Abstract: Electronic voting (E-voting) using an internet has been
recently performed in some nations and regions. There is no spatial
restriction which a voter directly has to visit the polling place, but an
e-voting using an internet has to go together the computer in which the
internet connection is possible. Also, this voting requires an access
code for the e-voting through the beforehand report of a voter. To
minimize these disadvantages, we propose a method in which a voter,
who has the wireless certificate issued in advance, uses its own cellular
phone for an e-voting without the special registration for a vote. Our
proposal allows a voter to cast his vote in a simple and convenient way
without the limit of time and location, thereby increasing the voting
rate, and also ensuring confidentiality and anonymity.
Abstract: Cell phone forensics to acquire and analyze data in the
cellular phone is nowadays being used in a national investigation
organization and a private company. In order to collect cellular phone
flash memory data, we have two methods. Firstly, it is a logical
method which acquires files and directories from the file system of the
cell phone flash memory. Secondly, we can get all data from bit-by-bit
copy of entire physical memory using a low level access method. In
this paper, we describe a forensic tool to acquire cell phone flash
memory data using a logical level approach. By our tool, we can get
EFS file system and peek memory data with an arbitrary region from
Korea CDMA cell phone.
Abstract: This paper proposes the authentication method using
ESA algorithm instead of using CAVE algorithm in the CDMA
mobile communication systems including IS-95 and CDMA2000 1x.
And, we analyze to apply ESA mechanism on behalf of CAVE
mechanism without the change of message format and air interface in
the existing CDMA systems. If ESA algorithm can be used as the
substitution of CAVE algorithm, security strength of authentication
algorithm is intensified without protocol change. An algorithm
replacement proposed in this paper is not to change an authentication
mechanism, but to configure input of ESA algorithm and to produce
output. Therefore, our proposal can be the compatible to the existing
systems.