Match!
Seung-Jae Yoo
7Publications
3H-index
224Citations
Publications 7
Newest
#1Byoungcheon LeeH-Index: 18
#2Kim-Kwang Raymond Choo (Australian Institute of Criminology)H-Index: 46
Last.Seung-Jae YooH-Index: 3
view all 4 authors...
Digital signatures provide authentication and nonrepudiation in a public way in the sense that anyone can verify the validity of a digital signature using the corresponding public key. In this paper, we consider the issues of (1) signature privacy and (2) the corresponding public provability of signature. We propose a new digital signature variant, secret signature, which provides authentication and nonrepudiation to the designated receiver only. If required, the correctness of the secret signat...
3 CitationsSource
#1Seung-Jae YooH-Index: 3
#2Kuinam J. KimH-Index: 7
This note is concerned with the executive compressed worm virus and their detection. It is difficult to detect some worm viruses recently since their file structure adopts the type of executive compression which can be run of themselves in the compressed state. In fact there are some informations about executive compression type in the sections of compressed file structure including whether it is executive compressed or not and compression method if compressed. In this research, we have adopted ...
#1Seung-Jae YooH-Index: 3
In this paper, we try to construct the searching and treatment modules to count the malignant programs effectively so that the Worm virus detection & blocking program has the functions that it can check the files early to cope the Worm virus attacks by intercepting the value of interrupt vector table of memory structure for checking the action of viruses, and comparing with the character strings of virus. Also check the facts that files are deformed or not by generating the statistics sum of enc...
2 CitationsSource
#1Jongchan Lee (Electronics and Telecommunications Research Institute)H-Index: 1
#2Seung-Jae YooH-Index: 3
Last.Dong Chun Lee (Howon University)H-Index: 4
view all 3 authors...
In this study, we propose a novel mobile tracking scheme which utilizes the fuzzy-based decision making with the consideration of the information such as previous location, moving direction and distance to the base station as well as received signal strength, thereby resulting to the estimation performance even much better than the previous schemes. Our scheme divides a cell into many blocks based on the signal strength and then estimate in stepwise the optimal block where a mobile locates using...
3 CitationsSource
#1Byoungcheon Lee (QUT: Queensland University of Technology)H-Index: 18
#2Colin Boyd (QUT: Queensland University of Technology)H-Index: 38
Last.Seung-Jae YooH-Index: 3
view all 6 authors...
ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent drawback of key escrow problem, i.e. users' private keys are known to the key generation center (KGC). Therefore secure key issuing (SKI) is an important issue in ID-based cryptography. In multiple authority approach (Boneh & Franklin 2001, Chen et al. 2002), key generation function is distributed to multiple authorities. Keeping key privacy using user-chosen secret inform...
108 Citations
#1Byoungcheon Lee (QUT: Queensland University of Technology)H-Index: 18
#2Colin Boyd (QUT: Queensland University of Technology)H-Index: 38
Last.Seung-Jae YooH-Index: 3
view all 6 authors...
It had been thought that it is difficult to provide receipt-freeness in mixnet-based electronic voting schemes. Any kind of user chosen randomness can be used to construct a receipt, since a user can prove to a buyer how he had encrypted the ballot. In this paper we propose a simple and efficient method to incorporate receipt-freeness in mixnet-based electronic voting schemes by using the well known re-encryption technique and designated verifier re-encryption proof (DVRP). In our scheme a voter...
108 CitationsSource
1