Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Younghwa An is active.

Publication


Featured researches published by Younghwa An.


BioMed Research International | 2012

Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

Younghwa An

Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Dass authentication scheme, and we have shown that Dass authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Dass authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.


asia-pacific conference on communications | 2005

RFID System for User's Privacy Protection

Younghwa An; Soohyun Oh

Recently, the RFID system has been studied actively in ubiquitous computing environments as a main technology. While the RFID system has much advantage, however it may create new problems to the users privacy. In this paper, we present a description of previously proposed mechanisms for protecting users privacy and these problems. Then, we propose the RFID system providing privacy protection in ubiquitous computing environments. The proposed system provides a method of protecting users privacy from unwanted scanning and tracking by an adversary


FGIT-GDC/IESH/CGAG | 2012

Improved Biometrics-Based Remote User Authentication Scheme with Session Key Agreement

Younghwa An

In 2011, Lee et al. proposed an improved Li-Hwang’s biometrics-based remote user authentication scheme, and claimed that does not only provide session key establishment and mutual authentication but also withstand various attacks. In this paper, we analyze the security of Lee et al.’s scheme and we show that Lee et al.’s scheme is still insecure against the various attacks. Also, we propose an improved scheme that can remove these security flaws of Lee et al.’s scheme and provide session key agreement, even if the secret information stored in the smart card is revealed. As a result of security analysis, the improved scheme is relatively more secure than the related authentication schemes in terms of the security.


The Journal of the Institute of Webcasting, Internet and Telecommunication | 2012

Security Enhancement of Biometrics-based Remote User Authentication Scheme Using Smart Cards

Younghwa An; Young-Do Joo

In 2011, Das proposed an effective biometrics-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication, while eliminating the security drawbacks of Li-Hwang`s scheme. In this paper, we have shown that Das`s scheme is still insecure against several attacks and does not provide mutual authentication. Also, we proposed the enhanced scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result of security analysis, the enhanced scheme is secure against user impersonation attack, server masquerading attack, off-line password guessing attack, and insider attack. And we can see that the enhanced scheme provides mutual authentication between the user and the server.


international conference on advanced communication technology | 2015

Security enhancements of smart card-based remote user password authentication scheme with session key agreement

Younghwa An

Smart card-based user authentication schemes have been proposed recently to improve the security drawbacks in user authentication scheme. Li et al., in 2013, proposed an enhanced smart card-based remote user password authentication scheme which can withstand the security drawbacks of Chen et al.s scheme. In this paper, we show that Li et al.s scheme is vulnerable to user impersonation attack, server masquerading attack, password guessing attack and does not provide mutual authentication between the user and the server. Also, we propose the enhanced scheme with session key agreement to overcome the security drawbacks of Li et al.s scheme, even if the secret values stored in the smart card is revealed. As a result, the enhanced scheme is relatively more secure than the related scheme in terms of security.


Archive | 2012

Security Enhancements of an Improved Timestamp-Based Remote User Authentication Scheme

Younghwa An

Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2011, Awasthi et al. proposed an improved timestamp-based remote authentication scheme to remove the drawbacks of Shen et al.’s scheme. In this paper, we show that Awasthi et al.’s scheme is vulnerable to the user impersonation attack, the password guessing attack, the insider attack and does not provide mutual authentication. Also, we propose the enhanced scheme to overcome these security drawbacks, even if the secret information stored in the smart card is revealed. As a result of security analysis, the enhanced scheme is relatively more secure than the related scheme in terms of security.


international conference on hybrid information technology | 2011

Intelligent System Modeling for Human Cognition

Young-Do Joo; Younghwa An

The development of computer-based modeling systems has allowed the operationalization of cognitive science issues. Human cognition has become one of the most interested areas in artificial intelligence to emulate high-level human capability. This paper introduces a methodology well-suited for designing of an intelligent system to evaluate human cognition. The research investigates how to elicit and represent cognitive knowledge from human being. Crucial to this research is to identify the collective perception to aggregate the congruence or sharing of individual psychological cognition. Unlike standard approaches based on the statistical techniques, the modeling presented employs a theory of fuzzy relation to deal with the required issues of similarity.


asia pacific conference on circuits and systems | 1998

The efficient signature in the smart card system

Hyungkyu Yang; Younghwa An

In this paper, we propose a new kind of efficient signature scheme that is the dual scheme of undeniable signatures. Also we construct a practical protocol that implements it using smart card. The new technique proposed in this paper achieves the following objectives: only the nominee can verify the nominator (signer)s signature and if necessary, only nominee can prove to the third party that the signature is issued to him (her) and is valid. Contrary to the undeniable signature scheme, nominative signatures are confirmed via a protocol between the nominee and the third party, so the cooperation of the nominee is necessary. That is, not a signer (nominator) but verifier (nominee) can control the abuse of signatures. Undeniable signature cannot be verified without the cooperation of the signer, so the signer controls the abuse of signatures.


Archive | 2013

Security Enhancements of a Mutual Authentication Scheme Using Smart Cards

Younghwa An; Young-Do Joo

Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2008, Liu et al. proposed a new mutual authentication scheme using smart cards which can withstand the forgery attack. In this paper, we analyze the security of Liu et al.’s scheme, and we show that Liu et al.’s scheme is still vulnerable to the various attacks. Also, we propose the enhanced scheme to overcome these security weaknesses and provide mutual authentication between the user and the server, even if the secret information stored in the smart card is revealed by an attacker. As a result of security analysis, the enhanced scheme is more secure than Liu et al.’s scheme.


FGIT-GDC/IESH/CGAG | 2012

Design and Implementation of LBSNS Service Model

Young-Do Joo; Younghwa An

Recently, Location Based Service (LBS) is expanding its service areas with the spread of smart phones and is offering more personalized contents according to the variety of needs from customers. Specially, Location Based Social Network Service (LBSNS) is emerging as the most promising service among the applications of LBS. This paper proposes a LBSNS service model to form a community adaptively based on the location of user’s mobile devices. The methodology suitable for implementing the effective management and the automatic update of this social network community is presented in this paper. In addition, we describe the significance of the proposed model to promote future researches of LBSNS under the upcoming domination of mobile environment.

Collaboration


Dive into the Younghwa An's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge