• Title/Summary/Keyword: Electronic Security(System)

Search Result 847, Processing Time 0.026 seconds

A Fair Certified Electronic Mail Protocol that Enhances Guarantee of Reception (수신 보장성이 향상된 공평한 배달 증명 전자 메일 프로토콜)

  • 박용수;조유근
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.86-94
    • /
    • 2003
  • Certified e-mail system guarantees that recipient will get mail content if and only if mall originator receives a receipt. Unlike previous schemes, Optimistic protocols recently published generate a receipt when it meets the condition that the mail content can be accessed by recliner at any time. So originator cannot assure the delivery of e-mail although he can get a receipt. In this paper, we show some flaws in optimistic protocols and propose improved schemes using delivery deadline. Modified protocols guarantee proof-of-receipt and eliminate the problem mentioned above. Furthermore, proposed modification technique can be applicable to most optimistic protocols and is efficient in the sense that modified schemes do not increase the number of messages.

Function verification and demonstration of mobile Gallery-Auction using NFC-based 2-Factor electronic payment (NFC 기반 2 Factor 전자결제를 이용한 모바일 갤러리-옥션의 기능 검증 및 시현)

  • Cha, Yoon Seok;Oh, Soo Hee;Kim, YongIl;Noh, SunKuk
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.24-30
    • /
    • 2018
  • Acquisition of the FIDO authentication technology in pursuit of improved security function of the NFC-based 2 factor electronic payment system enabled GenoTech Ch., Ltd. to develop its new service, Gallery-Auction, demoed at Daegu Exhibition. The demonstration was followed by the improvement requests in banner creation & installation, changes in UI, changes in order of operation, etc, which were taken into account for the succeeding update. During the second demonstration held at 'Art: Gwangju: 17,' it analyzed and visualized the number of visitors per hour there.

The electro-magnetic properties of Xe type flat lamp by discharge electrode structure (Xe형 평면광원의 방전 전극 구조 변화에 따른 전자계 특성)

  • Yang, Jong-Kyung;Pack, Kwang-Hyun;Lee, Jong-Chan;Choi, Yong-Sung;Park, Dae-Hee
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2005.05b
    • /
    • pp.15-18
    • /
    • 2005
  • As a display becomes large recently, Acquisition of high luminance and Luminance uniformity is becoming difficult in the existing CCFL or EEFL backlight system. So, study for a performance enhancement has enforced. but lamp development of flat type is asked for high luminance and a luminance uniformity security in of LCD and area anger trend ultimately. In this paper, we changed a tip shape of an electrode for production by the most suitable LCD backlight surface light source, and confirmed discharge characteristic along discharge gas pressure and voltage, and confirmed electric field distribution and discharge energy characteristic through a Maxwell 2D simulation. Therefore the discharge firing voltage characteristic showed a low characteristic than a rectangular type and round type in case of electrode which used tip of a triangle type, and displayed a discharge electric current as a same voltage was low.

  • PDF

Electrical and Electromagnetic Characteristics of Xe Plasma Flat Lamp by Electrode Structure (Xe 플라즈마 평판형 광원의 전극 구조에 따른 전기.자기적 특성)

  • Choi, Yong-Sung;Moon, Jong-Dae;Lee, Kyung-Sup;Lee, Sang-Heon
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.82-85
    • /
    • 2006
  • As a display becomes large recently, Acquisition of high luminance and Luminance uniformity is becoming difficult in the existing CCFL or EEFL backlight system. So, study for a performance enhancement has enforced. but lamp development of flat type is asked for high luminance and a luminance uniformity security in of LCD and area anger trend ultimately. In this paper, we changed a tip shape of an electrode for production by the most suitable LCD backlight surface light source, and confirmed discharge characteristic along discharge gas pressure and voltage, and confirmed electric field distribution and discharge energy characteristic through a Maxwell 2D simulation. Therefore the discharge firing voltage characteristic showed a low characteristic than a rectangular type and round type in case of electrode which used tip of a triangle type, and displayed a discharge electric current as a same voltage was low.

  • PDF

A Study on the Efficient RFID Tag Identification considering Performance Information of Individual Nodes in a Grid Environment (그리드 환경에서 노드별 성능정보를 고려한 효율적인 RFID 태그 판별에 관한 연구)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.797-802
    • /
    • 2011
  • RFID is recognized to technically occupy important position in ubiquitous computing environment and expected to create new markets in a variety of fields from now on. In order to generalize RFID system, it is required to solve the problem of privacy invasion and expedite lots of tags We suggest efficient RFID Tag Identification to identify tags quickly on the satisfaction with 3 security requirements of privacy protection in this paper. This methods are transferred to Grid environment through parallel analysis of Hash-Chain, and we measure performance of each nodes under the Grid environment. Then, We'll suggest SP-Division Algorithm to identify tags with each nodes and implement it in a Grid environment.

Proposal and Implementation on Non-Repudiation of Origin for DNP3 (DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현)

  • Yu, Ki-Soon;Song, Kyoung-Young;Jang, Min-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3(Distributed Network Protocol) is one of the most representative protocols which is used in SCADA(Supervisory Control and Data Acquisition) system. IEC 62351 is listing the integrity, confidentiality, availability and non-repudiation or accountability as the security requirement. However, IEEE Std. 1815 that is DNP3 standards does not define a mechanism for non-repudiation or accountability. In this paper, we propose a non-repudiation of origin technique about the sender of critical ASDU and implement the proposed scheme using software such as OpenSSL and SCADA source code library.

Synchronization Method of Coupling Coefficient of Linear and Nonlinear in SC-CNN(State-Controlled Cellular Neural Network) (SC-CNN(State-Controlled Cellular Neural Network)에서 선형과 비선형 결합 계수에 의한 동기화 기법)

  • Bae, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.1
    • /
    • pp.91-96
    • /
    • 2012
  • Recently, the research of security and its related problems has been received great interested. The research for hper-chaos systems and its synchronization are actively processing as one of method to apply to secure and cryptography communication. In this paper, we propose the synchronization method by coupling coefficient of linear and nonlinear in order to accomplish the synchronization of hyper-chaos system that organized by SC-CNN(State-Controlled Cellular Neural Network). We also verify and confirm the result of synchronization between entire transmitter and receiver, and each subsystem in transmitter and receiver through the phase portrait and difference of time-series by the computer simulation.

Hacking Detection Mechanism of Cyber Attacks Modeling (외부 해킹 탐지를 위한 사이버 공격 모델링)

  • Cheon, Yang-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.9
    • /
    • pp.1313-1318
    • /
    • 2013
  • In order to actively respond to cyber attacks, not only the security systems such as IDS, IPS, and Firewalls, but also ESM, a system that detects cyber attacks by analyzing various log data, are preferably deployed. However, as the attacks be come more elaborate and advanced, existing signature-based detection methods start to face their limitations. In response to that, researches upon symptom detection technology based on attack modeling by employing big-data analysis technology are actively on-going. This symptom detection technology is effective when it can accurately extract features of attacks and manipulate them to successfully execute the attack modeling. We propose the ways to extract attack features which can play a role as the basis of the modeling and detect intelligent threats by carrying out scenario-based modeling.

Electricla Properties of Xe Plasma Flat Lamp (Xe 플라즈마 평판 램프의 전기적 특성)

  • Choi, Yong-Sung;Cho, Jae-Cheol;Hong, Kyung-Jin;Lee, Woo-Sun;Lee, Kyung-Sup
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.12a
    • /
    • pp.35-38
    • /
    • 2006
  • As a display becomes large recently, Acquisition of high luminance and Luminance uniformity is becoming difficult in the existing CCFL or EEFL backlight system. So, study for a performance enhancement has enforced. but lamp development of flat type is asked for high luminance and a luminance uniformity security in of LCD and area anger trend ultimately. In this paper, we changed a tip shape of an electrode for production by the most suitable LCD backlight surface light source, and confirmed discharge characteristic along discharge gas pressure and voltage, and confirmed electric field distribution and discharge energy characteristic through a Maxwell 2D simulation. Therefore the discharge firing voltage characteristic showed a low characteristic than a rectangular type and round type in case of electrode which used tip of a triangle type, and displayed a discharge electric current as a same voltage was low.

  • PDF

Heterogeneous Face Recognition Using Texture feature descriptors (텍스처 기술자들을 이용한 이질적 얼굴 인식 시스템)

  • Bae, Han Byeol;Lee, Sangyoun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.3
    • /
    • pp.208-214
    • /
    • 2021
  • Recently, much of the intelligent security scenario and criminal investigation demands for matching photo and non-photo. Existing face recognition system can not sufficiently guarantee these needs. In this paper, we propose an algorithm to improve the performance of heterogeneous face recognition systems by reducing the different modality between sketches and photos of the same person. The proposed algorithm extracts each image's texture features through texture descriptors (gray level co-occurrence matrix, multiscale local binary pattern), and based on this, generates a transformation matrix through eigenfeature regularization and extraction techniques. The score value calculated between the vectors generated in this way finally recognizes the identity of the sketch image through the score normalization methods.