Search Results - yoohwan+kim

4 Results Sort By:
A novel aircraft location verification method for ADS-B in the NextGen air traffic control system
Invention SummaryAt the heart of the NextGen Air Traffic Control System, there is the ADS-B (Automatic Dependent Surveillance - Broadcast) that provides aircraft location data. Despite its importance, ADS-B has been developed without consideration of security risks and is subject to various types of attacks. Although a number of techniques have been...
Published: 1/5/2023   |   Inventor(s): Ju-Yeon Jo, Yoohwan Kim
Keywords(s):  
Category(s): All
A Method to Improve the Performance of HAIPE-Encrypted TCP Traffic in a Satellite Communication Environment
Inventors: Yoowan Kim & Ju-Yeon Jo Kim: His past research includes SCADA system protection, avionics system security, network authentication, security log analysis, secure routing schemes, satellite communication security, and blockchain applications Jo: Her research expertise includes network performance analysis, secure network protocol development,...
Published: 4/9/2024   |   Inventor(s): Yoohwan Kim, Ju-Yeon Jo, Khanh Pham
Keywords(s):  
Category(s): All
A Lightweight Communication Architecture For Small UAS Traffic Managment (SUTM)
A Lightweight Communication Architecture For Small UAS Traffic Management (SUTM)Invention SummaryFor this invention, the methods and systems may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. In addition, they may take the form of a computer program product...
Published: 1/4/2023   |   Inventor(s): Ju-Yeon Jo, Yoohwan Kim
Keywords(s):  
Category(s): All, Computer Science & Software, Engineering & Manufacturing
Secure Authentication Method Using Private User Identification Information
Invention SummaryMost computer systems employ a password verification system for access. A user is identified with a user ID and verified with a password. Although this method is very popular, it is vulnerable to the password guessing attack. However, the attacker doesn't need to guess the user ID because the user IDs are usually public, such as names...
Published: 1/4/2023   |   Inventor(s): Ju-Yeon Jo, Yoohwan Kim
Keywords(s): Computer Science & Software - Apps, Computer Science & Software - Computer Science, Computer Science & Software - Hardware, Computer Science & Software - Software, Software
Category(s): Computer Science & Software