Jeongwoo Hong - Academia.edu (original) (raw)

Papers by Jeongwoo Hong

Research paper thumbnail of An efficient and secure anonymous authentication scheme for mobile satellite communication systems

EURASIP Journal on Wireless Communications and Networking, 2011

This paper proposes a new efficient and secure anonymous authentication scheme for mobile satelli... more This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e.g., insertion attacks and stolen-verifier attacks), and (3) it provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.

Research paper thumbnail of A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem

Information Technology And Control, 2011

A satellite communication is suitable for broadcasting service and long-hual transmission based o... more A satellite communication is suitable for broadcasting service and long-hual transmission based on telecommunications. In the satellite communication environment, unauthorized user should not have to obtain his/her required services from the satellite communication systems without authentication. Therefore, authentication is an important security technique to prevent illegal service requests.

Research paper thumbnail of Experiments with Java for computing intensive problems

Proceedings High Performance Computing on the Information Superhighway. HPC Asia '97, 1997

... Kee-Young Yo0 Kyungpook National University Taegu, Korea yook@bh.kyungpook.ac.kr Abstract ...... more ... Kee-Young Yo0 Kyungpook National University Taegu, Korea yook@bh.kyungpook.ac.kr Abstract ... There are some recent initiatives such as the ORB-to-Java gateways, Apple's CyberDog, Sun's JavaBeans and IBM's Ara-bica in integrating CORBA, OPenDoc and Java [13]. ...

Research paper thumbnail of Cryptanalysis of an Enhanced Spatiotemporal Chaotic Image/Video Cryptosystem

EURASIP Journal on Advances in Signal Processing, 2011

Recently, an enhanced spatiotemporal chaotic image/video cryptosystem was proposed by Rhouma and ... more Recently, an enhanced spatiotemporal chaotic image/video cryptosystem was proposed by Rhouma and Belghith. This paper demonstrates that the enhanced cryptosystem is not secure against the following three different classical types of attacks: chosen plaintext, chosen ciphertext, and known plaintext. In the three attacks, only a pair of (plaintext/ciphertext) was needed to totally break the cryptosystem.

Research paper thumbnail of Implementation of Martian virtual reality environment using very high-resolution stereo topographic data

Computers & Geosciences, 2012

Topography over terrestrial or other planetary surfaces is an important base data for virtual rea... more Topography over terrestrial or other planetary surfaces is an important base data for virtual reality construction. In particular, with inaccessible topography such as the Martian surface, virtual reality provides great value not only for public interaction but also for scientific research. For the latter application, since field surveys are essential for the geological and geomorphological researches, the virtual reality environment created based on verified topographic products provides an alternative solution for planetary research. The performance of virtual reality implementation over a planetary surface can be assessed by two major factors: (1) The geodetically controlled base topographic products, such as DTM and ortho-image, and (2) Technological integration of topographic products into virtual reality software and hardware. For the first aspect, the multi-resolution stereo analysis approach has already provided a solid basis so that specific topographic data sets over testing areas were generated by the hierarchical processor. To address the second problem, a parallel processor with multiple screen display combining 3D display software was employed in this research. As demonstrated in this paper, the constructed Martian virtual environment showed highly detailed features over the Athabasca Valles (one of former potential Mars Exploration Rover landing sites) and Eberswalde crater (one of the main original landing candidates for the NASA's rover mission scheduled to launch in late 2011). The employment of such virtual reality environments is expected to be a powerful simulator after integrating a 3D Martian model, engineering and environment constraints for Martian geological and geomorphic researches including landing site selection and rover navigation.

Research paper thumbnail of Very High Resolution Martian Topographic Data Processing and Its Application for Virtual Reality Implementation

It demonstrats how the modern photogrammetry and the visualization technician can reconstruct vir... more It demonstrats how the modern photogrammetry and the visualization technician can reconstruct virtual martian surface. The DTMs and ortho imagery from stereo cameras were processed . Then the topographic data were indigested into a VR system to demonstrate the potentials.

Research paper thumbnail of Parallel Bidirectional Search on Message Passing Environment

Research paper thumbnail of The Subgroup Method for Collective I/O

Because many scientific applications require large data processing, the importance of parallel I/... more Because many scientific applications require large data processing, the importance of parallel I/O has been increasingly recognized. For collective I/O, one of the considerable features of parallel I/O, we suggest the subgroup method. It is the way of using collective I/O of MPI effectively in terms of application programs. From the experimental results, we could conclude that the subgroup method for collective I/O is more efficient than plain collective I/O.

Research paper thumbnail of Parallel Bidirectional Search on Message Passing Environment

Research paper thumbnail of The Subgroup Method for Collective I/O

Because many scientific applications require large data processing, the importance of parallel I/... more Because many scientific applications require large data processing, the importance of parallel I/O has been increasingly recognized. For collective I/O, one of the considerable features of parallel I/O, we suggest the subgroup method. It is the way of using collective I/O of MPI effectively in terms of application programs. From the experimental results, we could conclude that the subgroup method for collective I/O is more efficient than plain collective I/O.

Research paper thumbnail of An efficient and secure anonymous authentication scheme for mobile satellite communication systems

EURASIP Journal on Wireless Communications and Networking, 2011

This paper proposes a new efficient and secure anonymous authentication scheme for mobile satelli... more This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e.g., insertion attacks and stolen-verifier attacks), and (3) it provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.

Research paper thumbnail of A New Efficient Key Agreement Scheme for VSAT Satellite Communications Based on Elliptic Curve Cryptosystem

Information Technology And Control, 2011

A satellite communication is suitable for broadcasting service and long-hual transmission based o... more A satellite communication is suitable for broadcasting service and long-hual transmission based on telecommunications. In the satellite communication environment, unauthorized user should not have to obtain his/her required services from the satellite communication systems without authentication. Therefore, authentication is an important security technique to prevent illegal service requests.

Research paper thumbnail of Experiments with Java for computing intensive problems

Proceedings High Performance Computing on the Information Superhighway. HPC Asia '97, 1997

... Kee-Young Yo0 Kyungpook National University Taegu, Korea yook@bh.kyungpook.ac.kr Abstract ...... more ... Kee-Young Yo0 Kyungpook National University Taegu, Korea yook@bh.kyungpook.ac.kr Abstract ... There are some recent initiatives such as the ORB-to-Java gateways, Apple's CyberDog, Sun's JavaBeans and IBM's Ara-bica in integrating CORBA, OPenDoc and Java [13]. ...

Research paper thumbnail of Cryptanalysis of an Enhanced Spatiotemporal Chaotic Image/Video Cryptosystem

EURASIP Journal on Advances in Signal Processing, 2011

Recently, an enhanced spatiotemporal chaotic image/video cryptosystem was proposed by Rhouma and ... more Recently, an enhanced spatiotemporal chaotic image/video cryptosystem was proposed by Rhouma and Belghith. This paper demonstrates that the enhanced cryptosystem is not secure against the following three different classical types of attacks: chosen plaintext, chosen ciphertext, and known plaintext. In the three attacks, only a pair of (plaintext/ciphertext) was needed to totally break the cryptosystem.

Research paper thumbnail of Implementation of Martian virtual reality environment using very high-resolution stereo topographic data

Computers & Geosciences, 2012

Topography over terrestrial or other planetary surfaces is an important base data for virtual rea... more Topography over terrestrial or other planetary surfaces is an important base data for virtual reality construction. In particular, with inaccessible topography such as the Martian surface, virtual reality provides great value not only for public interaction but also for scientific research. For the latter application, since field surveys are essential for the geological and geomorphological researches, the virtual reality environment created based on verified topographic products provides an alternative solution for planetary research. The performance of virtual reality implementation over a planetary surface can be assessed by two major factors: (1) The geodetically controlled base topographic products, such as DTM and ortho-image, and (2) Technological integration of topographic products into virtual reality software and hardware. For the first aspect, the multi-resolution stereo analysis approach has already provided a solid basis so that specific topographic data sets over testing areas were generated by the hierarchical processor. To address the second problem, a parallel processor with multiple screen display combining 3D display software was employed in this research. As demonstrated in this paper, the constructed Martian virtual environment showed highly detailed features over the Athabasca Valles (one of former potential Mars Exploration Rover landing sites) and Eberswalde crater (one of the main original landing candidates for the NASA's rover mission scheduled to launch in late 2011). The employment of such virtual reality environments is expected to be a powerful simulator after integrating a 3D Martian model, engineering and environment constraints for Martian geological and geomorphic researches including landing site selection and rover navigation.

Research paper thumbnail of Very High Resolution Martian Topographic Data Processing and Its Application for Virtual Reality Implementation

It demonstrats how the modern photogrammetry and the visualization technician can reconstruct vir... more It demonstrats how the modern photogrammetry and the visualization technician can reconstruct virtual martian surface. The DTMs and ortho imagery from stereo cameras were processed . Then the topographic data were indigested into a VR system to demonstrate the potentials.

Research paper thumbnail of Parallel Bidirectional Search on Message Passing Environment

Research paper thumbnail of The Subgroup Method for Collective I/O

Because many scientific applications require large data processing, the importance of parallel I/... more Because many scientific applications require large data processing, the importance of parallel I/O has been increasingly recognized. For collective I/O, one of the considerable features of parallel I/O, we suggest the subgroup method. It is the way of using collective I/O of MPI effectively in terms of application programs. From the experimental results, we could conclude that the subgroup method for collective I/O is more efficient than plain collective I/O.

Research paper thumbnail of Parallel Bidirectional Search on Message Passing Environment

Research paper thumbnail of The Subgroup Method for Collective I/O

Because many scientific applications require large data processing, the importance of parallel I/... more Because many scientific applications require large data processing, the importance of parallel I/O has been increasingly recognized. For collective I/O, one of the considerable features of parallel I/O, we suggest the subgroup method. It is the way of using collective I/O of MPI effectively in terms of application programs. From the experimental results, we could conclude that the subgroup method for collective I/O is more efficient than plain collective I/O.