Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seung-Hwan Ju is active.

Publication


Featured researches published by Seung-Hwan Ju.


BioMed Research International | 2013

A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

Seung-Hwan Ju; Hee Suk Seo; Sunghyu Han; Jae-Cheol Ryou; Jin Kwak

The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the users fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.


Journal of Internet Technology | 2013

Study on Analysis Methodology for Android Applications

Seung-Hwan Ju; Hee Suk Seo; Jin Kwak

The advance in technology brought us mobile phones with almost the same power and features as our personal computers. Something that criminal minds will find a way to exploit for their gain as the history has shown. The main contents of the information paradigm are the ”open” and ”standard.” Full security incidents account for more than 80 percent of the internal information security incidents (abuse of information resources and information leakage, etc.), damages the value of information assets has increased rapidly. Mobile malware is rapidly becoming a serious threat. In this paper, I survey the current state of mobile malware. As I classified according to behavioral characteristics and propagation and understood the history mobile evolution. Also, I present Android Application analysis methodology for the more securing smart-work environment.


Journal of the Korea Society for Simulation | 2011

Password Based User Authentication Methodology Using Multi-Input on Multi-Touch Environment

Seung-Hwan Ju; Heesuk Seo

ABSTRACTNowaday, Many equipments like TabletPC, Digital kiosk, ATM using touch-panel service instead of keyboard or button, to support intuitively input for user. Furthermore these days touch-panels recognize up to 5 contact points using recent technology. On this study, I Introduce password input/store methodology on multi-touch environment. On past, User must input password 1 character by 1 character, like [1, 2, 3, 4]. but, on multi-touch environment user can input more than one character at the same time, like [(1,3), 2, (3,4), (1,2,3)]. In result, users can use password more intensely. This study is utilized post security technology study on multi-touch environment. Key words : Multi-touch, Password, User authentication요 약현재 타블렛PC, 전자칠판, 디지털 키오스크 단말 , 은행 ATM기기 등에서 키보드 및 버튼이 아닌 터치패널을 이용해 사용자가 더욱 직관적인 입력을 할 수 있도록 지원하고 있다 . 나아가 이러한 터치패널은 하나의 접점만 인식하는 것이 아닌 현재 기술로 여러 개 접점을 인식하는 멀티터치 방식을 채택하고 있다 . 본 연구에서는 이러한 멀티터치 환경에서의 비밀번호 입력 및 저장방식에 관한 아이디어를 소개하고 시뮬레이션 해보았다 . 이전의 싱글터치 기반에서 1글자씩 입력되던 비밀번호가 멀티터치 기반에서는 2개 이상의 글자로 입력될 수 있다 . 멀티터치 기반의 패스워드 입력은 단순히 [1, 2, 3, 4]로 입력되던 패스워드를 [(1,3), 2, (3,4), (1,2,3)]와 같이 동시에 여러 숫자를 입력하는 방식으로 설정함으로써 사용자 패스워드의 보안 강도를 높였다. 또한 사용자로 하여금 패스워드 입력의 복잡성을 높여 패스워드의 물리적 노출 위험을 줄이려 하였다 . 본 연구는 나아가 멀티터치 기반에서 사용자 인증을 위한 보안 기술 연구의 초석으로 활용 될 것이다 .주요어 : 멀티터치, 패스워드, 사용자 인증


Multimedia Tools and Applications | 2016

Research on android malware permission pattern using permission monitoring system

Seung-Hwan Ju; Hee Suk Seo; Jin Kwak

Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout.This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloadedThe pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. This study is a service-based malware analysis, it will be based on the mobile security study.


Journal of the Korea Society of Computer and Information | 2012

A study on User Authentication Technology of Numeric based Pattern Password

Seung-Hwan Ju; Heesuk Seo


International journal of security and its applications | 2016

Meter-HES Mutual Authentication in the Smart Grid AMI Environment

Seung-Hwan Ju; Young-in Park; Sang-gyoo Sim; Myung-chul Lim; Sunghyu Han; Hee Suk Seo


Journal of the Korea Society of Computer and Information | 2012

Sensor-based Alert System applying Expert System for Performance Improvement

Seung-Hwan Ju; Heesuk Seo


Journal of the Korea Society of Digital Industry and Information Management | 2016

Light 3D Modeling with mobile equipment

Seung-Hwan Ju; Heesuk Seo; Sunghyu Han


International journal of database theory and application | 2016

Research on Big Data-Based E-Learning Contents Authoring Services

Seung-Hwan Ju; Sunghyu Han; Hee Suk Seo


International Journal of Software Engineering and its Applications | 2016

HTML5-based Dashboard UI Builder for SMEs

Seung-Hwan Ju; Hee Suk Seo; Sunghyu Han

Collaboration


Dive into the Seung-Hwan Ju's collaboration.

Top Co-Authors

Avatar

Hee Suk Seo

Korea University of Technology and Education

View shared research outputs
Top Co-Authors

Avatar

Sunghyu Han

Korea University of Technology and Education

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jin Kwak

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Jae-Cheol Ryou

Chungnam National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge