Jin Seok KIM


Secure and Lightweight Localization Method for Wireless Sensor Networks
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/03/01
Vol. E96-D  No. 3  pp. 723-726
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securitywireless sensor networkssecure localizationalgorithms
 Summary | Full Text:PDF(131.1KB)

Unilateral Distance Bounding Protocol with Bidirectional Challenges
Myung-Ho PARK Ki-Gon NAM Jin Seok KIM Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/01/01
Vol. E96-D  No. 1  pp. 134-137
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
mafia fraud attackdistance boundingauthenticationsecurity
 Summary | Full Text:PDF(82KB)

Security Condition for Exact Localization in Wireless Ad Hoc Networks
Jin Seok KIM Dae Hyun YUM Sung Je HONG Jong KIM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/07/01
Vol. E95-B  No. 7  pp. 2459-2462
Type of Manuscript:  LETTER
Category: Network
Keyword: 
secure localizationwireless ad hoc networks
 Summary | Full Text:PDF(554.2KB)

Lightweight Distance Bounding Protocol against Relay Attacks
Jin Seok KIM Kookrae CHO Dae Hyun YUM Sung Je HONG Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/04/01
Vol. E95-D  No. 4  pp. 1155-1158
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securityauthenticationrelay attackmafia fraud attackdistance bounding protocol
 Summary | Full Text:PDF(72.6KB)

Fast Verification of Hash Chains with Reduced Storage
Dae Hyun YUM Jin Seok KIM Pil Joong LEE Sung Je HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 383-391
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash chainprogressive verificationcheck-bit scheme
 Summary | Full Text:PDF(1.1MB)