Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shinyoung Lim is active.

Publication


Featured researches published by Shinyoung Lim.


annual computer security applications conference | 2003

Modeling of multiple agent based cryptographic key recovery protocol

Shinyoung Lim; Sangseung Kang; Joochan Sohn

When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the message need to be recovered. We demonstrate how we have modeled and analyzed a new type of multiple agent based key recovery protocol. It is characterized by key encapsulation approach, protocol generalization, secret choice of key recovery agents and fork/join of session-keys by random-keys. The proposed protocol is formally modeled by a new pictorial model, an extended cryptographic timed Petri net (ECTPN). Recoverability of a session-key as well as performance of the protocol is verified by using a reachability graph of the ECTPN.


Journal of Systems and Software | 2001

Specification and analysis of n -way key recovery system by extended cryptographic timed Petri net

Shinyoung Lim; Jeong-Ho Ko; Eun-Ah Jun; Gang-soo Lee

Abstract When a receiver of a ciphertext message cannot decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the message need to be recovered. In this paper, we design a new n -way Key Recovery System ( n -KRS) that is characterized by key encapsulation approach, n -way key recovery, secret designation of key recovery agents, fork and join of session-key with random keys, recovery request by a new key pair, certificate attaching scheme, component-based software engineering, and conformance to international standards. n -KRS is specified and analyzed by Extended Cryptographic Timed Petri Net (ECTPN) model that is a new formal and graphical specification model for cryptographic protocols. Recoverability, performance characteristics of n -KRS are evaluated by means of reachability graph of ECTPN. A prototype of n -KRS is developed and evaluated by means of CC 2.0 based information security system evaluation scheme.


artificial intelligence methodology systems applications | 2000

Effective Iris Recognition System by Optimized Feature Vectors and Classifier

Shinyoung Lim; Kwanyong Lee; Okhwan Byeon; Tai-Yun Kim

This paper presents an effective system for recognizing the identity of a living person on the basis of iris patterns that is one of the physiological and biological features with high reliability. To represent the iris pattern efficiently, a new method for optimizing the dimension of feature vectors using wavelet transform is proposed. In order to increase the recognition accuracy of competitive learning algorithm, an efficient initialization of the weight vectors and a new method to determine the winner are also proposed. With all of these novel mechanisms, the experimental results showed that the proposed system could be used for personal identification in an efficient and effective manner.


international conference on advanced communication technology | 2005

Modeling of refreshing sleep aid service based on ubiquitous computing

Yoon-Sik Yoo; Shinyoung Lim; Jae-Doo Huh

This paper describes that we propose context-aware computing based model in ubiquitous computings subset for refreshing of humans sleep and examine technological possibility. Human can do fatigue recovery and growth through sleep and we propose methodology with model form in more effective and most suitable context for refreshing sleep in this paper.


international conference on advanced communication technology | 2005

Service compatibility and interaction issues in context-aware intelligent ubiquitous home

Seung-Ho Baek; Shinyoung Lim; Jae-Doo Huh

In this article, we discuss interaction issues about conflicts and interferences between various context information and services in the intelligent ubiquitous home environment. Context information conflicts occur when classifying services based on various sensing information. Service interactions are generated when services are applied in different controls simultaneously for the same device. In order to solve the problem, the paper utilizes the context-aware based service compatibility and interaction solving mechanism in intelligent ubiquitous home


electronic government | 2003

Secure Online Internet Reservation of E-Government Service (ORGS) Using Java Card Applications Toolkit (J-CAT)

Shinyoung Lim; Youjin Song

e-Government service will be beneficial to citizen for its efficiency and security. From the citizen’s point of view, although the e-Government service brings citizens online service, citizens need to visit at least one of the governmental offices for receiving specific service such as job interview, ID card issuing, or attending social events. These kinds of service often accompany with payments for the service charge. It means that the citizen has to do three things: request for reservation, payment for the service, and visit at least one of the governmental offices. In this paper, the Online Internet Reservation of e-Government Service(ORGS), one of the smart card based models for online Internet reservation accompanying with payment, is proposed for its efficiency and security of these kinds of service. Java card security functions are part of the building components of the Java Card Applications Toolkit(J-CAT). The J-CAT is designed to provide developers with security, easiness and efficiency in developing Java card applications. In this paper, the proposed ORGS implemented by the J-CAT provides users, developers, and managers with security, easiness, and efficiency.


pacific rim international conference on artificial intelligence | 2000

Efficient iris recognition system by optimization of feature vectors and classifier

Shinyoung Lim; Kwanyong Lee; Okhwan Byeon; Taiyun Kim

This paper presents an efficient system for recognizing the identity of a living person on the basis of iris patterns that are one of the physiological and biological features with high reliability. After various preprocessing are conducted for the iris data acquired by a CCD camera and an image grabber, feature vectors are extracted using Wavelet transform. A competitive learning neural network is used to classify the patterns. To represent the iris pattern efficiently, a new method for optimizing the dimension of feature vectors is proposed without any influence to the system performance. In order to increase the recognition accuracy of compjetitive learning algorithm, an efficient initialization of the weight vectors and a new method to determine the winner are also proposed. With all of these novel mechanisms, the experimental results showed that the proposed system could be used for personal identification in an efficient and effective manner.


international conference on consumer electronics | 2005

Managing mechanism for service compatibility and interaction issues in context-aware ubiquitous home

Seung-Ho Baek; Hyunjeong Lee; Shinyoung Lim; Jae-Doo Huh


Archive | 2006

Apparatus and method of ubiquitous context-aware agent based on sensor networks

Hyunjeong Lee; Shinyoung Lim; Jae-Doo Huh


conference information and communication technology | 2002

Experience from Mobile Application Service Framework in WIP

Shinyoung Lim; Youjin Song

Collaboration


Dive into the Shinyoung Lim's collaboration.

Top Co-Authors

Avatar

Jae-Doo Huh

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sangseung Kang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ho-Sang Ham

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Joochan Sohn

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Cheonshu Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kwanyong Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Okhwan Byeon

Korea Institute of Science and Technology Information

View shared research outputs
Researchain Logo
Decentralizing Knowledge