Kookrae CHO


A Visibility-Based Lower Bound for Android Unlock Patterns
Jinwoo LEE Jae Woo SEO Kookrae CHO Pil Joong LEE Dae Hyun YUM 
Publication:   
Publication Date: 2017/03/01
Vol. E100-D  No. 3  pp. 578-581
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
user authenticationgraphical passwordAndroid unlock patternslower bound
 Summary | Full Text:PDF(135.1KB)

A Visibility-Based Upper Bound for Android Unlock Patterns
Jinwoo LEE Jae Woo SEO Kookrae CHO Pil Joong LEE Juneyeun KIM Seung Hoon CHOI Dae Hyun YUM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/11/01
Vol. E99-D  No. 11  pp. 2814-2816
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
user authenticationgraphical passwordAndroid unlock patternsupper bound
 Summary | Full Text:PDF(120.6KB)

RMRP: A Reliable MAC and Routing Protocol for Congestion in IEEE 802.15.4 Based Wireless Sensor Networks
Young-Duk KIM Won-Seok KANG Kookrae CHO Dongkyun KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/12/01
Vol. E96-B  No. 12  pp. 2998-3006
Type of Manuscript:  Special Section PAPER (Special Section on Network and System Technologies for Sustainable Society)
Category: 
Keyword: 
wireless sensor networknetwork congestionrouting protocolMAC protocolIEEE 802.15.4
 Summary | Full Text:PDF(1.4MB)

Lightweight Distance Bounding Protocol against Relay Attacks
Jin Seok KIM Kookrae CHO Dae Hyun YUM Sung Je HONG Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/04/01
Vol. E95-D  No. 4  pp. 1155-1158
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
securityauthenticationrelay attackmafia fraud attackdistance bounding protocol
 Summary | Full Text:PDF(72.6KB)

Generalized Hash Chain Traversal with Selective Output
Dae Hyun YUM Jae Woo SEO Kookrae CHO Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1303-1306
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
hash chainfractal traversalamortization
 Summary | Full Text:PDF(152.9KB)