Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Won-keun Kong is active.

Publication


Featured researches published by Won-keun Kong.


international symposium on consumer electronics | 2009

Providing secure mobile device pairing based on visual confirmation

Eunah Kim; Won-keun Kong; Jeong Hyun Yi

With the increase of personal mobile devices, wireless short-range communications occur frequently and security risks thereon increase since wireless communication channels are inherently easy to eavesdrop on and be under control. In this paper, we investigate a key establishment protocol focusing two properties of wireless mobile communications: 1) a short-range communication without prior trust relationship and 2) a human user who is able to verify both a sender and a receiver devices at the same time. We then propose a simple device pairing method to verify that the shared (temporal) public keys, which are later used to generate a session key, are identical by presenting short text messages on secure side channel (e.g., visual and audio channel). It is easily and intuitively recognized by a human user.


Archive | 2009

Resonator for wireless power transmission

Young-Tack Hong; Sang-wook Kwon; Eun-Seok Park; Won-keun Kong


Archive | 2015

SEARCH METHOD AND DEVICE

Ga-hyun Joo; Min-Jeong Kang; Woo-Shik Kang; Won-keun Kong


Archive | 2003

Network-connecting apparatus and method for providing direct connections between network devices in different private networks

Won-keun Kong


Archive | 1999

Personal computer having a security function, a method of implementing the security function, and methods of installing and detaching a security device to/from a computer

Won-keun Kong


Archive | 2001

Network address conversion system for enabling access to a node having a private IP address, a method therefor, and a recording medium for recording the method

Won-keun Kong


Archive | 2006

System and method for saving power consumption of sensor based on context information in wireless sensor network

Hun Lim; Su-myeon Kim; Won-keun Kong; Kyle Kim


Archive | 1998

Method of detaching a security device from a personal computer

Won-keun Kong


Archive | 1999

Television receiver for receiving voice/text message and voice/text messaging method using the same

Won-keun Kong


Archive | 2006

Method of processing emergent data in wireless sensor network

Hun Lim; Kyung-soo Lim; Kyu-ho Han; Sun-shin An; Won-keun Kong; Su-myeon Kim; Kyle Kim

Collaboration


Dive into the Won-keun Kong's collaboration.

Researchain Logo
Decentralizing Knowledge