Electronics and Telecommunications Research Institute

Displaying 1-18 of 18 results

  • White Papers // Jul 2013

    SimpleLock: Fast and Accurate Hybrid Data Race Detector

    Data races are one of the major causes of concurrency bugs in multithreaded programs, but they are hard to find due to nondeterministic thread scheduling. Data race detectors are essential tools that help long-suffering programmers to locate data races in multithreaded programs. One type of detectors precisely detects data races...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Mar 2013

    Joint Wireless Information and Energy Transfer in a Two-User MIMO Interference Channel

    Over the last decade, there has been a lot of interest to transfer energy wirelessly and recently, Radio Frequency (RF) radiation has become a viable source for energy harvesting. It is nowadays possible to transfer the energy wirelessly with a reasonable efficiency over small distances and, furthermore, the Wireless Sensor...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Sep 2011

    Localization Using Mobile Anchor Trajectory in Wireless Sensor Networks

    Due to increasing applications using location information, localization has been one of important research issues in Wireless Sensor Networks (WSN). A straight-forward approach is to add the GPS receivers to all nodes. Because of the strict H/W restrictions of WSN applications, localization schemes, which do not need expensive H/W devices,...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Apr 2010

    Partial EBG Structure with DeCap for Ultra-Wideband Suppression of Simultaneous Switching Noise in a High-Speed System

    To supply a power distribution network with stable power in a high-speed mixed mode system, simultaneous switching noise caused at the multilayer PCB and package structures needs to be sufficiently suppressed. The Uniplanar Compact Electromagnetic BandGap (UC-EBG) structure is well known as a promising solution to suppress the power noise...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Liveness Detection for Embedded Face Recognition System

    To increase reliability of face recognition system, the system must be able to distinguish real face from a copy of face such as a photograph. In this paper, the authors propose a fast and memory efficient method of live face detection for embedded face recognition system, based on the analysis...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    DHCP Message Authentication With an Effective Key Management

    In this paper the authors describe the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Design of Integration Security System Using XML Security

    In this paper, the authors design an integration security system that provides authentication service, authorization service, and management service of security data and a unified interface for the management service. The interface is originated from XKMS protocol and is used to manage security data such as XACML policies, SAML assertions...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Specialized Web Robot for Objectionable Web Content Classification

    This paper proposes a specialized Web robot to automatically collect objectionable Web contents for use in an objectionable Web content classification system, which creates the URL database of objectionable Web contents. It aims at shortening the update period of the DB, increasing the number of URLs in the DB, and...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Status and Requirements of Counter-Cyberterrorism

    The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jan 2009

    Multi-Hash Based Pattern Matching Mechanism for High-Performance Intrusion Detection

    Many Network-based Intrusion Detection Systems (NIDSs) are developed till now to respond these network attacks. As network technology presses forward, Gigabit Ethernet has become the actual standard for large network installations. Therefore, software solutions in developing high-speed NIDSs are increasingly impractical. It thus appears well motivated to investigate the hardware-based...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Dec 2008

    SMS and VMS for an Instant Messaging in the Future Home Environment

    Almost all homes will be connected by many kinds of network utilities in the near future and require a service gateway as a platform to bridge the gap between external network and internal home network. Also, home users require an instant messaging what is happening in their home. In this...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Dec 2008

    Secure Mobile Commerce Based on XML Security

    Companies across the world are turning to mobile commerce because mobility brings competitive advantages through personal contact; resource flexibility and streamlined processes enabling companies to enhance revenue generation Therefore success in the mobile commerce is dependent on the development and deployment of an end-to-end security solution that protects wireless network,...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Dec 2008

    An Efficient Flow Analysis Scheme for Identifying Various Applications in IP-Based Networks

    The purpose of this paper proposes a network flow identification methodology considering network traffic dynamics caused by various types of recent network-based applications. In particular, P2P applications that generate encrypted packets are rarely visible to previous schemes, which have been proposed to handle packet filtering and control. Therefore, as a...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Dec 2008

    Key Management for Overlay-Based IPTV Content Delivery

    Internet Protocol TeleVision (IPTV) is a system designed for live broadcast TV, Video-on-Demand (VoD), and additional value-added services through QoS guaranteed IP networks. The protection of TV program is critical for the success of the IPTV. In traditional TV systems, a key management function, called conditional access, is employed to...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Aug 2008

    An Efficient Authenticated Key Exchange Protocol With a Tight Security Reduction

    This paper presents a new Authenticated Key Exchange (AKE) protocol, called NETS, and proves its security in the extended Canetti-Krawczyk model under the random oracle assumption and the Gap Diffie-Hellman (GDH) assumption. The protocol enjoys a simple and tight security reduction compared to those of HMQV and CMQV without using...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // May 2008

    Bandwidth Consumption Control and Service Differentiation for Video Streaming

    Multimedia streaming is resource demanding. It may starve other applications such as file transfer sharing the network, for example, in a smart home. To address the problem, a fuzzy logic control to bound the bandwidth consumption of multimedia streams is applied. This paper also differentiates the video quality for streams...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // May 2008

    Design of Low-Area Rijndael Hardware Core

    This paper presents a compact 8-bit AES hardware architecture suitable for low-area and low-power applications such as wireless network devices. Unlike the conventional 32-bit architecture which uses 8 S-boxes to implement the SubBytes transformation and the InvSubBytes transformation, the 8-bit architecture presented in this paper requires only 2 S-boxes. In...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Apr 2008

    Technical Trends of Mobile Web 2.0: What Next?

    As one of the most programmatic web application trends, Web 2.0 has recently opened the 2nd golden age of the World Wide Web (WWW); thus wielding great influence on various industries. The effect of Web 2.0 is not confined to the wired Internet industry; in fact, it has dramatically spread...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jan 2009

    Multi-Hash Based Pattern Matching Mechanism for High-Performance Intrusion Detection

    Many Network-based Intrusion Detection Systems (NIDSs) are developed till now to respond these network attacks. As network technology presses forward, Gigabit Ethernet has become the actual standard for large network installations. Therefore, software solutions in developing high-speed NIDSs are increasingly impractical. It thus appears well motivated to investigate the hardware-based...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Mar 2013

    Joint Wireless Information and Energy Transfer in a Two-User MIMO Interference Channel

    Over the last decade, there has been a lot of interest to transfer energy wirelessly and recently, Radio Frequency (RF) radiation has become a viable source for energy harvesting. It is nowadays possible to transfer the energy wirelessly with a reasonable efficiency over small distances and, furthermore, the Wireless Sensor...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jul 2013

    SimpleLock: Fast and Accurate Hybrid Data Race Detector

    Data races are one of the major causes of concurrency bugs in multithreaded programs, but they are hard to find due to nondeterministic thread scheduling. Data race detectors are essential tools that help long-suffering programmers to locate data races in multithreaded programs. One type of detectors precisely detects data races...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // May 2008

    Bandwidth Consumption Control and Service Differentiation for Video Streaming

    Multimedia streaming is resource demanding. It may starve other applications such as file transfer sharing the network, for example, in a smart home. To address the problem, a fuzzy logic control to bound the bandwidth consumption of multimedia streams is applied. This paper also differentiates the video quality for streams...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Dec 2008

    An Efficient Flow Analysis Scheme for Identifying Various Applications in IP-Based Networks

    The purpose of this paper proposes a network flow identification methodology considering network traffic dynamics caused by various types of recent network-based applications. In particular, P2P applications that generate encrypted packets are rarely visible to previous schemes, which have been proposed to handle packet filtering and control. Therefore, as a...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Dec 2008

    Key Management for Overlay-Based IPTV Content Delivery

    Internet Protocol TeleVision (IPTV) is a system designed for live broadcast TV, Video-on-Demand (VoD), and additional value-added services through QoS guaranteed IP networks. The protection of TV program is critical for the success of the IPTV. In traditional TV systems, a key management function, called conditional access, is employed to...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // May 2008

    Design of Low-Area Rijndael Hardware Core

    This paper presents a compact 8-bit AES hardware architecture suitable for low-area and low-power applications such as wireless network devices. Unlike the conventional 32-bit architecture which uses 8 S-boxes to implement the SubBytes transformation and the InvSubBytes transformation, the 8-bit architecture presented in this paper requires only 2 S-boxes. In...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Sep 2011

    Localization Using Mobile Anchor Trajectory in Wireless Sensor Networks

    Due to increasing applications using location information, localization has been one of important research issues in Wireless Sensor Networks (WSN). A straight-forward approach is to add the GPS receivers to all nodes. Because of the strict H/W restrictions of WSN applications, localization schemes, which do not need expensive H/W devices,...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Apr 2010

    Partial EBG Structure with DeCap for Ultra-Wideband Suppression of Simultaneous Switching Noise in a High-Speed System

    To supply a power distribution network with stable power in a high-speed mixed mode system, simultaneous switching noise caused at the multilayer PCB and package structures needs to be sufficiently suppressed. The Uniplanar Compact Electromagnetic BandGap (UC-EBG) structure is well known as a promising solution to suppress the power noise...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Apr 2008

    Technical Trends of Mobile Web 2.0: What Next?

    As one of the most programmatic web application trends, Web 2.0 has recently opened the 2nd golden age of the World Wide Web (WWW); thus wielding great influence on various industries. The effect of Web 2.0 is not confined to the wired Internet industry; in fact, it has dramatically spread...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Dec 2008

    SMS and VMS for an Instant Messaging in the Future Home Environment

    Almost all homes will be connected by many kinds of network utilities in the near future and require a service gateway as a platform to bridge the gap between external network and internal home network. Also, home users require an instant messaging what is happening in their home. In this...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Dec 2008

    Secure Mobile Commerce Based on XML Security

    Companies across the world are turning to mobile commerce because mobility brings competitive advantages through personal contact; resource flexibility and streamlined processes enabling companies to enhance revenue generation Therefore success in the mobile commerce is dependent on the development and deployment of an end-to-end security solution that protects wireless network,...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    DHCP Message Authentication With an Effective Key Management

    In this paper the authors describe the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Design of Integration Security System Using XML Security

    In this paper, the authors design an integration security system that provides authentication service, authorization service, and management service of security data and a unified interface for the management service. The interface is originated from XKMS protocol and is used to manage security data such as XACML policies, SAML assertions...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Specialized Web Robot for Objectionable Web Content Classification

    This paper proposes a specialized Web robot to automatically collect objectionable Web contents for use in an objectionable Web content classification system, which creates the URL database of objectionable Web contents. It aims at shortening the update period of the DB, increasing the number of URLs in the DB, and...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Status and Requirements of Counter-Cyberterrorism

    The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Aug 2008

    An Efficient Authenticated Key Exchange Protocol With a Tight Security Reduction

    This paper presents a new Authenticated Key Exchange (AKE) protocol, called NETS, and proves its security in the extended Canetti-Krawczyk model under the random oracle assumption and the Gap Diffie-Hellman (GDH) assumption. The protocol enjoys a simple and tight security reduction compared to those of HMQV and CMQV without using...

    Provided By Electronics and Telecommunications Research Institute

  • White Papers // Jun 2009

    Liveness Detection for Embedded Face Recognition System

    To increase reliability of face recognition system, the system must be able to distinguish real face from a copy of face such as a photograph. In this paper, the authors propose a fast and memory efficient method of live face detection for embedded face recognition system, based on the analysis...

    Provided By Electronics and Telecommunications Research Institute