• Title/Summary/Keyword: 속임수

Search Result 23, Processing Time 0.024 seconds

A Study on Secret Sharing Scheme with Cheaters (속임수를 가지는 비밀분산 방식에 대한 고찰)

  • Kim, Moon-Jeong;Oh, Soo-Hyun;Won, Dong-Ho;Chai, Young-Do
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.991-994
    • /
    • 2002
  • A. Shamir 는 비밀 정보 D를 n개의 조각으로 나눈 후, $k(k{\leq}D)$개의 조각으로는 D를 복원할 수 있으나, (k-1)개 이하의 조각으로는 복원할 수 없는 비밀 분산 방식을 처음으로 소개하였다. 이 방식은 대수학에서의 체(field) 이론에서 중요한 위치를 차지하고 있는 다항식에 대한 Lagrange interpolation에 기반하고 있으며, 키 복구 시스템 등에 실제로 사용되고 있다. 그 후에, Tompa 등은 Shamir 의 방식이 어떤 형태의 속임수에 대하여 안전하지 않음을 보이고 이 방식을 약간 변형하여 속임수에 대해 안전한 방식을 제안하였다. Tompa 등이 제안한 방식은 안전성이 어떤 증명 되지않은 가정에 의존하지 않는다는 Shamir 방식의 특성을 보존한다. 본 고에서는 위의 방법들을 수학적으로 세밀히 분석하여 보다 자세한 증명들을 제시하고, 키 복구 시스템에 적용하는 경우에 있어 각 방식의 유용성과 단점들을 비교한다.

  • PDF

Effects of Individual and Familial Characteristics on Preschoolers′ Theory-of-Mind (취학전 아동의 개인 및 가족적 특성이 마음의 이론 발달에 미치는 영향)

  • 배기조;최보가
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.8
    • /
    • pp.49-60
    • /
    • 2002
  • The purpose of this study was to analyze effects of child's age, language ability, social competence, parenting style, and socioeconomic status on preschoolers' theory of mind. The subjects were selected randomly from kindergartens and composed of three hundred 3-, 4-, and 5-year-olds and their parents and teachers. The data was analyzed by analysis of covariance and t-test. The major findings of this study were summarized as follows: it was found that language ability, parenting style, SES, and social competence had a positive effect upon preschoolers' theory of mind. This relation remained significant with children's age controlled. Children's theory of mind was more strongly related when their parents were highly affectionate with their children, children's language ability was greater, parents held higher socioeconomic status than those who had less prominent one, or children with higher social competence.

Evolution Engine for Virtual Environment Generation based on Artificial Life (가상환경 생성을 위한 인공생명 기반 진화엔진)

  • 홍진혁;조성배
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09b
    • /
    • pp.35-38
    • /
    • 2003
  • 최근 컴퓨터 게임의 확산과 함께 보다 나은 가상환경 생성을 위한 기술에 대한 필요성이 증가하고 있다 다양한 환경에서 지능적으로 행동하는 인공 캐릭터의 설계를 위해 다양한 인공지능 기술이 적용되고 있다. 하지만 게임의 캐릭터 설계에 적용된 휴리스틱이나 규칙기반 시스템 등의 기존 인공지능 기술은 게임 개발자에 의존적이기 때문에 플레이어가 쉽게 캐릭터의 행동패턴을 파악하여 게임의 흥미를 저하시키는 단점이 있다 따라서 진화연산이나 신경망 등의 학습기반 인공지능 기술의 게임에의 적용이 모색되고 있다 특히 진화를 이용한 지능기술은 자연계의 복잡성과 의외성을 모방하여 최적화된 지능보다는 속임수/의외성 등의 창의적인 지능행동의 생성을 가능하게 하며 새로운 게임전략의 생성, 게임 캐릭터의 성격형성 및 다양한 행동 생성 등에 매우 유용하다. 본 논문에서는 진화기술의 게임에의 효과적인 적용을 위해 진화엔진을 설계 및 제작하고 인공지능 시뮬레이터에 적용하여 그 유용성을 확인하였다.

  • PDF

Animal Cognition and the Evolution of the Human Brain (동물의 인지능력과 인간 두뇌의 진화)

  • Choe Jae C.
    • Korean Journal of Cognitive Science
    • /
    • v.15 no.4
    • /
    • pp.67-75
    • /
    • 2004
  • 인간이 진화의 산물이라면 인간의 두뇌도 당연히 진화의산물이다. 따라서 인간의 두뇌를 연구하는 데에는 진화적 관점이 필수적으로 요구된다. 그래서 나는 이 짤막한 논문에서 우리 인간을 제외한 다른 동물도 사고의 능력을 갖추고 있다는 사실을 증명해줄 수 있는 직접 또는 간접적 증거들을 제시하고 그러한 정보들이 우리 두뇌의 진화를 이해하는 데 어떤 함의가 있는지 논의하고자 한다. 동물의 인지 능력을 엿볼 수 있는 대표적인 행동들로 도구의 사용, 동물들이 만드는 각종 구조물, 진화의 역사 동안 한번도 전하지 못했던 새로운 문제에 대한 해결책, 속임수, 언어, 그리고 복잡한 사회구조에 대한 이해 등에 대해 동물행동학자들의 관찰 견과를 간략히 소개한다. 아울러 지난 몇 년간 본인이 추진해온 한국영장류 연구소(Institute of Primate Research and Conservation: iPRC)의 건립 계획과 연구 목표를 간략하게나마 밝히고자 한다.

  • PDF

Cookie-Based Identification of the Public Keys of TLS/SSL Certificates (쿠키 기반의 TLS/SSL 인증서 공개키의 확인)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.101-103
    • /
    • 2016
  • We propose a HTTP cookie-based identification of the public keys of Web sites for the case of failure to validate certificates. The proposed scheme effectively protects users from the phishing attacks of inducing them to access bogus sites. It incurs little performance overhead on the browser and the server of Web sites. It requires to implement the input processing of user credentials and the encryption and verification of cookie values, though.

A study on a Trickster in Talchum - Focusing on Maltugi in Yangbangwajang of Bongsantalchum (탈춤에 나타난 트릭스터 연구 - 봉산탈춤 "양반과장" 속 말뚝이를 중심으로)

  • Park, Hee-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.282-289
    • /
    • 2016
  • A term that has been used since ancient times, 'trickster' means 'a person who performs general tricks'. In other words, a trickster is a person who exhibits his or her intrinsic characteristics by using tricks, or who has a special ability to make any situation work well only for him or herself. This thesis looks for basic concepts and features of tricksters in research undertaken into tricksters to date. It also aims to uncover the trickster side of Maltugi in Talchum (a traditional mask dance). A trickster is a person who tricks, but the characteristic itself is unclear and abnormal. A trickster also has borderline, duplicitous or multi-value characteristics, so it is impossible to merely define him or her as 'a person who tricks'. When dealing with a trickster's characteristics, the 'Liminality' element is very important, because he or she is a person who exists in all the borderlines of space, time, society, and language, and assaults the social order via deceit, play, and the fulfillment of greed. Maltugi in Talchum is a man of humble birth, but he is a character who attacks the Yangban (aristocrats) without hesitation. He is a kind of representative of the people who speaks for the commoners' feelings. At a time of the Three Policies' Disorder and frequent external aggressions, the commoners felt a sense of helplessness against the Yangban, who they viewed as immoral. Maltugi laughs at and depreciates the Yangban through the use of puns, and shows a faithful attitude to the present without being afraid of the result caused by his activity. This implies that he has the characteristics of a trickster.

Concealing Communication Paths in Wireless Sensor Networks (무선 센서 네트워크에서의 통신 경로 은닉)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.12
    • /
    • pp.1353-1358
    • /
    • 2014
  • Tremendous amount of dummy packets are generally generated for faking over a wireless sensor network so as to keep the location privacy of nodes on the communication paths against the global eavesdropping. In this paper, a scoped-flooding protocol is designed for transferring data between each source and mobile sink(aka, basestation) where, the only nodes within the scope are allowed to issue dummy packets at every idle time so that the location privacy of the nodes on the paths is kept and the amount of dummy packets is reduced to the extend of the flooding scope. The size of the flooding diameter can be taken into consideration of the privacy level and the communication cost. We design a detailed specification of the protocol and verify several properties.

Concealing Communication Source and Destination in Wireless Sensor Networks(Part I) : Protocol Design (무선 센서 네트워크에서의 통신 근원지 및 도착지 은닉(제1부) : 프로토콜 설계)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.219-226
    • /
    • 2013
  • Against the global eavesdropping in wireless sensor networks, tremendous amount of dummy packets for faking are likely to be continuously generated in order to keep the location privacy of the communication source and destination. In our approach only certain disk-shaped zones of encompassing sources and destination are allowed to issue dummy packets during the data transfer so that the amount of generated packets is reduced while the location privacy of the source and destination remains secret. To this end we design a routing protocol and propose a detailed formal specification of it, and verify major characteristics.

Case Studies on Deceptive Data Visualization (기만적 데이터 시각화 사례 연구)

  • Kim, Si-Hyun;Park, Jin-Wan
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.521-528
    • /
    • 2018
  • Data visualization has become a useful tool to effectively communicate information and is widely used not only by experts but also at a general level. However, it is dangerous that it is as efficient as it is to transmit false information. All data visualizations have hidden intent with powerful messages by editor. Building a system that grasps these intentions helps to understand the thoughts of groups and individuals. Most of the existing research focuses on effective data visualization methods and methods of expression. The more various visualization methods, the more likely the data will be distorted. In this paper, we present an analysis of deceptive data visualization in a goal-oriented environment. Based on the vulnerability of human cognitive processing, we classify the attack types and identify what tricks occur in the context of data visualization. This study suggests the first step in studying the case of aggressive visualization and opens the way for further research.