Hyotaek Lim - Academia.edu (original) (raw)
Uploads
Papers by Hyotaek Lim
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Journal of Information Processing Systems, 2011
... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in ... more ... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in a laboratory on an LAN. Summarized below are our steps of verification. • Two PCs (nodes with IP address xxx.xxx.xxx.76 and xxx.xxx.xxx.77) are connected to a referral rserver. ...
Bookmarks Related papers MentionsView impact
Journal of Information Processing Systems, 2011
... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in ... more ... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in a laboratory on an LAN. Summarized below are our steps of verification. • Two PCs (nodes with IP address xxx.xxx.xxx.76 and xxx.xxx.xxx.77) are connected to a referral rserver. ...
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
2014 14th International Symposium on Communications and Information Technologies, Sep 1, 2014
Bookmarks Related papers MentionsView impact
2014 14th International Symposium on Communications and Information Technologies, Sep 1, 2014
Bookmarks Related papers MentionsView impact
2007 Second International Conference on Communications and Networking in China, 2007
The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mob... more The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mobile computing. Due to the limited storage capabilities on mobile devices, iSCSl (Internet Small Computer Interface), a remote storage access system would be one of the possible solutions to resolve this problem. However, when security of the storage data running over the storage area network is taken into consideration, it invariably raises the issue of security. This paper aims to design a new lightweight secure iSCSI-based remote storage for mobile devices. A security module which is suitable for mobile devices was proposed on top of the solution on the current limitations of default iSCSI security mechanism. Relevant experiments are carried out and the results reveal the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.
Bookmarks Related papers MentionsView impact
2007 Second International Conference on Communications and Networking in China, 2007
The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mob... more The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mobile computing. Due to the limited storage capabilities on mobile devices, iSCSl (Internet Small Computer Interface), a remote storage access system would be one of the possible solutions to resolve this problem. However, when security of the storage data running over the storage area network is taken into consideration, it invariably raises the issue of security. This paper aims to design a new lightweight secure iSCSI-based remote storage for mobile devices. A security module which is suitable for mobile devices was proposed on top of the solution on the current limitations of default iSCSI security mechanism. Relevant experiments are carried out and the results reveal the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Ieice Transactions on Communications, Feb 25, 1997
Bookmarks Related papers MentionsView impact
Ieice Transactions on Communications, Feb 25, 1997
Bookmarks Related papers MentionsView impact
IFMBE Proceedings, 2000
Bookmarks Related papers MentionsView impact
IFMBE Proceedings, 2000
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Journal of Information Processing Systems, 2011
... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in ... more ... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in a laboratory on an LAN. Summarized below are our steps of verification. • Two PCs (nodes with IP address xxx.xxx.xxx.76 and xxx.xxx.xxx.77) are connected to a referral rserver. ...
Bookmarks Related papers MentionsView impact
Journal of Information Processing Systems, 2011
... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in ... more ... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in a laboratory on an LAN. Summarized below are our steps of verification. • Two PCs (nodes with IP address xxx.xxx.xxx.76 and xxx.xxx.xxx.77) are connected to a referral rserver. ...
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Journal of information and communication convergence engineering, 2010
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
2014 14th International Symposium on Communications and Information Technologies, Sep 1, 2014
Bookmarks Related papers MentionsView impact
2014 14th International Symposium on Communications and Information Technologies, Sep 1, 2014
Bookmarks Related papers MentionsView impact
2007 Second International Conference on Communications and Networking in China, 2007
The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mob... more The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mobile computing. Due to the limited storage capabilities on mobile devices, iSCSl (Internet Small Computer Interface), a remote storage access system would be one of the possible solutions to resolve this problem. However, when security of the storage data running over the storage area network is taken into consideration, it invariably raises the issue of security. This paper aims to design a new lightweight secure iSCSI-based remote storage for mobile devices. A security module which is suitable for mobile devices was proposed on top of the solution on the current limitations of default iSCSI security mechanism. Relevant experiments are carried out and the results reveal the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.
Bookmarks Related papers MentionsView impact
2007 Second International Conference on Communications and Networking in China, 2007
The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mob... more The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mobile computing. Due to the limited storage capabilities on mobile devices, iSCSl (Internet Small Computer Interface), a remote storage access system would be one of the possible solutions to resolve this problem. However, when security of the storage data running over the storage area network is taken into consideration, it invariably raises the issue of security. This paper aims to design a new lightweight secure iSCSI-based remote storage for mobile devices. A security module which is suitable for mobile devices was proposed on top of the solution on the current limitations of default iSCSI security mechanism. Relevant experiments are carried out and the results reveal the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Ieice Transactions on Communications, Feb 25, 1997
Bookmarks Related papers MentionsView impact
Ieice Transactions on Communications, Feb 25, 1997
Bookmarks Related papers MentionsView impact
IFMBE Proceedings, 2000
Bookmarks Related papers MentionsView impact
IFMBE Proceedings, 2000
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact