• Title/Summary/Keyword: Id3

Search Result 983, Processing Time 0.031 seconds

Efficient Identity-based Threshold Proxy Signature (효율적인 ID 기반의 Threshold 대리 서명)

  • Cho, Won-Hee;Park, Kun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.949-951
    • /
    • 2005
  • ID기반의 암호 시스템은 사용자의 ID를 공개키처럼 활용하는 시스템[1]이다. ID 기반 threshold 대리 서명(IDTPS)은 이러한 환경에서 사용 가능한 threshold 대리 서명 기법이며, Xu 등[2]에 의해 SOK-IBS[3]를 기반으로 처음 만들어졌다. 본 논문에서는 Cha-Cheon[4]의 서명 기법을 기반으로 하는 효율적인 ID 기반의 threshold 대리 서명을 제안한다. 여기서는 pairing 연산을 적게 사용하고 pairing에 사용되는 군으로 사상되는 해쉬 함수를 적게 사용하기 때문에 이전 기법보다 효율적이면서도 충분한 안전성을 보장하게 된다.

  • PDF

Study for IPTV based NGN applying Identity management apply (NGN 기반 IPTV 서비스에서의 IdM의 적용방안)

  • Lee, Young-Pyo;Park, Jun-Su;Kim, Hee-Dong;Jang, Jae-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.301-304
    • /
    • 2009
  • 현재의 IPTV 시비스는 VoD+PPV와 같이 단순한 형태로 서비스를 제공하고 있다. IPTV 서비스 사업자들은 IPTV의 새로운 수익모델인 양방항성 통신특성에 최적화된 서비스를 제공해야 한다. 양방향 통신의 대표적인 서비스로는 T-commerce가 있다. T-commerce 서비스 제공시 IPTV 가입자의 정보가 제3의 서비스 사업자로 전송되기 때문에 개방된 IP망에서 가입자의 정보가 전송되므로 개인정보보호의 중요성이 커지게 될 것이다. 양방향 서비스를 제공하면서 개인정보보호를 유지하는 방안으로 ID를 통합적으로 관리하는 기술인 IdM(Identity Management)을 IPTV에 적용하는 방안이 고려되고 있다. 본 논문에서는 NGN(Next Generation Network)기반 IPTV의 IdM 적용방안에 대해 기술한다.

  • PDF

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

A System Unauthorized Access using MAC Address and OTP (MAC Address와 OTP를 이용한 비인가 접근 거부 시스템)

  • Shin, Seung-Soo;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.127-135
    • /
    • 2012
  • This study improves the existing user identification method using user ID and password. The new protocol protecting unauthorized access is designed and developed using user's ID, password, and OTP for user certification as well as MAC address for computer identification on networks. The safety on trials of unauthorized certification is tested and analyzed for four types following the criterion of information acquisition.

A Study of the Detecting Method about the Identification Card's Counterfeit, Modification and Illegal Use by Minors (미성년자의 신분증 위·변조 및 도용을 검출하기 위한 방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.87-101
    • /
    • 2018
  • Minors' law evasion is getting serious. Some of them make a fake ID card or use a stolen ID card illegally. They are illegally used for buying alcohol, cigarette, bond or going to club, pub, motel and so on. On the latest News, there was a case that teens rented a car with a driver licence without checking and had severe car accident. Like this case, car rental service was fined and suspended from business because they did not figure out ID card's counterfeit or modification. Thus, this study investigates the detecting method about the ID card(including a driver license) counterfeit, modification or illegal use. The server has a database of 17~19's minors one fingerprint and services whether the visitor is adult true or not. The method will be usable and economical for business. Then, it was compared and analyzed with methods already in use in business.

Local Interconnect Network(LIN): Protocols, Frames, and LIN Description file(LDF) (Local Interconnect Network(LIN): 프로토콜, 프레임, LIN Description File(LDF))

  • Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.355-367
    • /
    • 2023
  • Local Interconnect Network (LIN) is a low-speed in-vehicle network bus, and it is widely used in body applications such as windows, doors, HVAC, and lighting. This review explains protocols and message frames of LIN bus in detail. LIN bus basically transmits ID and payloads in data frame. How to interpret ID and payloads is defined in LIN Description file (LDF). Each LIN bus has unique LDF and its corresponding unique configuration. This review also explains syntax and example of LDF in detail.

Improvement in efficiency on ID-based Delegation Network (ID 기반 위임 네트워크의 성능 개선방안)

  • Youn, Taek-Young;Jeong, Sang-Tae;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.17-25
    • /
    • 2007
  • Delegation of signing capability is a common practice in various applications. Mambo et al. proposed a proxy signatures as a solutions for delegation of signing capability. Proxy signatures allow a designated proxy signer to sign on behalf of an original signer. After the concept of proxy signature scheme is proposed, many variants are proposed to support more general delegation setting. To capture all possible delegation structures, the concept of delegation network was proposed by Aura. ID-based cryptography, which is suited for flexible environment, is desirable to construct a delegation network. Chow et al proposed an ID-based delegation network. In the computational point of view, their solution requires E pairing operations and N elliptic curve scalar multiplications where E and N are the number of edges and nodes in a delegation structure, respectively. In this paper, we proposed an efficient ID-based delegation network which requires only E pairing operations. Moreover, we can design a modified delegation network that requires only N pairing operations.

Conversion of Large RDF Data using Hash-based ID Mapping Tables with MapReduce Jobs (맵리듀스 잡을 사용한 해시 ID 매핑 테이블 기반 대량 RDF 데이터 변환 방법)

  • Kim, InA;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.236-239
    • /
    • 2021
  • With the growth of AI technology, the scale of Knowledge Graphs continues to be expanded. Knowledge Graphs are mainly expressed as RDF representations that consist of connected triples. Many RDF storages compress and transform RDF triples into the condensed IDs. However, if we try to transform a large scale of RDF triples, it occurs the high processing time and memory overhead because it needs to search the large ID mapping table. In this paper, we propose the method of converting RDF triples using Hash-based ID mapping tables with MapReduce, which is the software framework with a parallel, distributed algorithm. Our proposed method not only transforms RDF triples into Integer-based IDs, but also improves the conversion speed and memory overhead. As a result of our experiment with the proposed method for LUBM, the size of the dataset is reduced by about 3.8 times and the conversion time was spent about 106 seconds.

  • PDF

Lactic Acid Bacterial Fermentation Increases the Antiallergic Effects of Ixeris dentata

  • Park, Eun-Kyung;Sung, Jin-Hee;Trinh, Hien-Trung;Bae, Eun-Ah;Yun, Hyung-Kwon;Hong, Seong-Sig;Kim, Dong-Hyun
    • Journal of Microbiology and Biotechnology
    • /
    • v.18 no.2
    • /
    • pp.308-313
    • /
    • 2008
  • Ixeris dentata (ID, family Asteraceae), called Seumbakuy in Korea, was fermented with lactic acid bacteria (LAB) and their antiallergic activities were investigated. Fermentation of ID with Bifidobacterium breve or Lactobacillus acidophilus increased its inhibition of degranulation in RBL-2H3 cells induced by the IgE-antigen complex. Oral administration of these extracts to mice inhibited the passive cutaneous anaphylaxis (PCA) reaction induced by the IgE-antigen complex and scratching behaviors induced by compound 48/80. The fermented ID more potently inhibited the PCA reaction and scratching behaviors than the non-fermented one. These extracts also inhibited mRNA expression of TNF-${\alpha}$ and IL-4, as well as NF-${\kappa}B$ activation in RBL-2H3 cells induced by the IgE-antigen complex. These findings suggest that LAB fermentation improves ID-mediated inhibition of IgE-induced allergic diseases such as rhinitis and asthma, and that ID works by inhibiting degranulation and NF-${\kappa}B$ activation in mast cells and basophils.

Personality Profile of TMD Patients from the Viewpoint of Pain (통증을 중심으로 본 악관절장애 환자의 인성적 경향에 대한 고찰)

  • Sang-Cheol Yoon;Jae-Kap Choi
    • Journal of Oral Medicine and Pain
    • /
    • v.20 no.1
    • /
    • pp.79-87
    • /
    • 1995
  • Personality characteristics of third decade female TMD patients was studied by means of SCL-90-R test. 112 TMD patients and 96 dental controls were subjected at the department of Oral medicine, Kyungpook National University Hospital. All the patients were divided into 3 groups according to their pain profile namely, MPDS, ID with Pain and ID with out Pain, and dental controls were divided into 2 groups manely, Dental Controls with Pain and Dental Controls without Pain for comparison. The obtained results were as follows : 1. Mean T-scores of SCL-90-R primary scales and global indexes in the patient and control group were within normal range. 2. When compared between groups with pain, MPDS group were significantly higher in scales of SOM, 0-C, I-S, HOS and PHOB than ID with Pain group and in scales of SOM, I-S. DEP, HOS and PHOM than Dental Controls with Pain group. 3. When compared with ID and Control groups in same pain condition, there were no significant differences between ID without pain and Dental Controls without Pain group. 4. When compared between groups with pain and groups without pain, there were significant differences in scales of SOM and O-C between Dental Controls with Pain and Dental controls without Pain group.

  • PDF