• Title/Summary/Keyword: Internet conference

Search Result 3,869, Processing Time 0.032 seconds

Analyses of Light-weight Cryptography Technology for Internet of Things (사물인터넷 통신을 위한 경량 암호기술 동향 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.234-235
    • /
    • 2016
  • With the development of the Internet, the popularization of internet has become the new trend and enormously changed the way of human communication. There is a strong need for security. The following research will provide the definition and purpose of IoT and examine its security concerns, In this paper, we surveyed at energy consumption of lightweight block ciphers implemented in reconfigurable devices, and we analyze d the effects that round unrolling might have on the energy consumed during the encryption.

  • PDF

A k-means++ Algorithm for Internet Shopping Search Engine

  • Jian-Ji Ren;Jae-kee Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.75-77
    • /
    • 2008
  • Nowadays, as the indices of the major search engines grow to a tremendous proportion, vertical search services can help customers to find what they need. Search Engine is one of the reasons for Internet shopping success in today's world. The import one part of search engine is clustering data. The objective of this paper is to explore a k-means++ algorithm to calculate the clustering data which in the Internet shopping environment. The experiment results shows that the k-means++ algorithm is a faster algorithm to achieved a good clustering.

Multimedia Data Security of Video Conferencing System (영상회의 시스템에서의 멀티미디어 데이터 보안)

  • 이원호;한군희
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.231-236
    • /
    • 2003
  • Video conferencing system it is various at internet and uses the reading is become accomplished. Research of like this portion synchronization of audio, the video compression technique and multimedia data, supports the video conference the research of the Mbone of the If multicast for being active, being become accomplished the multimedia service which is various an video from internet, the line speed of communication becomes high-speed anger and to follow leads is become accomplished. The video conference from opening elder brother dispersion internet network environment the problem against the image which is an image conference data and a voice security is serious and it raises its head. To sleep it presents the security method which from the video conference it follows in quality of multimedia data from the dissertation which it sees and it does.

  • PDF

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

국가단위 인트라넷 구축방안에 관한 연구

  • Yoon, Seok-Min;Kim, Yu-Sin;Kang, Sung-Ho;Choi, Sung
    • Proceedings of the Technology Innovation Conference
    • /
    • 1997.07a
    • /
    • pp.307-329
    • /
    • 1997
  • Nowadays the whole World is overwhelmed by the wave of Information Technology. In particular, in this Information & Communication Era such advanced countries as United States, Germany, and France are now launching and preparing Government levels Information Technology Policy and Strategies in order to keep their information initiative and superiority. Ever since 1993 when the US government have been advocating m as well as NPR, the US is concentrating their all energies and efforts on the redeem of their former national competitiveness which was snatched up to Japan, meanwhile also Japanese government, who has announced NEW SOCIETY CAPITAL CONSTRUCTION PROGRAM in 1994 to be completed by 2010, is trying to do their whole national endeavors to enter into the highly enhanced information society. Recently also our Government enacted the LAW of INFORMATION TECHNOLOGY PROMOTE & EXPEDITE in 1995 then sequently in the next year announced its detailed enforcement regulations, targeting at one of the leading countries with highly advanced Information Technology. The concept of Internet which takes the concept of Internet into the inner side of the industries has been, since implemented in 1995, showing really the rapid growth and at the same time it is highlighted onto the next generations Information-network. The merits of Internet, representing as the affordable cost, continuous standardization, various functionalities of multimedia excellent expansibilities, easy interface is the most adequate choice as a newest method for our country that announce to be one of leading countries in the realization of Information Technology and expects immediate effect on the construction of Internet in the level of whole country. In an effort to construct the nations level of Internet by firstly the build-up and connection of each central and each local government level of internet, a few methods for nation levels internet build-up are here studied and described, while in the beginnings stage through both e-mails and internet home pages the nation level of internet can be established in stages. The construction of Internet in the level of the nation is not an issue of simple option but an essential and inevitable choice for the survival in 2000s and as well the jump-up and penetration onto the real advanced country in the New Era.

  • PDF

A Study on the Design Survey System Construction for the Internet Environment (인터넷 환경에서의 사용자 조사를 위한 디자인 서베이 시스템 구축에 관한 연구)

  • 오기태;이건표
    • Proceedings of the Korea Society of Design Studies Conference
    • /
    • 2000.11a
    • /
    • pp.108-109
    • /
    • 2000
  • 최근 인터넷 사용자의 급속한 증가와 더불어 인터넷 설문조사가 많이 시행되고 있다. 인터넷 설문조사는 적은 비용, 편리성, 짧은 설문기간 등의 장점을 갖고있지만, 전통적인 설문조사방법과 매우 다른 매체특성을 가지며 리서치 도구로서의 문제에 대한연구가 부족한 상황이다. (중략)

  • PDF