• 제목/요약/키워드: Information Security Confidence

검색결과 83건 처리시간 0.02초

스마트폰 가속도 센서를 이용한 사용자 인증 방법 연구 (A Study on User Authentication with Smartphone Accelerometer Sensor)

  • 서준석;문종섭
    • 정보보호학회논문지
    • /
    • 제25권6호
    • /
    • pp.1477-1484
    • /
    • 2015
  • 스마트폰 기반 금융 산업의 발달로 스마트폰을 이용한 인증 기법에 관심이 높아지고 있다. 다양한 생체 기반 사용자 인증 방식이 존재하지만 아직까지 스마트폰 기반 사용자의 걸음 패턴(gait) 인증 방식은 뚜렷한 발전을 보이고 있지 않다. 본 논문에서는 스마트폰에 기본적으로 탑재된 가속도 센서를 이용해 사용자를 인증하는 방법을 제안한다. 구체적으로, 스마트폰에서 수집한 데이터를 3D 변환하여 자세를 교정하고, 변환된 데이터에서 특징을 추출한 뒤 주성분 분석, 가우시안 혼합 모델링 과정을 거쳐 데이터를 학습 시킨다. 다음으로, 신뢰구간 검증 방식을 사용해 사용자 데이터를 검증했다. 그 결과, 통제 요인과 한계점이 많았던 선행 가속도 연구들과 달리 최소한의 통제 요인과 높은 정확도(약 96%)로 사용자 인증이 가능함을 입증했다.

Analyzing the Impact of Lockdown on COVID-19 Pandemic in Saudi Arabia

  • Gyani, Jayadev;Haq, Mohd Anul;Ahmed, Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.39-46
    • /
    • 2022
  • The spread of Omicron, a mutated version of COVID-19 across several countries is leading to the discussion of lockdown once again for curbing the spread of the new virus. In this context, this research is showing the impact of lockdown for the successful control of the COVID-19 pandemic in Saudi Arabia. The outbreak of the COVID-19 pandemic around the globe has affected Saudi Arabia with around 2,37,803 confirmed cases within the initial 4 months of transmission. Saudi Arabia has announced a 21-day lockdown from March 23, 2020, to reduce the transmission of the COVID-19 pandemic. Machine Learning-based, Multinomial logistic regression was applied to understand the relationship between daily COVID-19 confirmed cases and lockdown in the 17 most-affected cities of KSA. We used secondary published data from the Ministry of Health, KSA daily dataset of COVID-19 confirmed case counts. These 17 cities were categorized into 4 classes based on lockdown dates. A total of three scenarios such as night lockdown, full lockdown, and no lockdown have been analyzed with the total number of confirmed cases with 4 classes. 15 out of 17 cities have shown a strong correlation with a confidence interval of 95%. These findings provide evidence that the COVID-19 pandemic may be partially suppressed with lockdown measures.

SEED 구현 적합성 검증 시스템에 관한 연구 (On the SEED Validation System)

  • 김역;정창호;장윤석;이상진;이성재
    • 정보보호학회논문지
    • /
    • 제13권1호
    • /
    • pp.69-85
    • /
    • 2003
  • 본 논문에서는 정보보호 제품의 주요한 역할을 담당하는 암호 알고리즘의 구현 적합성에 대해 논의한다. 암호 알고리즘 구현 적합성 평가는 지정된 표준에 맞게 정확하게 구현했는가에 대한 평가이다. 따라서 해당 암호 알고리즘 기능별 또는 절차에 따라 알고리즘 평가가 수행된다. 본 논문에서 제시한 암호 알고리즘 평가 검증은 국내 표준인SEED 알고리즘을 그 대상으로 하며, 알고리즘의 기능에 따라 평가를 수행한다. 제안한 검증 시스템은 SEED 알고리즘 구현물에 대해 충분히 테스트하기 위해 필요한 테스트 벡터를 생성하여 이용하는 테스트와 검증의 정확성을 높이기 위해 임의 데이터를 이용한 테스트를 제공한다. 제안한 검증 시스템은 SEED를 이용한 정보보호 제품에 모두 적용 가능하므로 각종 암호제품 평가 및 인증에 활용될 수 있다.

테이블 패턴 스케줄 기반 OTP 인증 (New OTP Authentication Approach based on Table Pattern Schedule)

  • ;;;변영철
    • 전기학회논문지
    • /
    • 제66권12호
    • /
    • pp.1899-1904
    • /
    • 2017
  • This paper presents a new one-time password approach generated based on $4{\times}4$ pattern schedule. It demonstrates generation of passkey from initial seed of random codes and mapping out in table pattern schedule which will produce a new form of OTP scheme in protecting information or data. The OTP-2FA has been recognized by many organizations as a landmark to authentication techniques. OTP is the solution to the shortcomings of the traditional user name/password authentication. With the application of OTP, some have benefited already while others have had second thoughts because of some considerations like cryptographic issue. This paper presents a new method of algorithmic approach based on table schedule (grid authentication). The generation of OTP will be based on the random parameters that will be mapped out in rows and columns allowing the user to form the XY values to get the appropriate values. The algorithm will capture the values and extract the predefined characters that produce the OTP codes. This scheme can work in any information verification system to enhance the security, trust and confidence of the user.

Feige-Fiat-Shamir 은닉전자서명에 기반한 추적 가능한 전자화폐 시스템의 설계 (Design of traceable Electronic Cash System based on Feige-Fiat-Shamir blind digital signature)

  • 박왕석;박창섭
    • 정보보호학회논문지
    • /
    • 제11권3호
    • /
    • pp.33-44
    • /
    • 2001
  • 전자상거래는 실생활의 물질적인 상거래에 비해 많은 장점을 가지고 있지만, 인터넷이라는 가상공간을 통해 상거래가 이루어지므로 상호간의 신용문제, 지불 방법 등 개선되어야 할 부분이 많이 있다 이를 위한 초기의 전자화폐는 사용자의 개인정보에 대한 유출을 막기 위해 은닉전자서명을 이용하여 설계되었으며, 사용자의 완전한 익명성이 보장되었다. 본 논문에서는 계산적으로 효율성이 매우 좋은 Feige-Fiat-Shamir 은닉전자서명을 제안하였고, 제안한 Feige-Fiat Shamir 은닉전자서명을 이용하여, 전자화폐가 불법적으로 사용될 경우 전자화폐를 추적할 수 있는 추적 가능한 전자화 폐 시스템을 설계하였다.

암호화폐 가치 특성이 투자 의도에 미치는 영향에 관한 실증적 연구 : 가치 기반 수용모델을 중심으로 (An Empirical Study on the Impact of Cryptocurrency Value Characteristics on Investment Intention : Focusing on the Value-based Adoption Model (VAM))

  • 김상일;서재석;김정욱
    • 디지털산업정보학회논문지
    • /
    • 제20권2호
    • /
    • pp.141-157
    • /
    • 2024
  • This study examines the impact of cryptocurrency value characteristics on cryptocurrency investment intention. Stock craze and information provided through various media, including YouTube, play an essential role in helping investors recognize the value of cryptocurrency and develop positive investment intentions. In this study, we applied the Value-Based Adoption Model (VAM) to verify the relationship between cryptocurrency value characteristics and investment intention. We surveyed 500 cryptocurrency investors to assess network externalities, awareness, compatibility, cost benefits (fees), technicality, security, perceived value, and investment intentions. SEM (Structural Equation Modeling) using AMOS 26.0 was used for data analysis. Results show that network externalities, awareness, compatibility, cost benefits (fees), security, and perceived value significantly impact investment intention. This study provides insights that help investors accurately perceive cryptocurrencies and develop strategies to increase investment intentions. It also contributes to improving investors' decision-making ability. This comprehensive approach will foster the growth of the cryptocurrency market and strengthen investor confidence.

Preserving User Anonymity in Context-Aware Location-Based Services: A Proposed Framework

  • Teerakanok, Songpon;Vorakulpipat, Chalee;Kamolphiwong, Sinchai;Siwamogsatham, Siwaruk
    • ETRI Journal
    • /
    • 제35권3호
    • /
    • pp.501-511
    • /
    • 2013
  • Protecting privacy is an important goal in designing location-based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authentication process and the querying process is proposed. Unlike the designs proposed in previous works, our framework benefits from a combination of three important techniques: k-anonymity, timed fuzzy logic, and a one-way hash function. Modifying and adapting these existing schemes provides us with a simpler, less complex, yet more mature solution. During authentication, the one-way hash function provides users with more privacy by using fingerprints of users' identities. To provide anonymous authentication, the concept of confidence level is adopted with timed fuzzy logic. Regarding location privacy, spatial k-anonymity prevents the users' locations from being tracked. The experiment results and analysis show that our framework can strengthen the protection of anonymity and privacy of users by incurring a minimal implementation cost and can improve functionality.

인터넷 패션 쇼핑몰의 활성화 방안에 관한 연구 (A Study on the Active Plan of Internet Fashion Shopping-Mall)

  • 장동림;김윤
    • 복식문화연구
    • /
    • 제8권3호
    • /
    • pp.360-373
    • /
    • 2000
  • The purpose of this thesis is to analyze the present conditions and problems of the Internet Fashion Shopping-Mall, grope for as active plan to the Internet Fashion Shopping-Mall as a strategic method of fashion industry. The fashion industry of Internet Electronic Commerce has good prospect, and I propose the following some strategic plans of Internet Fashion Shopping-Mall. On the basis of my study, as a means of technology supplement, Virtual Reality System, such as 3D System or the newest Electronic Dressing Room System to solve the problem of products'an actual feeling, should be needed for consumers to feel as they really put the clothes on. Second, to offer more diversity programs, such as consumer sensitivity program, additional service, fashion news, life information and so on, are needed for companies to come over again the consumers to connect to the shopping-mall site. And, to build more perfect security terms of payment systems, such as ICash, Disital Cash, Net Check, Internet Insurance and so on, should be introduced for consumers to pay and furnish their personal information. If these technological developments are realized, Internet Fashion Shopping-Mall products will be a great success.

  • PDF

전자상거래 주체간 CORBA 기반 상호 인증 서비스 (CORBA-based Mutual Authentication Service for Subjects of Electronic Commerce)

  • 장경아;김태윤
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제26권10호
    • /
    • pp.1237-1247
    • /
    • 1999
  • 이질적 분산 환경에서 전자 상거래는 신임장을 기반으로 상거래 참여자들에 대한 인증 서비스가 제공되어야 한다. 본 연구에서는 CORBA 보안 명세 1 를 기반으로 전자 상거래 참여자들에 대한 객체 단위 인증 및 권한 부여 기법을 제공하는 상호 인증 서비스 구조를 제안한다. 이 구조는 Kerberos 2 의 인증 기법 및 인증 키 교환 기법으로 전자 상거래 참여자간에 상대 주체의 신원 확인 뿐 아니라 거래 진행 중 취득한 정보의 근원을 파악할 수 있도록 하였다. 또한 Kerberos 기법을 CORBA 플랫폼 기반의 상호 인증 구조로서 분산 환경에 대해 확장하였으므로 키 관리 등 보안 정보 관리에 있어 효율적이다.Abstract Electronic commerce shall provide its subjects with a credential-based authentication service in the heterogeneous distributed computing environment. In this paper, based on CORBA security service specification 1 which OMG defined, we propose the mutual authentication service for subjects of electronic commerce, providing the authentication of object level and the authenticated key exchange. This proposed structure, by Kerberos 2 for the authentication and the authenticated key exchange, assures not only the identification of a partner but also the confidence of origin of business item for negotiations between subjects of electronic commerce. Since our deployed Kerberos is extended to the mutual authentication service based on CORBA platform, it is efficient for security administration to manage the information such as a key management in the heterogeneous distributed computing environment.

From Reflection to Self-assessment: Methods of Developing Critical Thinking in Students

  • Olha I. Dienichieva;Maryna I. Komogorova;Svitlana F. Lukianchuk;Liudmyla I. Teletska;Inna M. Yankovska
    • International Journal of Computer Science & Network Security
    • /
    • 제24권7호
    • /
    • pp.148-156
    • /
    • 2024
  • The research paper presents the results of an experimental research of the development of critical thinking in third-year students majoring in 013 "Primary Education" in studying a special course "From Reflection to Self-Assessment: Critical Thinking Skills" (based on Lauren Starkey methodology). The research was conducted during the first half of 2019-2020 academic year. The sample representativeness was ensured by the method of random selection, the strategy of randomization according to the criteria of age, gender, level of academic performance was described. Given the confidence interval p=95% and the confidence interval of the error Δ=±0.05, the sample size was 94 people, including of the experimental group and 49 students of the control group. The peculiarities of the development of such critical thinking skills as reflective thinking, self-analysis, awareness of one's own achievements and shortcomings, choice of problem-solving strategy, use of cognitive models of learning are revealed. It was found that the development of critical thinking was achieved through a comprehensive combination of self-assessment and reflection, performing exercises to develop the ability to clearly articulate the problem, find, analyse and interpret relevant information, draw the right conclusions and explanations.