Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seung-Jo Han is active.

Publication


Featured researches published by Seung-Jo Han.


international symposium on spread spectrum techniques and applications | 1996

The improved data encryption standard (DES) algorithm

Seung-Jo Han; Heang-Soo Oh; Jongan Park

The cryptosystem which is most used throughout the world for protecting information is the Data Encryption Standard (DES) which was announced by the National Bureau of Standard (NBS). The DES must be stronger than the other cryptosystems in its security. But, because the process time required for cryptanalysis has lessened, and because hardware technique has developed rapidly, the DES may be attacked by various kinds of cryptanalysis using parallel process. It may be especially vulnerable to attack by differential cryptanalysis. Therefore, the DES will require strengthening to ensure cryptographic security in the days to come. This paper proposes design of a DES-like cryptosystem called the Improved-DES. The Improved-DES is a new algorithm. We show that the Improved-DES is stronger than the DES against differential cryptanalysis for cryptographic security. We will divide one data block (96 bits) into 3 sub-blocks of 32 bits and then perform different f functions on each of the 3 sub-blocks, and then increase the S/sub 1/-S/sub 8/ of the S-boxes to S/sub 1/-S/sub 16/, satisfying the strict avalanche criterion (SAC: p/sub i, j/) and the correlation coefficient (p/sub i, j/). Finally we will increase the key length to 112 bits. The analysis will show that the unicity distance (UD) in the Improved-DES is increased more than the DESs UD.


Computers & Mathematics With Applications | 2010

Kerberos based authentication for inter-domain roaming in wireless heterogeneous network

Anish Prasad Shrestha; Dong-You Choi; Goo Rak Kwon; Seung-Jo Han

An increased demand in ubiquitous high speed wireless access has led integration of different wireless technologies provided by different administrative domains creating truly a heterogeneous network. Security is one of the major hurdles in such network environment. As a mobile station moves in and out of the coverage area of one wireless network to another, it needs to be authenticated. The existing protocols for authentication of a mobile station are typically centralized, where the home network participates in each authentication process. It requires home network to maintain roaming agreement with all other visiting networks. Moreover, the round trip time to home network results high latency. This paper is focused on developing authentication protocol for wireless network irrespective of the technologies or the administrative domain. We propose a secure protocol which adopts strong features of Kerberos based on tickets for rigorous mutual authentication and session key establishment along with issuance of token so that the mobile station can have access to not only the roaming partner of home network but also to the roaming partner of previous visited networks. The performance evaluation and comparative analysis of the proposed protocol is carried out with the already implemented standard protocols and most remarkable research works till date to confirm the solidity of the results presented.


Lecture Notes in Computer Science | 2004

Vehicle Tracking Using Image Processing Techniques

Seung Hak Rhee; Seung-Jo Han; Pan Koo Kim; Muhammad Bilal Ahmad; Jong An Park

A real time vehicle tracking in image sequences is presented. The moving vehicles are segmented by the method of differential image followed by the process of morphological dilation. The vehicles are recognized and tracked using statistical moments. The straight lines in the moving vehicles are found with the help of Radon transform. The direction of the moving object is calculated from the orientation of the straight lines in the direction of the principal axes of the moving objects. The direction of the moving object and the displacement of the object in the image sequence are used to calculate the velocity of the moving objects.


2008 International Symposium on Ubiquitous Multimedia Computing | 2008

Evaluation of Secure Multimedia Services over Wireless Access Network

Binod Vaidya; SangDuck Lee; Jongan Park; Seung-Jo Han

With growth of Internet and wireless IP network, multimedia systems can be accessed from any-where and anytime. However, efficient real-time services are open and challenging research problem. To implement real-time services such as VoIP over wireless access network, IP header compression scheme can be used for saving bandwidth. Enhanced compressed RTP (ECRTP) has been used for lossy link and high round trip time, primarily for wireless links. In this paper, we present an efficient solution for header compression, which is modified form of ECRTP. It shows an architectural framework for delivering real-time services to the wireless access network while using secure RTP (SRTP). We have conducted simulations to evaluate quality of services (QoS) of audio streaming.


The Journal of the Korean Institute of Information and Communication Engineering | 2012

RFID Mutual Autentication Protocol Using AES

Seok­-Jae Kim; Seung-Jo Han

Recently use of RFID(Radio Frequency Identification) tends to be rapidly increased and will be also extended throughout the whole life. Using radio-frequency data can be recognized automatically in the RFID system is vulnerable to personal information protection or security. And passive tags have a hardware problem is the limit for applying cryptographic. This paper presents an authentication protocol using AES and Nounce. After completing mutual authentication server to access and strengthen security vulnerability to the use of the Nounce, because safety in denial of service attacks.


The Journal of Korean Institute of Communications and Information Sciences | 2011

Design of Zigbee Beacon Frame for High Efficiency Transmit in Home Network

Kyoung-Heon Han; Seung-Jo Han; Hyun-Yong Choi

Zigbee is communication technology most ideal because Zigbee support low power communication and wide expansion in wireless home network. However, Zigbee is not popular, because of Zigbee always has Hidden Node Problem and Transit Delay Problem. We propose new Beacon Frame structure to solve the two problem in Zigbee. New Beacon Frame structure reduces a Super Frame Duration and add a same space of a Control Frame Duration. We expect to solved method of Hidden Node Problem that exchange terminal information to using RTS/CTS. Also, We expect to solved method of Transit Delay Problem that put Beacon between Control Frame Duration and Super Frame Duration for synchronization. We confirm new Beacon Frame to solved two problem in OPNET simulation at Zigbee QoS Parameters. We measure Delay(sec) for solution degree of Transit Delay Problem, and measure Throughput(bits/sec) and Load (bits/sec) for solution degree of Hidden Node Problem.


2008 International Symposium on Ubiquitous Multimedia Computing | 2008

Robust and Secure Voice Transmission over Wireless Mobile Ad Hoc Network

Binod Vaidya; Jongan Park; Seung-Jo Han

With the growth of the Internet services, Voice over IP (VoIP) has been playing a key role in cutting the costs of telephone calls. It can be seen that since demand of VoIP over wireless network is growing, use of VoIP over Mobile Ad Hoc Network (MANET) is expected to grow as well. We have identified many challenging issues to ensure robust and secure voice communication over MANET. In this paper, we depict a framework for robust and secure voice transmission over multipath MANET. We propose robust multipath routing protocol along with efficient traffic allocation approach as well as end-to-end security mechanisms for both routing and real-time traffic transfer. We conduct series of simulations to evaluate such a framework through different performance metrics.


The Journal of the Korean Institute of Information and Communication Engineering | 2014

Mutual Authentication Protocol using One Time Password for Mobile RFID System

Jong-Yeop Sung; SangDuck Lee; Chang-ju Ryu; Seung-Jo Han


Microelectronic Engineering | 2010

Stabilization of sheet resistance for metal lines by formation of etch stop layer (ESL) trench structure

Dong-You Choi; Seung-Jo Han; Nam-Hoon Kim; Sang-Yong Kim


한국통신학회 학술대회논문집 | 2006

COMPARISION & EVALUATION OF TCP PERFORMANCE OVER WIRELESS NETWORKS

Seung-wook Shin; Haeng-Soo Oh; Seung-Jo Han

Collaboration


Dive into the Seung-Jo Han's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Young-Jin Kim

Chonbuk National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge