• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.032 seconds

A Design of Giga-bit security module Using Fully pipelined CTR-AES (Full-pipelined CTR-AES를 이용한 Giga-bit 보안모듈 설계)

  • Vinh, T.Q.;Park, Ju-Hyun;Kim, Young-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.225-228
    • /
    • 2008
  • In this paper, we presented our implementation of a counter mode AES based on Virtex4 FPGA. Our design exploits three advanced features: composite field arithmetic SubByte, efficient MixColumn transformation, and On-the-Fly Key-Scheduling for fully pipelined architecture. By pipelining the composite field implementation of the S-box, the area cost is reduced to average 17 percent. By designing the On-the-Fly key scheduling, we implemented an efficient key-expander module which is specialized for a pipelined architecture.

  • PDF

KEY EXCHANGE PROTOCOL USING MATRIX ALGEBRAS AND ITS ANALYSIS

  • CHO SOOJIN;HA KIL-CHAN;KIM YOUNG-ONE;MOON DONGHO
    • Journal of the Korean Mathematical Society
    • /
    • v.42 no.6
    • /
    • pp.1287-1309
    • /
    • 2005
  • A key exchange protocol using commutative subalge-bras of a full matrix algebra is considered. The security of the protocol depends on the difficulty of solving matrix equations XRY = T, with given matrices R and T. We give a polynomial time algorithm to solve XRY = T for the choice of certain types of subalgebras. We also compare the efficiency of the protocol with the Diffie-Hellman key exchange protocol on the key computation time and the key size.

The Fair and Equitable Treatment Standards through the Arbitral Award Cases under International Investment Disputes (국제투자분쟁에서 중재사례를 통해 본 공정.공평대우의 기준)

  • Choi, Young Joo;Hwang, Ji Hyeon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.57
    • /
    • pp.61-78
    • /
    • 2013
  • The purpose of this study is to clarify the standard of fair and equitable treatment. Although most international investment treaties prescribe fair and equitable treatment that is the obligation to provide fair and equitable treatment to foreign investor, there is no clear definition and specific elements of fair and equitable treatment. Through the arbitral award cases we can find that tribunals have interpreted to include six principles; Due process & Protection from denial of justice, Good faith, Reasonableness & Nondiscrimination, Compliance with contractual obligation, Full protection and security, Transparency & Protection of the investor's legitimate expectations. This study suggest that host countries and investors focus on international trends concerning investment disputes in order to avoid future disputes. So future disputes can be prevented and prepared in advance.

  • PDF

A Study on the Assessment of Rurality Characteristics in Rural Amenity Resources (농촌어메니티자원의 농촌다움 특성 평가에 관한 연구)

  • Lee, Jeung-Won;Jeong, Yoon-Hee;Im, Seung-Bin
    • Journal of Korean Society of Rural Planning
    • /
    • v.12 no.2 s.31
    • /
    • pp.1-9
    • /
    • 2006
  • Current environmental problems of rural area are connected to loss of rural functions which is food security as well as conservation of environment, balanced development of country and succession of traditional culture. To solve these problems, recent projects are focusing on social changes in rural area and conservation of rurality creating values of rural amenity resources. At this point, full implications of rurality which is the various aspects of rurality should be defined to be applied in direct plans to conserve the rurality. In this study, nine attributes of rurality are found as various meanings with adjectives included in image of rurality. For practical use of these adjectives of rurality attributes, we evaluate the list of rural amenity resources and suggested plans for conservation of rural amenity. These attributes can be used as an effective method for village plan which brings one of the attributes into relief.

Implementing Balanced Scorecard with System Dynamics Approach

  • Yoon, Joseph Y. K.
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.330-336
    • /
    • 2000
  • This paper discusses the potential of system dynamics modelling to support balanced scorecard. The balanced scorecard is a conceptual framework for translating an organisation's strategy into a set of performance indicators. These performance indicators are distributed across the 'classic'model's four perspective: Customers, Internal Business Processes, Financial, and Learning and Growth. This balanced scorecard, whilst having significant strength, suffers from the limitation of all performance indicator systems, namely that the interrelationships between indicators are overlooked and there is no way of taking into account the impact of delayed feedback which flows from introduction of new policy and legislative changes. System Dynamics is a methodology for understanding complex problems where there is dynamic behaviour and where feedback impacts significantly on system outcomes. System dynamics provides a rigorous basis for qualitative testing of the effects of performance indicators in complex environments such as health or social security. This can be supplemented with quantitative system dynamics simulation tools that further test the validity of indicators and the business rules implicit in them. System dynamics modelling has an important role to play in extending feedback cycle in performance measurements to a full systems approach.

  • PDF

Nested Virtualization Scheme for the Secure Cloud Computing Environment (안전한 클라우드 컴퓨팅 환경을 위한 중첩 가상화 기법)

  • Kim, Inhyeok;Kim, Junghan;Eom, Young Ik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.83-84
    • /
    • 2013
  • 클라우드 컴퓨팅을 이용하여 다양한 서비스가 생겨남에 따라 클라우드 컴퓨팅 환경에서의 보안이 더욱 중요해지고 있다. 이에 따라 클라우드 컴퓨팅을 구축하는 핵심 기술인 가상화 기술의 보안 또한 중요한 이슈가 되고 있다. 가상화 기술은 독립된 컴퓨팅 환경을 제공함으로써 기본적으로 안전한 컴퓨팅 환경을 제공하지만 가상화 기술의 보안 취약점을 이용하여 보안 공격하는 사례가 증가하고 있다. 이에 본 논문에서는 전가상화 기법과 운영체제 레벨 가상화 기법을 접목시켜 게스트 운영체제로부터 시작되는 보안 공격에 대해 대응할 수 있게 함으로써 보안성을 강화시키는 기법을 제안한다. 또한, 벤치마킹을 통해 이러한 접근방법이 기존의 컴퓨팅 성능에 거의 영향을 미치지 않음을 확인하였다.

  • PDF

Performance Analysis on GPS RAIM in the Post SA Era

  • Choi, Jae-Won;Lee, Jang-Gyu;Park, Chan-Gook;Jee, Gyu-In
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.56.4-56
    • /
    • 2001
  • Using GPS in the navigation systems such as aviation, maritime and land applications, integrity is considered importantly with accuracy for safety. Integrity monitoring performed in the GPS receiver itself is Receiver Autonomous Integrity Monitoring (RAIM) and need not an independent ground monitoring station. RAIM algorithm uses redundant information when more than four satellites are visible and makes consistency checks between measurement information to alarm users whether the system is operating out of its specified performance limits. Selective Availability (SA) that was used to protect the security interests of the U.S. and its allies by globally denying the full accuracy of the civil system was turned off on May 1, 2000 ...

  • PDF

Singular Stress Field Analysis and Strength Evaluation in Ceramic/.Metal Joints (세라믹/금속접합재의 열사이클피로에 따른 접합계면의 잔류응력분포 특성)

  • 박영철;김현수;허선철;강재욱
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1996.04a
    • /
    • pp.709-713
    • /
    • 1996
  • The ceramic has such high qualities as light weight, abrasion resistance, heat resistance compared with metal, but since it is breakable, it can't be used as structural material and it is desirable to joining metal which is full of toughness, but, according as the ceramic/metal joint is executed at high temperature, the joint residual stress develops near the joint sides in the process of cooling the high temperature down to the suitable temperature due to difference of the thermal expansion coefficient between ceramic and metal, and the joint residualstress lowers the fracture strength. In this study, to ensure security and improvement of bending strength, 1 studies on see distribution shape of residual stress according to high thermal cycle, and the influnence of theraml cycle and distribution shape of residual stess on joint-strength.

  • PDF

Face Recognition using wavelet transform and PCA/LDA (웨이브릿 변환과 PCA/LDA를 이용한 얼굴 인식)

  • 송영준;김영길;문성원;권혁봉
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.392-395
    • /
    • 2004
  • It was recently focus to face recognition at a security system according to development of computer. The face recognition has method using geometrical feature and one using statistical feature. The proposed method uses k level LL, LH, HL, HH subband images adopting wavelet transform. And, we adopt PCA/LDA to subband images. As a result of simulation, recognition rate of subband images using wavelet transform is more high than one of full size image.

  • PDF

A Study on Energy Harvesting Wireless Sensor Networks

  • Sharma, Pradip Kumar;Moon, Seo Yeon;Park, Jong Hyuk
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.199-201
    • /
    • 2016
  • Wireless sensor networks offer an attractive solution to several environments, security, and process monitoring problems. However, one barrier for their full adoption is the need to provide electrical power over extended periods of time without the need of dedicated wiring. Energy harvesting offers good solutions to this problem in several applications. This paper surveys the energy requirements of typical sensor network nodes and summarizes the future research work in the field of energy harvesting resource allocation in wireless sensor networks.