http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Improved Biometrics-based Password Authentication Scheme with Session Key Agreement
Hyungkyu Yang 한국인터넷방송통신학회 2016 International Journal of Internet, Broadcasting an Vol.8 No.3
In 2013, Li et al. proposed an improved smart card-based remote user password authentication scheme, and claimed that their scheme not only overcomes security weaknesses of the Chen et al.’s scheme but also is a more user friendly scheme compared with other schemes. In this paper, we analyze the security of Li et al.’s authentication scheme and we show that Li et al.’s authentication scheme is still insecure against the various attacks, such as the off-line password guessing attack, the forgery attack, and the session key generation attack etc. Also, we propose an improved scheme that can resist these security drawbacks of Li et al.’s authentication, even if the secret information stored in the smart card is revealed. As a result of security analysis, the improved scheme is relatively more secure against several attacks than other related schemes in terms of the security.
Hyungkyu Yang 한국인터넷방송통신학회 2017 International Journal of Internet, Broadcasting an Vol.9 No.3
In 2013, Lee-Lie proposed secure smart card based authentication scheme of Zhu’s authentication for TMIS which is secure against the various attacks and efficient password change. In this paper, we discuss the security of Lee-Lie’s smart card-based authentication scheme, and we have shown that Lee-Lie’s authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to overcome these security problems of Lee-Lie’s authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved smart card based user authentication scheme for TMIS is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack, the session key generation attack and provides mutual authentication between the user and the telecare system.
Yang, Hyungkyu The Institute of Internet 2017 International Journal of Internet, Broadcasting an Vol.9 No.3
In 2013, Lee-Lie proposed secure smart card based authentication scheme of Zhu's authentication for TMIS which is secure against the various attacks and efficient password change. In this paper, we discuss the security of Lee-Lie's smart card-based authentication scheme, and we have shown that Lee-Lie's authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to overcome these security problems of Lee-Lie's authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved smart card based user authentication scheme for TMIS is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack, the session key generation attack and provides mutual authentication between the user and the telecare system.
An Improved Biometrics-based Password Authentication Scheme with Session Key Agreement
Yang, Hyungkyu The Institute of Internet 2016 International Journal of Internet, Broadcasting an Vol.8 No.3
In 2013, Li et al. proposed an improved smart card-based remote user password authentication scheme, and claimed that their scheme not only overcomes security weaknesses of the Chen et al.'s scheme but also is a more user friendly scheme compared with other schemes. In this paper, we analyze the security of Li et al.'s authentication scheme and we show that Li et al.'s authentication scheme is still insecure against the various attacks, such as the off-line password guessing attack, the forgery attack, and the session key generation attack etc. Also, we propose an improved scheme that can resist these security drawbacks of Li et al.'s authentication, even if the secret information stored in the smart card is revealed. As a result of security analysis, the improved scheme is relatively more secure against several attacks than other related schemes in terms of the security.
Yang, Hongxun,Song, Taeseup,Liu, Li,Devadoss, Anitha,Xia, Fan,Han, Hyungkyu,Park, Hyunjung,Sigmund, Wolfgang,Kwon, Kyungjung,Paik, Ungyu American Chemical Society 2013 JOURNAL OF PHYSICAL CHEMISTRY C - Vol.117 No.34
<P>Hybrid nanofibers of polyaniline/polyoxometalate are synthesized via a facile interfacial polymerization method for the first time, and evaluated as a cathode material for lithium ion batteries. The hybrid nanofibers with 100 nm diameter consisted of phosphomolybdic acid polyanion, [PMo<SUB>12</SUB>O<SUB>40</SUB>]<SUP>3–</SUP>, and polyaniline matrix. Their 1D geometry improves the utilization of electrode materials and accommodates the volume change during cycling, which enables the significant improvement in lithium storage capacity and capacity retentions. The phosphomolybdic acid polyanions not only exhibit a large theoretical capacity of about 270 mAh g<SUP>–1</SUP>, but also reduce the charge transfer resistance of electrode leading to the enhanced reversible capacity and rate capability. The polyaniline/polyoxometalate nanofibers delivered a remarkably improved electrochemical performance in terms of lithium storage capacity (183.4 mAh g<SUP>–1</SUP> at 0.1C rate), cycling stability (80.7% capacity retention after 50 cycles), and rate capability (94.2 mAh g<SUP>–1</SUP> at 2C rate) compared to polyaniline nanofibers and bulk polyaniline/polyoxometalate hybrid.</P><P><B>Graphic Abstract</B> <IMG SRC='http://pubs.acs.org/appl/literatum/publisher/achs/journals/content/jpccck/2013/jpccck.2013.117.issue-34/jp401989j/production/images/medium/jp-2013-01989j_0006.gif'></P><P><A href='http://pubs.acs.org/doi/suppl/10.1021/jp401989j'>ACS Electronic Supporting Info</A></P>
능동적 공격자 환경에서의 자체인증 공개키에 기반한 키 분배 프로토콜의 안전성 분석
양형규,Yang HyungKyu 한국통신학회 2005 韓國通信學會論文誌 Vol.30 No.1C
Girault는 자체 인증 공개키(self-certified public key)의 개념과 함께 이를 사용한 키 분배 프로토롤을 제안하였고 후에 Rueppel과 Oorschot는 이를 변형한 프로토콜들을 제안하였다. 자체인증 공개키에 기반한 키 분배 프로토콜은 사용자가 자신의 비밀키를 직접 선택하므로 개인식별 정보에 기반한 방식의 문제점으로 지적되었던 신뢰센터가 임의의 사용자로 위장할 수 있는 문제를 해결할 수 있고, 또한 메모리와 계산량을 감소시킬 수 있다는 장점이 있다. 그러나, 키 분배 프로토콜의 안전성에 대한 구체적인 증명은 아직까지 미흡한 실정이다. 본 논문에서는 지금까지 제안된 자체인증 공개키에 기반한 키분배 프로토콜에 대한 능동적 공격자 환경에서의 구체적인 안전성 분석을 수행하고자 한다. 본 논문에서 고려하는 공격은 active impersonation 공격, key-compromise impersonation 공격, forward secrecy, known key secuity이며, 안전성 증명에는 수학적 귀착 이론을 이용한다. Girault proposed a key agreement protocol based on his new idea of self-certified public key. Later Rueppel and Oorschot showed variants of the Girault scheme. All of these key agreement protocols inherit positive features of self-certified public key so that they can provide higher security and smaller communication overhead than key agreement protocols not based on self-certified public key. Even with such novel features, rigorous security analysis of these protocols has not been made clear yet. In this paper, we give rigorous security analysis of key agreement protocols based on self-certified public key. We use reduction among functions for security analysis and consider several kinds of active attacker models such as active impersonation attack, key-compromise impersonation attack, forward secrecy and known key security.
커몬레일 연료분사장치를 이용한 DME DI기관의 니들리프트와 파일럿분사율이 엔진성능에 미치는 영향
양세문(Semoon Yang),이영재(Youngjae Lee),나형규(Hyungkyu Na),김영길(Yongkil Kim) 한국자동차공학회 2002 한국자동차공학회 Symposium Vol.2002 No.11
DME seems to be one of the most attractive fuels for heavy-duty engines. Formerly, as for<br/> DME engines several R&D have been performed. However, a lot of technical problems<br/> which ought to be solved have been remained. The first problem is surely finding out the<br/> solution concerning safety fuel supply systems that are able to suppress vaporizations.<br/> Solving the first problem, we have tried to research for optimizations with regard to<br/> relationships between performances and emission characteristics using Common Rail<br/> Injection Systems.<br/> Experimental results are as follows,<br/> 1) Confirming optimum injection timing to appear, its value is about 14degreeBTDC as for<br/> brake thermal efficiency and NOx emissions, 2) Confirming optimum pilot injection pressure<br/> to appear, its value is nearly 50MPa, as for brake thermal efficiency and NOx emissions, 3)<br/> Confirming optimum pilot injection rates to appear, which are aimed at reduction of NOx<br/> emission, its value is 10% as for brake thermal efficiency and NOx emissions, 4) Also<br/> confirmed on nozzle lift, its value is about 0.21mm.
유비쿼터스 컴퓨팅 환경에 적합한 RFID 인증 프로토콜에 관한 연구
양형규,안영화,Yang Hyungkyu,An YoungHwa 대한전자공학회 2005 電子工學會論文誌-CI (Computer and Information) Vol.42 No.1
최근 유비쿼터스 컴퓨팅에 대한 연구가 활발히 진행되고 있으며, 유비쿼터스 컴퓨팅의 실현을 위한 핵심기술로서 RFID 시스템에 대한 연구가 활발히 진행되고 있다. 유비쿼터스 환경에서 RFID 시스템이 사용자의 편리함을 가져다주는 장점이 있는 반면, 이로 인해 사용자의 프라이버시가 침해당할 수 있다는 문제점 또한 가지고 있다. 본 논문에서는 기존의 RFID 인증 메커니즘들이 가지고 있는 프라이버시 침해 문제를 분석하고 보다 안전하고 효율적으로 사용자의 프라이버시를 보호할 수 있는 RFID 인증 프로토콜을 제안한다. 제안하는 프로토콜은 공격자의 재전송 공격, 스푸핑 공격, 그리고 트래킹에 대해 안전하다. Recently, ubiquitous Computing is being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. Therefore, in this paper, we analyze the privacy problems of previous methods and propose more secure and effective authentication method to protect user's privacy. The proposed protocol is secure against replay attack, spoofing attack and tracking by an attacker.