• Title/Summary/Keyword: 위장의

Search Result 1,434, Processing Time 0.036 seconds

A Strong RFID Authentication Protocol Based on Synchronized Secret Information (비밀정보 동기화에 기반한 Strong RFID 인증)

  • Ha, Jae-Cheol;Ha, Jung-Hoon;Park, Jea-Hoon;Moon, Sang-Jae;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.99-109
    • /
    • 2007
  • Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but, $[m/2]{\cdot}2+3$ operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.

A Secure RFID Multi-Tag Search Protocol Without On-line Server (서버가 없는 환경에서 안전한 RFID 다중 태그 검색 프로토콜)

  • Lee, Jae-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.405-415
    • /
    • 2012
  • In many applications a reader needs to determine whether a particular tag exists within a group of tags without a server. This is referred to as serverless RFID tag searching. A few protocols for the serverless RFID searching are proposed but they are the single tag search protocol which can search a tag at one time. In this paper, we propose a multi-tag search protocol based on a hash function and a random number generator which can search some tags at one time. For this study, we introduce a protocol which can resolve the problem of synchronization of seeds when communication error occurs in the S3PR protocol[1], and propose a multi-tag search protocol which can reduce the communication overhead. The proposed protocol is secure against tracking attack, impersonation attack, replay attack and denial-of-service attack. This study will be the basis of research for multi-tag serach protocol.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Analysis on the Type and Characteristics of Penalty in World Judo (세계유도 반칙 유형 및 특성 분석)

  • Lee, Seung Hun;Lee, Man Gi
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.607-614
    • /
    • 2020
  • The purpose of this study is to analyze the penalty types and characteristics of world judo players. Using a total of 19,889 penalties in 9,737 matches at the World Judo Grand Prix, the team draws a difference in the types and time of fouls according to gender, weight class and time. Results Both foul play and warning showed gender differences, and both men and women affected warning rates in weight class and time classification. In addition, fouls caused by non-combat behavior and camouflage attacks have a forward direction of time, and a low time of fouling by heavyweight athletes. Judo athletes and leaders expect to be used as basic data based on scientific data, such as training, skills, tactics and motivation, taking into account the characteristics of the foul type. Requires follow-up studies of scoring relationships and winning factors.

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

Automatic Anatomical Classification Model of Esophagogastroduodenoscopy Images Using Deep Convolutional Neural Networks for Guiding Endoscopic Photodocumentation

  • Park, Jung-Whan;Kim, Yoon;Kim, Woo-Jin;Nam, Seung-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.19-28
    • /
    • 2021
  • Esophagogastroduodenoscopy is a method commonly used for early diagnosis of upper gastrointestinal lesions. However, 10-20 percent of the gastric lesions are reported to be missed, due to human error. And countries including the US, the UK, and Japan, the World Endoscopy Organization (WEO) suggested guidelines about essential gastrointestinal parts to take pictures of so that all gastric lesions are observed. In this paper, we propose deep learning techniques for classification of anatomical sites, aiming for the system that informs practitioners whether they successfully did the gastroscopy without blind spots. The proposed model uses pre-processing modules and data augmentation techniques suitable for gastroscopy images. Not only does the experiment result with a maximum F1 score of 99.6%, but it also shows a error rate of less than 4% based on the actual data. Given the performance results, we found the model to be explainable with the potential to be utilized in the clinical area.

A Study on the Prescription Patterns of Gastrointestinal Protective Agent with Non-Steroidal Anti-Inflammatory Drugs in Korean Elderly Patients with Osteoarthritis (골관절염을 진단받고 비스테로이드성 항염제 복용 중인 65세 이상 환자의 위장관보호제 처방양상 연구)

  • Chun, Seongmin;Choi, Yoonhee
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.8 no.4
    • /
    • pp.79-92
    • /
    • 2020
  • Purpose : The purpose of this study was to evaluate the prescription pattern of NSAIDs and GPAs in the arthritis patients over 65 years old to prevent the GI adverse events. Nonsteroidal anti-inflammatory drugs (NSAIDs) are the most commonly used agents to treat arthritis, can cause gastrointestinal (GI) adverse effects. Recent guidelines recommend that moderate risk patients who have one or two risk factors, should be prescribed either combination of non-selective NSAID (nsNSAIDs) and gastroprotective agent (GPAs) or selective NSAID alone. Methods : Study population was National Patient Sample of 2011. Number of drugs used were 138 for NSAIDs and 21 for GPAs. Chi-square test was used to compare prescribing patterns. Results : The appropriate prescription rate follows the guideline was 11.2%: co-prescription with nsNSAID and proton pump inhibitor (PPI) or misoprostol was 1.6% and selective NSAID alone was 9.6%. Inappropriate prescription rates were as follows: co-prescription with nsNSAID and Histamine-2 receptor antagonist (H2RA) or antiacid was 53.8% and nsNSAID alone was 35.0%. The appropriate prescription rate among the types of medical institute was 54.4% in tertiary hospital, 31.2% in secondary hospital, and 6.0% in primary hospital. The appropriate prescription rate among the regions was 19.4%, highest in Seoul and 4.2%, lowest in Jeju. The appropriate prescription rate among the medical departments was as follow: 12.2% in orthopaedic surgery, 11.0% in internal medicine, and 7.7% in other departments. Conclusion : This finding suggests the needs to revise the national medical insurance imbursement policy, provide continuing medical education about the guideline of medical doctors.

Repair of Tracheoesophageal Fistula under Laryngeal Microsurgery Approach: Case Report and Literature Review (기관식도 누공에 대한 후두미세수술 접근하 재건술: 증례 보고 및 문헌 검토)

  • Han, Mun Soo;Yum, Gunhwee;Oh, Kyung Ho;Kwon, Soon Young
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.31 no.2
    • /
    • pp.83-86
    • /
    • 2020
  • Patients with tracheoesophageal fistula show signs of aspiration, possibly leading to pneumonia, which could be fatal to bed-ridden patients. Tracheoesophageal fistula occurs as a complication of intubation, tracheostomy tube insertion and nasogastric tube insertion. Possible etiology is pressure and ischemic necrosis given by tracheostomy tube and nasogastric tube to trachea and esophagus; or in some cases, larynx and hypopharynx. Meanwhile, for repair of tracheoesophageal fistula, transcervical approach can be considered but takes relatively long operation time and is not appropriate for patients with underlying diseases. We report a case of tracheoesophageal fistula complicated several years after tracheostomy tube and nasogastric tube insertion who came to medical attention with signs of aspiration. Authors successfully performed repair of the fistula under laryngeal microsurgery approach without skin incision and dissection, and thereby report the experience with review of literature.

Heart Rate Variability Analysis According to Clinical Characteristics in Patients with Burning Mouth Syndrome (구강작열감증후군 환자의 임상 특징에 따른 심박변이도 분석)

  • Lee, Hyun-Jin;Ha, Na-yeon;Ko, Seok-Jae;Park, Jae-Woo;Kim, Jin-sung
    • The Journal of Internal Korean Medicine
    • /
    • v.43 no.1
    • /
    • pp.53-67
    • /
    • 2022
  • Objectives: This study aimed to identify the characteristics of the heart rate variability (HRV) index in patients with burning mouth syndrome (BMS) and to evaluate the predictive value of HRV for Korean medical treatment responsiveness to tongue pain in BMS. Methods: Among BMS patients who visited the Oral Diseases Clinic of Kyung Hee University Korean Medicine Hospital from January 1, 2018, to May 31, 2021, we reviewed the clinical records of 217 women aged 50 years and over. HRV and unstimulated saliva flow rate (USFR) measurements were carried out, and all patients were asked to indicate their degree of tongue pain using the visual analog scale (VAS). The subjects were classified into subgroups according to the presence or absence of hyposalivation and VAS improvement, and each subgroup was compared using the HRV index. Logistic regression analysis was conducted to confirm whether cause-effect relationships were present between statistically significant values. Results: BMS patients had lower LF and HF than healthy people. Subgroup analysis demonstrated that there were some statistically significant differences in the HRV index according to salivation rate and degree of pain. In addition, as the LF/HF ratio increased, the pain improvement rate decreased after treatment. Conclusion: The autonomic nerve activity of BMS patients was lower than that of healthy people; however, autonomic balance was not impaired. In addition, tongue pain in BMS patients responded more favorably to Korean medical treatment when patients fell within a normal range of the LF/HF ratio, suggesting that autonomic imbalance could be used as one of the predictable factors in clinical practice.