Hyotaek Lim - Academia.edu (original) (raw)

Uploads

Papers by Hyotaek Lim

Research paper thumbnail of Practical Attacks on Hybrid Group Key Management for SOHAN

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Practical Attacks on Hybrid Group Key Management for SOHAN

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

Journal of Information Processing Systems, 2011

... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in ... more ... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in a laboratory on an LAN. Summarized below are our steps of verification. • Two PCs (nodes with IP address xxx.xxx.xxx.76 and xxx.xxx.xxx.77) are connected to a referral rserver. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

Journal of Information Processing Systems, 2011

... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in ... more ... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in a laboratory on an LAN. Summarized below are our steps of verification. • Two PCs (nodes with IP address xxx.xxx.xxx.76 and xxx.xxx.xxx.77) are connected to a referral rserver. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Two Factor Authentication for Cloud Computing

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Two Factor Authentication for Cloud Computing

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An effective framework of behavior detection-advanced static analysis for malware detection

2014 14th International Symposium on Communications and Information Technologies, Sep 1, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An effective framework of behavior detection-advanced static analysis for malware detection

2014 14th International Symposium on Communications and Information Technologies, Sep 1, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Lightweight Secure iSCSI-based Remote Storage Service for Mobile Devices

2007 Second International Conference on Communications and Networking in China, 2007

The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mob... more The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mobile computing. Due to the limited storage capabilities on mobile devices, iSCSl (Internet Small Computer Interface), a remote storage access system would be one of the possible solutions to resolve this problem. However, when security of the storage data running over the storage area network is taken into consideration, it invariably raises the issue of security. This paper aims to design a new lightweight secure iSCSI-based remote storage for mobile devices. A security module which is suitable for mobile devices was proposed on top of the solution on the current limitations of default iSCSI security mechanism. Relevant experiments are carried out and the results reveal the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Lightweight Secure iSCSI-based Remote Storage Service for Mobile Devices

2007 Second International Conference on Communications and Networking in China, 2007

The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mob... more The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mobile computing. Due to the limited storage capabilities on mobile devices, iSCSl (Internet Small Computer Interface), a remote storage access system would be one of the possible solutions to resolve this problem. However, when security of the storage data running over the storage area network is taken into consideration, it invariably raises the issue of security. This paper aims to design a new lightweight secure iSCSI-based remote storage for mobile devices. A security module which is suitable for mobile devices was proposed on top of the solution on the current limitations of default iSCSI security mechanism. Relevant experiments are carried out and the results reveal the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application

Bookmarks Related papers MentionsView impact

Research paper thumbnail of the Faculty of Science and Technology, Keio University

Ieice Transactions on Communications, Feb 25, 1997

Bookmarks Related papers MentionsView impact

Research paper thumbnail of the Faculty of Science and Technology, Keio University

Ieice Transactions on Communications, Feb 25, 1997

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Passive and Cost effective People Location Tracking System for Indoor Environments Using Distributed Wireless Sensor Network

IFMBE Proceedings, 2000

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Passive and Cost effective People Location Tracking System for Indoor Environments Using Distributed Wireless Sensor Network

IFMBE Proceedings, 2000

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Display Substrate, Method of Manufacturing the Same and Display Device Having the Same

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Display Substrate, Method of Manufacturing the Same and Display Device Having the Same

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Practical Attacks on Hybrid Group Key Management for SOHAN

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Practical Attacks on Hybrid Group Key Management for SOHAN

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

Journal of Information Processing Systems, 2011

... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in ... more ... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in a laboratory on an LAN. Summarized below are our steps of verification. • Two PCs (nodes with IP address xxx.xxx.xxx.76 and xxx.xxx.xxx.77) are connected to a referral rserver. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

Journal of Information Processing Systems, 2011

... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in ... more ... 4GB Page 7. Ivy Ong and Hyotaek Lim 59 4.1 Scenario Test We assessed the new architecture in a laboratory on an LAN. Summarized below are our steps of verification. • Two PCs (nodes with IP address xxx.xxx.xxx.76 and xxx.xxx.xxx.77) are connected to a referral rserver. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Two Factor Authentication for Cloud Computing

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Two Factor Authentication for Cloud Computing

Journal of information and communication convergence engineering, 2010

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An effective framework of behavior detection-advanced static analysis for malware detection

2014 14th International Symposium on Communications and Information Technologies, Sep 1, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An effective framework of behavior detection-advanced static analysis for malware detection

2014 14th International Symposium on Communications and Information Technologies, Sep 1, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Lightweight Secure iSCSI-based Remote Storage Service for Mobile Devices

2007 Second International Conference on Communications and Networking in China, 2007

The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mob... more The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mobile computing. Due to the limited storage capabilities on mobile devices, iSCSl (Internet Small Computer Interface), a remote storage access system would be one of the possible solutions to resolve this problem. However, when security of the storage data running over the storage area network is taken into consideration, it invariably raises the issue of security. This paper aims to design a new lightweight secure iSCSI-based remote storage for mobile devices. A security module which is suitable for mobile devices was proposed on top of the solution on the current limitations of default iSCSI security mechanism. Relevant experiments are carried out and the results reveal the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Lightweight Secure iSCSI-based Remote Storage Service for Mobile Devices

2007 Second International Conference on Communications and Networking in China, 2007

The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mob... more The rapid growth of ubiquitous technology has created a tremendous enhancement in the area of mobile computing. Due to the limited storage capabilities on mobile devices, iSCSl (Internet Small Computer Interface), a remote storage access system would be one of the possible solutions to resolve this problem. However, when security of the storage data running over the storage area network is taken into consideration, it invariably raises the issue of security. This paper aims to design a new lightweight secure iSCSI-based remote storage for mobile devices. A security module which is suitable for mobile devices was proposed on top of the solution on the current limitations of default iSCSI security mechanism. Relevant experiments are carried out and the results reveal the efficiency of proposed algorithm in which it introduces over 100% Read/Write performance improvement compared with the IPsec approach.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application

Bookmarks Related papers MentionsView impact

Research paper thumbnail of the Faculty of Science and Technology, Keio University

Ieice Transactions on Communications, Feb 25, 1997

Bookmarks Related papers MentionsView impact

Research paper thumbnail of the Faculty of Science and Technology, Keio University

Ieice Transactions on Communications, Feb 25, 1997

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Passive and Cost effective People Location Tracking System for Indoor Environments Using Distributed Wireless Sensor Network

IFMBE Proceedings, 2000

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Passive and Cost effective People Location Tracking System for Indoor Environments Using Distributed Wireless Sensor Network

IFMBE Proceedings, 2000

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Display Substrate, Method of Manufacturing the Same and Display Device Having the Same

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Display Substrate, Method of Manufacturing the Same and Display Device Having the Same

Bookmarks Related papers MentionsView impact

Log In