Evolution of Wi-Fi Protected Access: Security Challenges by Songhui Kwon and Hyoung-Kee Choi at IEEE Consumer Electronics Magazine on January 2021. [PDF]
A Dive into Windows Hello: Is it really more secure than a Password? by Ejim Kim and Hyoung-Kee Choi at CanSecWest Vancouver 2019. [PPT]
Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch by Dongsung Kim and Hyoung-Kee Choi at Def Con 26 in Las Vegas on August 2018. [PPT]
Secure and Efficient Binding Updates in Host-Based Distributed Mobility Management by Seyeong Lee, Hyoung-Kee Choi, Ejin Kim and Jong-Hyouk Lee at Wireless Networks, December 2017. [PDF]
A Healthcare Information System for Secure Delivery and Remote Management of Medical Records by Hyoung-Kee Choi, Ki-Eun Shin and Hyoungshick Kim at IEICE Transactions on Information and Systems, April 2016. [PDF]
A Group-based Security Protocol for Machine-type Communications in LTE-Advanced by Daesung Choi, Hyoung-Kee Choi and Se-Young Lee at Wireless Networks, August 2015. [PDF]
A Group-based Security Protocol for Machine Type Communications in LTE-Advanced by Daesung Choi, Sungdae Hong and Hyoung-Kee Choi at IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada, Apr. 27 ~ May 2, 2014. Best Poster Award
Improvements on Hsiang and Shih's Remote User Authentication Scheme using Smart Cards by Jung-Yoon Kim and Hyoung-Kee Choi at IEICE Transaction on Information and Systems, pp 2393 - 2400, October 2012. [PDF]
An Enhanced Security Protocol for VANET-based Entertainment Services by Jung-Yoon Kim and Hyoung-Kee Choi at IEICE Transaction on Communications, pp. 2245 - 2256, July 2012. [PDF]
Further Improved Remote User Authentication Scheme by Jung-Yoon Kim, Hyoung-Kee Choi and John A. Copeland at IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences, pp. 1426 - 1433, June 2011. [PDF]
Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation by Hyoung-Kee Choi, In-Hwan Kim and Jae-Chern Yoo at EURASIP Journal on Wireless Communications and Networking, January 2011. [PDF]
Weakness of Sun et al.'s Conditional Access System in Pay-TV Broadcasting Systems by Jung-Yoon Kim and Hyoung-Kee Choi at IEEE Transactions on Multimedia, pp. 337 - 340, June 2010. [PDF] [Extended]
A Self-Certified Signcryption Scheme for Mobile Communications by Ki-Eun Shin and Hyoung-Kee Choi at USENIX Security Symposium '09 (USENIX Security) in Montreal, Canada on August 10 - 14, 2009. Abstract
A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6 by Sehwa Song, Hyoung-Kee Choi and Jung-Yoon Kim in EURASIP Journal on Wireless Communications and Networking, July 2009. [PDF]
Evaluation of Security Protocols for the Session Initiation Protocol by Eun-Chul Cha, Hyoung-Kee Choi and Sung-Jae Cho at IEEE International Conference on Computer Communications and Networks (ICCCN) in Honolulu, USA on August 13 - 16, 2007. [PDF]
Interactive Web service via satellite to the home by Hyoung-Kee Choi, Osama Qadan, Dolors Sala, John O. Limb and Jeff Meyers at IEEE Communication Magazine on March 2001. [PDF]
A behavioral model of Web traffic by Hyoung-Kee Choi and John O. Limb at IEEE International Conference on Network Protocols (ICNP'99) in Toronto, Canada, Oct 31 - Nov. 3, 1999. [PDF]
A Self-Certified Signcryption Scheme for Mobile Communications
Securing mobile communication is challenging because communicating entities (i.e., mobile devices) are resources-constraint and mobile networks restricts the Internet access. Hence, cryptosystems developed for mobile communications should be efficient and overhead associated with the security protocol needs to be minimal. The intervention by the conventional trusted authority should be also minimized because of the restricted access to the outside network. We propose a self-certified signcryption scheme to withstand such obstacles in mobile communication.
A Novel Authentication Scheme for Binding Update in Mobile IPv6
Mobility support is an essential part of IPv6 because we have recently seen sharp increases in the number of mobile users. A security weakness in mobility support has a direct consequence on the security of users because it obscures the distinction between devices and users. Unfortunately, a malicious and unauthenticated message in mobility support may open a security hole for intruders by supplying an easy means to launch an attack that hijacks an ongoing session to a location chosen by the intruder. In this paper, we show how to thwart such a session hijacking attack by authenticating a suspicious message. Although much research has been directed toward addressing similar problems, we contend that our proposed protocol would outperform other proposals that have been advanced. This claim is based on observations that the proposed protocol has strengths such as light computational load, backward compatibility, and dependable operation.