• Title/Summary/Keyword: Information recipient

Search Result 139, Processing Time 0.024 seconds

EDUCATIONAL EFFECTS OF RADIATION WORK-STUDY ACTIVITIES FOR ELEMENTARY, MIDDLE, AND HIGH SCHOOL STUDENTS

  • Han, Eun Ok;Kim, Jae Rok;Choi, Yoon Seok
    • Nuclear Engineering and Technology
    • /
    • v.46 no.3
    • /
    • pp.447-460
    • /
    • 2014
  • The results of this study, suggest public communication to promote the use of radiation as follows: first, suitable information for the recipient's perception patterns should be provided, as there is a difference in risk perception and acceptance between the experts and the public. Thus, information on the necessity of nuclear power should be provided to the public, while information based on technical risks is provided by the experts. Second, since the levels of perception, knowledge, and attitudes increased highly for sectors which use radiation after the class, classes should be provided continuously to increase students' perception, knowledge, and attitude, which are all preemptive variables which induce positive behavioral changes. Third, since the seven sectors which use radiation are highly correlated, arguments for the necessity of other sectors should be based on the necessity of the medical sector.

Proposal for 2-WAY Trade Verification Model that Based on Consensus between Trading Partners (거래당사자간 합의에 기반하는 온라인 전자금융 2-WAY 거래인증 모델 제안)

  • Lee, Ig-jun;Oh, Jae-sub;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1475-1487
    • /
    • 2018
  • To verify remitter's identity when the remitter transfers money to a recipient using an electronic financial service provided by the financial institution, the remitter inputs the information; such as the withdrawal account number, the withdrawal amount, the password pre-registered with the financial company, or the information from authenticating medium that is previously distributed by the financial institution. However, the 1-Way transaction between the financial institution and the remitter is exposed to a great risk of accidents such as an anomaly remittance or a voice phishing fraud. Therefore, in this study, we propose a 2-WAY trade verification model for electronic financial transaction that can be mutually agreed by allowing the recipient to share the transaction information with the remitter and the financial company. We have improved the traditional electronic financial transaction's method by replacing it to 2-WAY trade method, and it is used for various purposes; such as preventing an error within the remittance or voice phishing fraud, enhancing loan transaction and contract transaction, etc. Through these variety of applications, we are expecting to reduce the inconveniences while improving the convenience of financial transaction and vitalizing the P2P transaction of financial institution.

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

A Strong Designated Verifiable DL Based Signcryption Scheme

  • Mohanty, Sujata;Majhi, Banshidhar
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.567-574
    • /
    • 2012
  • This paper presents a strong designated verifiable signcryption scheme, in which a message is signcrypted by a signcryptor and only a specific receiver, who called a "designated verifier", verifies it using his own secret key. The scheme is secure, as an adversary can not verify the signature even if the secret key of the signer is compromised or leaked. The security of the proposed scheme lies in the complexity of solving two computationally hard problems, namely, the Discrete Logarithm Problem (DLP) and the Integer Factorization Problem (IFP). The security analysis of the scheme has been done and it is proved that, the proposed scheme can withstand an adaptive chosen ciphertext attack. This scheme can be very useful in organizations where there is a need to send confidential documents to a specific recipient. This scheme can also be applicable to real life scenarios, such as, e-commerce applications, e-banking and e-voting.

Adjunct Roles and External Predication

  • Kim,Yong-Beom
    • Language and Information
    • /
    • v.2 no.1
    • /
    • pp.157-176
    • /
    • 1998
  • This paper claims that beneficiary adjuncts are best analyzed as involving external predication in a version of grammatical framework called Head-driven Phrase Structure Grammar. This paper also claims that verbal catefories need to include the attribute INDEX among their semantic components in order to account for the external predication proposed in this paper. This paper distinguishes between recipient and beneficiary reles and assumes that the former is a semantic argument of a verb-type relation and that the latter is an adjunct which makes a semantic contribution as a modifier. This approach achives a unified analysis of modification phenomena of nominal and verbal categories and it can also accomodate Parson's(1990) idea that a verbal category denotes a set of events, not just an event.

  • PDF

Jointly Unsigncryptable Signcryption Schemes (공동으로만 Unsigncrypt할 수 있는 Signcryption 기법)

  • 구재형;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.63-68
    • /
    • 2003
  • Signcryption has been proposed to provide authentication md confidentiality of a message efficiently. In the existing schemes, any recipient can unsigncrypt the signcrypted message alone. In this paper, we propose a (t,n)-threshold signcryption scheme in which at least t recipients must participate in an unsigncryption process.

More Efficient Hierarchical ID-based Cryptosystem (보다 효율적인 Hierarchical ID-based Cryptosystem)

  • 김태구;염대현;이필중
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.129-134
    • /
    • 2003
  • Hierarchical ID-based Cryptography proposed by C. Gentry and A. Silverberg has the problem that the length of the ciphertext is proportional to the depth of the recipient in the hierarchy. In this paper, we propose the new methods to shorten the length of the ciphertext by using HlDS(Hierarchical ID-based Signature).

Constructive Steganography by Tangles

  • Qian, Zhenxing;Pan, Lin;Huang, Nannan;Zhang, Xinpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3911-3925
    • /
    • 2018
  • This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

A Study on the Usefulness of the BPO System - Focusing on Comparison with L/C System - (BPO 제도의 유용성에 관한 연구 -L/C 제도와의 비교를 중심으로-)

  • JANG, Eun-Hee;JEONG, Hee-Jin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.73
    • /
    • pp.21-42
    • /
    • 2017
  • A BPO is an irrevocable undertaking given by an Obligor Bank acting on behalf of the buyer to a Recipient Bank acting on behalf of the seller to pay on satisfaction of certain specified conditions. There have been a Trade Service Utility(TSU), a Transaction Matching Application(TMA) and ISO 20022 TSMT messages that core electronic technical systems linked to the BPO. As a key usefulness of the BPO, it brings to market an alternative means of satisfying the risk mitigation, financing and information management needs of banks and businesses engaged in trade. That is, corporates can spread the risk among multiple Obligor Banks by requesting multiple BPOs for the same trade transaction not to exceed the value of the initial transaction. Since the BPO replaces the manual document checking process with the electronic matching of data, buyers and sellers will benefit from significantly increased accuracy and objectivity. By using BPO, buyers and sellers can become trusted counterparties by demonstrating reliability and giving sellers the assurance of being paid on time as per the payment terms and conditions agreed. When compared to L/C, the BPO requires submission of data only. This requires a change of practice of those accustomed to dealing with physical documentation. The beneficiary of a BPO is the Recipient Bank which is always the Seller's Bank. In the meantime, banks will need to agree between themselves that the URBPO 750 will be applied, modified or excluded. However, customers of banks will face low transactional costs due to a fully automated process and standardized data formats used in international trade documentation. There is no amendment and cancellation rules in the URBPO 750s, but only have Assignment of Proceeds rules. As a result, the BPO is likely to enable new business opportunities, lower costs, fast transaction process and strengthen key customer relationships.

  • PDF

Prognostic Factors Influencing Survival and Success Rates of Autotransplanted Maxillary Canine (자가이식한 상악 견치의 생존율과 성공률에 영향을 주는 예후 인자 연구)

  • Kim, Dong-Hyun;Hyun, Hong-Keun;Kim, Young-Jae;Jang, Ki-Taeg
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.44 no.3
    • /
    • pp.317-326
    • /
    • 2017
  • The aim of this study was to investigate the survival and success rates of autotransplanted maxillary canine at the artificially formed recipient socket and evaluate the factors that influence survival and success rates. A total of 28 children who had 37 impacted canines were reviewed over the mean observation time of 25.1 months. Tooth mobility, pathologic root resorption, vertical bone loss, periapical lesion and anklyosis of donor tooth were investigated clinically and radiographically. The survival rate was 100%. The success rate was 64.9%, because 13 teeth were evaluated as unsuccessful. Significant parameter in determining the success rate of autotransplantation was enlarged follicle size of donor tooth according to Cox proportional hazard regression model. The results provide information necessary for clinician to make a better treatment decision about autotransplantation at the artificially formed recipient socket.