The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Tai-Yun KIM(2hit)

1-2hit
  • Temporary Mobile User Certificate for Mobile Information Services in UMTS

    Byung-Rae LEE  Kyung-Ah CHANG  Tai-Yun KIM  

     
    PAPER

      Vol:
    E83-B No:8
      Page(s):
    1880-1886

    This paper presents an efficient public-key protocol for mutual authentication and key exchange designed for mobile information services in UMTS. Certain modifications to the ASPeCT registration protocol is proposed to introduce Temporary Mobile User Certificate in UMTS environments. Proposed Temporary Mobile User Certificate, digitally-signed by the private signing key of the TTP located in the user's visiting domain, will be issued to the user during the registration protocol. ASPeCT AIP protocol can be modified to reduce communication overhead and speed up verification process using Temporary Mobile User Certificate between the user and the Value-Added Service Provider (VASP) located in the user's visiting domain. Furthermore, Temporary Mobile User Certificate can provide anonymity for a mobile user during the ASPeCT AIP protocol.

  • A Secure and Efficient Software Protection Model for Electronic Commerce

    Sung-Min LEE  Tai-Yun KIM  

     
    PAPER-Software Platform

      Vol:
    E84-B No:11
      Page(s):
    2997-3005

    Today software piracy is a major concern to electronic commerce since a digitized product such as software is vulnerable to redistribution and unauthorized use. This paper presents an enhanced electronic software distribution and software protection model. Authentication scheme of the proposed model is based on zero-knowledge (ZK) proof which requires limited computation. The proposed model considers post installation security using authentication agent. It prevents software piracy and illegal copy. It also provides secure and efficient software live-update mechanism based on traitor tracing scheme. Even if software or personal key is copied illegally, a merchant can trace back to its original owner from the electronic license and personal key. The proposed model provides security and reasonable performance and safety.