• Title/Summary/Keyword: Identity-based Message

Search Result 73, Processing Time 0.029 seconds

A Study on Persona of Double-sided Characters Shown in Satoshi Kon's Works (콘 사토시 작품에서 나타나는 양면성을 지닌 캐릭터의 페르소나 연구 - <퍼펙트 블루>, <망상대리인>, <파프리카>를 중심으로 -)

  • Choo, Hye-Jin
    • Cartoon and Animation Studies
    • /
    • s.35
    • /
    • pp.181-208
    • /
    • 2014
  • Kon Satoshi is a representative animation film director who explores human's intrinsic self-identity based on ambivalence and delivers a message for self-reflection of entity. The aim of this study is to analyze the persona of character according to the way how a self incorporates with another self in his film; that is to say, how a mask of the personality expresses and realizes itself from the perspectives of the Jung's analytical psychology. The persona, defined as the upmost external personality, involves social behavior playing a specific role to establish constant relationship with others in a society. With increasing demand in a society, individuals get to adapt to outer environment by playing his/her given role in various masks of personality. In this way, although persona acts as a major function in relationship with outer world, it would exert a negative influence on formation of self-identity because of the inconsistency between consciousness and unconsciousness when immersed only in mask of personality, complying excessively with the demand of group. However, persona does not always have a negative effect on relationships. Developed adequately to fulfill its social function, persona is helpful to establish a healthy self-identity with balanced control between inner world of unconsciousness and outer world of consciousness. From these perspectives, this study can identify how the desire of mask hidden inside of each character expresses to function in a positive or negative way by analyzing characters in the film according to integrated pattern and correlation between consciousness and unconsciousness. Additionally, I hope that the psychological research methods in this study will be full of help for interpreting on a character analysis as a theoretical approach.

The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing (스마트폰 피싱에 안전한 메신저 인증 프로토콜 설계 및 구현)

  • Yu, Byung-Seok;Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.9-14
    • /
    • 2011
  • Phishing is an attack to theft an user's identity by masquerading the user or the device. The number of phishing victims are sharply increased due to wide spread use of smart phones and messenger programs. Smart phones can operate various wi-fi based apps besides typical voice call and SMS functions. Generally, the messenger program such as Kakao Talk or Nate On is consisted of client and server functions. Thus, the authentication between the client and the server is essential to communicate securely. In this paper, we propose the messenger authentication protocol safe against smart phone phishing. To protect communications among clients, the proposed method provides message encryption and authentication functions.

ID-based Proxy Signature Scheme from the Bilinear Map (Bilinear 함수를 이용한 ID 기반 대리서명 기법)

  • 이정연;천정희;김태성;진승헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.3-11
    • /
    • 2003
  • Proxy signatures are signature schemes in which an original signer delegates her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper we propose the ID-based proxy signature schemes using a bilinear map. In the previous R-based proxy signature scheme, the proxy signer can misuse the right of the signing capacity and the public key directory is required. However, by inserting the warrant information such as the identity of the proxy signer and the limit of the signing capacity to the proxy signature, our scheme can prevent the misuse of the proxy key pair by the proxy signer and does not require a public key certificate. Furthermore, our scheme dose not need a secure channel to deliver the warrant. Consequently, the proposed scheme is more efficient and useful than the previous proxy signature schemes.

The Server based Realtime Biometric Signature Scheme (서버 기반 실시간 바이오메트릭 서명 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.173-179
    • /
    • 2013
  • In a biometric authentication scheme, a user's biometric data that is unique to the user is used to prove the user's identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user's biometric data is used to prove that "this message is signed by the signer who claims to be" to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it's possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed.

IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment (WSN의 에너지 효율적 운영을 위한 신뢰성이 보장된 IDE-LEACH 프로토콜)

  • Cho, Young-Bok;Woo, Seng-Hee;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.10
    • /
    • pp.801-807
    • /
    • 2013
  • WSN consists of hundreds to thousands of sensor nodes. In order to solve the problem of energy consumption imbalance cluster head is reelected in every round, while node authentication scheme is utilized for secure communication. However, re-clustering increases the overhead of sensor nodes and during the node authentication phase the frequent AREQ/AREP message exchange also increases the overhead. Therefore, a secure and energy efficient protocol, by which overhead of sensor nodes is reduced and long time communication is achieved, is required for wireless sensor network. In this paper, an energy efficient and reliable IDE-LEACH protocol for WSN is proposed. The proposed protocol is prolongs networks lifetime about average 20% compared to the LEACH-based protocols and all attending nodes in communication form BS authentication consisted of trusted nodes.

A Study on the Landscape-Oriented Persuasive Language from Naming the Apartment Brand in Korea - Focus on the Analysis of Category and Lexeme - (국내 아파트브랜드 명명(命名)에 담긴 조경지향적 설득언어 - 유형 및 어휘소 분석을 중심으로 -)

  • Rho, Jae-Hyun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.38 no.1
    • /
    • pp.49-63
    • /
    • 2010
  • This study was intended to analyze and interpret the pattern of naming the domestic apartment brand from a semiologic viewpoint in a bid to review the meaning and value of apartment brand, while on the other hand, evaluating the characteristics of persuasive message pursued by current apartment brand in 2010, and consequently, the conclusion of the study is outlined as follows. 1. As a result of analyzing the coinage of branding naming, the words such as combination, joint and blending pattern tended to dominate, which seemed to attempt to represent the variety of values of the housing culture. Brand ideation tends to stress the character symbolism and polysemic message using syllepsis, and the experimental attempt to revive the traditional dwelling concept in a modern sense in a way of combining the archaic word with the Chinese character was found as well. 2. As a result of analyzing the frequency of verbal identity and lexeme of domestic apartments, those frequently used are in order of ville, nature, beauty(美), park, hi, green, palace(宮), nobility and center(tra), which are the lexemes representing the landscape, view, nature and dignity. 3. As a result of identifying the pattern of lexeme using analysis frame based on existing researches such as apartment brand positioning, the most important external core concepts controlling the direction and value of apartment brand are 'environment-orientated' and 'emotion-orientated', and internally, 'function-oriented'. Given the persuasive language expressing the 'environment-oriented' feature and the priority of brand lexeme are garden, park, view and the nature, a landscape-oriented persuasive message is seen to be surging in brand naming. 4. An emotion-oriented persuasive language such as dignity axis having major lexeme represented by palace, nobility, class and a pride axis having major semantic elements represented by human, I and you are used as major value concepts and persuasive language that lead domestic apartment brands to differentiation and upgradation. 5. Among the lexemes focusing on view from environment-oriented standpoint, hi, hill, tower, view, mark, heights are the trend pursued by high-rise apartment aiming at the view such as residential-commercial apartment, and thus the persuasive language focusing on high-rise concept is expected to become the element dominating the trend of apartment brand for the time being.

An One-time Proxy Signature Scheme Suitable for Mobile Communications (이동 통신 환경에 적합한 일회용 대리 서명 방식)

  • Kim, So-Jin;Park, Ji-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.533-540
    • /
    • 2003
  • According to the development of mobile communications, many people have been offered high qualify of the application services using portable terminals. But those works nay have many vulnerabilities and have the limit of excutaions. Because the application services are provided in mobile network and the performance of portable terminals is lower than that of base stations. To improve these problems, in this paper, we propose one-time proxy signature scheme that can reduce the computational ctsost on a user and prevent a proxy agent's dishonesty. The proposed scheme is based on the KBLK scheme [2] which applied the fail-stop signature scheme [1]. It is constructed that a proxy signer can sign only one message with a proxy key and we add anonimity to it for the user's identity protection in mobile communication like a M-commerce.

Energy-Aware Self-Stabilizing Distributed Clustering Protocol for Ad Hoc Networks: the case of WSNs

  • Ba, Mandicou;Flauzac, Olivier;Haggar, Bachar Salim;Makhloufi, Rafik;Nolot, Florent;Niang, Ibrahima
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2577-2596
    • /
    • 2013
  • In this paper, we present an Energy-Aware Self-Stabilizing Distributed Clustering protocol based on message-passing model for Ad Hoc networks. The latter does not require any initialization. Starting from an arbitrary configuration, the network converges to a stable state in a finite time. Our contribution is twofold. We firstly give the formal proof that the stabilization is reached after at most n+2 transitions and requires at most $n{\times}log(2n+{\kappa}+3)$ memory space, where n is the number of network nodes and ${\kappa}$ represents the maximum hops number in the clusters. Furthermore, using the OMNeT++ simulator, we perform an evaluation of our approach. Secondly, we propose an adaptation of our solution in the context of Wireless Sensor Networks (WSNs) with energy constraint. We notably show that our protocol can be easily used for constructing clusters according to multiple criteria in the election of cluster-heads, such as nodes' identity, residual energy or degree. We give a comparison under the different election metrics by evaluating their communication cost and energy consumption. Simulation results show that in terms of number of exchanged messages and energy consumption, it is better to use the Highest-ID metric for electing CHs.

A Study on Cooperation between Kerberos system and Credit-Control Server

  • Choi, Bae-Young;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.

  • PDF

A Study on the Runway Displays of Fashion Houses Using Objet (오브제를 활용한 패션 하우스의 런웨이 디스플레이에 관한 연구)

  • Jung, Minah;Kan, Hosup
    • Journal of Fashion Business
    • /
    • v.24 no.2
    • /
    • pp.136-153
    • /
    • 2020
  • In the second half of the twentieth century, fashion shows were a long-standing promotional medium and changed form and styles as times changed. In the past, if a model were on the stage simply to showcase a brand's work, the stage would have been transformed into a more active space, displaying various performances or seasonal themes combined with art. Then in the 2000s, there was an increasing number of instances when the global fashion industry of used figurative objet in organizing a fashion show's stage. In particular, because fashion shows require audience response and satisfaction, producing displays using objet is an effective marketing method. In the early 2000s, many brands were already introducing runway displays using objet, and these cases are expected to increase further in the future. This collection of 23 ready-to-wear models, which constituted the runway display, was by utilizing the objet more than five times from the 485 brands listed in Vogue's runway category. Based on our previous research, we classified the objet expressive characteristics as reproducibility, simplicity, non-artificiality, and fantasy. Among the 207 collections that we analyzed, the collection that utilized objet in its runway display had 170 circuits. Using objet in the runway display leverages visual language which allows one to communicate the season's concept, brand identity, and desired message more easily. Futhermore, it was spatially expressed to create feeling of satisfaction.