Younghwa An
Kangnam University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Younghwa An.
BioMed Research International | 2012
Younghwa An
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Dass authentication scheme, and we have shown that Dass authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Dass authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
asia-pacific conference on communications | 2005
Younghwa An; Soohyun Oh
Recently, the RFID system has been studied actively in ubiquitous computing environments as a main technology. While the RFID system has much advantage, however it may create new problems to the users privacy. In this paper, we present a description of previously proposed mechanisms for protecting users privacy and these problems. Then, we propose the RFID system providing privacy protection in ubiquitous computing environments. The proposed system provides a method of protecting users privacy from unwanted scanning and tracking by an adversary
FGIT-GDC/IESH/CGAG | 2012
Younghwa An
In 2011, Lee et al. proposed an improved Li-Hwang’s biometrics-based remote user authentication scheme, and claimed that does not only provide session key establishment and mutual authentication but also withstand various attacks. In this paper, we analyze the security of Lee et al.’s scheme and we show that Lee et al.’s scheme is still insecure against the various attacks. Also, we propose an improved scheme that can remove these security flaws of Lee et al.’s scheme and provide session key agreement, even if the secret information stored in the smart card is revealed. As a result of security analysis, the improved scheme is relatively more secure than the related authentication schemes in terms of the security.
The Journal of the Institute of Webcasting, Internet and Telecommunication | 2012
Younghwa An; Young-Do Joo
In 2011, Das proposed an effective biometrics-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication, while eliminating the security drawbacks of Li-Hwang`s scheme. In this paper, we have shown that Das`s scheme is still insecure against several attacks and does not provide mutual authentication. Also, we proposed the enhanced scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result of security analysis, the enhanced scheme is secure against user impersonation attack, server masquerading attack, off-line password guessing attack, and insider attack. And we can see that the enhanced scheme provides mutual authentication between the user and the server.
international conference on advanced communication technology | 2015
Younghwa An
Smart card-based user authentication schemes have been proposed recently to improve the security drawbacks in user authentication scheme. Li et al., in 2013, proposed an enhanced smart card-based remote user password authentication scheme which can withstand the security drawbacks of Chen et al.s scheme. In this paper, we show that Li et al.s scheme is vulnerable to user impersonation attack, server masquerading attack, password guessing attack and does not provide mutual authentication between the user and the server. Also, we propose the enhanced scheme with session key agreement to overcome the security drawbacks of Li et al.s scheme, even if the secret values stored in the smart card is revealed. As a result, the enhanced scheme is relatively more secure than the related scheme in terms of security.
Archive | 2012
Younghwa An
Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2011, Awasthi et al. proposed an improved timestamp-based remote authentication scheme to remove the drawbacks of Shen et al.’s scheme. In this paper, we show that Awasthi et al.’s scheme is vulnerable to the user impersonation attack, the password guessing attack, the insider attack and does not provide mutual authentication. Also, we propose the enhanced scheme to overcome these security drawbacks, even if the secret information stored in the smart card is revealed. As a result of security analysis, the enhanced scheme is relatively more secure than the related scheme in terms of security.
international conference on hybrid information technology | 2011
Young-Do Joo; Younghwa An
The development of computer-based modeling systems has allowed the operationalization of cognitive science issues. Human cognition has become one of the most interested areas in artificial intelligence to emulate high-level human capability. This paper introduces a methodology well-suited for designing of an intelligent system to evaluate human cognition. The research investigates how to elicit and represent cognitive knowledge from human being. Crucial to this research is to identify the collective perception to aggregate the congruence or sharing of individual psychological cognition. Unlike standard approaches based on the statistical techniques, the modeling presented employs a theory of fuzzy relation to deal with the required issues of similarity.
asia pacific conference on circuits and systems | 1998
Hyungkyu Yang; Younghwa An
In this paper, we propose a new kind of efficient signature scheme that is the dual scheme of undeniable signatures. Also we construct a practical protocol that implements it using smart card. The new technique proposed in this paper achieves the following objectives: only the nominee can verify the nominator (signer)s signature and if necessary, only nominee can prove to the third party that the signature is issued to him (her) and is valid. Contrary to the undeniable signature scheme, nominative signatures are confirmed via a protocol between the nominee and the third party, so the cooperation of the nominee is necessary. That is, not a signer (nominator) but verifier (nominee) can control the abuse of signatures. Undeniable signature cannot be verified without the cooperation of the signer, so the signer controls the abuse of signatures.
Archive | 2013
Younghwa An; Young-Do Joo
Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2008, Liu et al. proposed a new mutual authentication scheme using smart cards which can withstand the forgery attack. In this paper, we analyze the security of Liu et al.’s scheme, and we show that Liu et al.’s scheme is still vulnerable to the various attacks. Also, we propose the enhanced scheme to overcome these security weaknesses and provide mutual authentication between the user and the server, even if the secret information stored in the smart card is revealed by an attacker. As a result of security analysis, the enhanced scheme is more secure than Liu et al.’s scheme.
FGIT-GDC/IESH/CGAG | 2012
Young-Do Joo; Younghwa An
Recently, Location Based Service (LBS) is expanding its service areas with the spread of smart phones and is offering more personalized contents according to the variety of needs from customers. Specially, Location Based Social Network Service (LBSNS) is emerging as the most promising service among the applications of LBS. This paper proposes a LBSNS service model to form a community adaptively based on the location of user’s mobile devices. The methodology suitable for implementing the effective management and the automatic update of this social network community is presented in this paper. In addition, we describe the significance of the proposed model to promote future researches of LBSNS under the upcoming domination of mobile environment.