the authentication result in the home authentication server. This paper discusses and proposes a key distribution protocol that ca be used when the user moves the external network and to ensure secure communication with the external authentication server. As the proposed technology does not receive the reissue of authentication from the home authentication server in case moving between the external authentications servers, authentication server overload can be reduced and the home network can be made to issue the key using the registered password.


Journal of Korea Multimedia Society | 2009

A Study on Group Key Management based on Mobile Device ID in Ad-hoc network

Seo-Il Kang; Nam-Hoon Lee; Im-Yeong Lee


Journal of Korea Multimedia Society | 2008

A Study on Efficient Routing and Authentication Scheme in Ad-Hoc Environment

Seo-Il Kang; Im-Yeong Lee


information security and cryptology | 2007

A Study on Network Service Using Authorization Ticket in AAA system

Seo-Il Kang; Im-Yeong Lee

Collaboration


Dive into the Seo-Il Kang's collaboration.

Top Co-Authors

Avatar

Im-Yeong Lee

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Deok-Gyu Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dae-Hee Seo

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Jong Sik Moon

Soonchunhyang University

View shared research outputs
Researchain Logo
Decentralizing Knowledge