scispace - formally typeset
H

Hyoung-Kee Choi

Researcher at Sungkyunkwan University

Publications -  77
Citations -  906

Hyoung-Kee Choi is an academic researcher from Sungkyunkwan University. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 16, co-authored 77 publications receiving 874 citations. Previous affiliations of Hyoung-Kee Choi include Georgia Institute of Technology.

Papers
More filters
Proceedings ArticleDOI

A behavioral model of Web traffic

TL;DR: A Web traffic model designed to assist in the evaluation and engineering of shared communication networks and is behavioral, which can extrapolate the model to assess the effect of changes in protocols, the network or user behavior.
Journal ArticleDOI

Security Analysis of Handover Key Management in 4G LTE/SAE Networks

TL;DR: This paper identifies and details the vulnerability of this handover key management to what are called desynchronization attacks, and explores how network operators can determine for themselves an optimal interval for updates that minimizes the signaling load they impose while protecting the security of user traffic.
Journal ArticleDOI

A group-based security protocol for machine-type communications in LTE-advanced

TL;DR: This paper proposes the design of an efficient security protocol for MTC, designed to be compatible with the incumbent system by being composed of only symmetric cryptography and attained by aggregating many authentication requests into a single one.
Proceedings ArticleDOI

Building Femtocell More Secure with Improved Proxy Signature

TL;DR: An improved authentication and key agreement mechanism for HeNB which adapts proxy-signature and proxy-signed proxy- signature is proposed which prevents the various security threats but also accomplishes minimum distance from user-tolerable authentication delay.
Proceedings ArticleDOI

A group-based security protocol for Machine Type Communications in LTE-Advanced

TL;DR: Performance evaluation suggests that this protocol is efficient with respect to authentication overhead and handover delay, and is designed to be secure against many attacks by using a software verification tool.