• 제목/요약/키워드: Masquerade

검색결과 47건 처리시간 0.025초

자궁경부 선양낭성암종의 세포학적 소견 - 1예 보고 - (The Cytologic Features of Adenoid Cystic Carcinoma of the Uterine Cervix - A Case Report -)

  • 하승연;조현이;오영하;류근신
    • 대한세포병리학회지
    • /
    • 제9권2호
    • /
    • pp.207-211
    • /
    • 1998
  • Adenoid cystic carcinoma of the uterine cervix is a rare tumor accounting for less than 1% of all cervical adenocarcinoma. This tumor is characterized by aggressive biological behavior with frequent local recurrence or metastatic spread, postmenopausal onset, and occasional association with conventional squamous cell carcinoma. The cytologic diagnosis of adenoid cystic carcinoma in the uterine cervix is often difficult because of negative smear due to intact overlying mucosa, cytologic findings mimicking endometrial cells, and masquerade as squamous ceil carcinoma. Recently we have experienced a case of adenoid cystic carcinoma arising in the uterine cervix, which was identified on the routine Papanicolaou smear and was histologically confirmed by the consequent biopsy. The smear showed abundant cellularity composed of relatively uniform cells. The tumor cells were arranged in small clusters, acini, naked cells, and loose sheets with abortive cribriform pattern. There were scattered globoid basement membrane-like materials and tumor diathesis. The nuclei were pleomorphic and showed hyperchromatic and coarsely granular choromatin with inconspicuous nucleoli. The punch biopsy of the uterine cervix showed typical histologic findings of adenoid cystic carcinoma characterized by tumor nests composed of hyperchromatic uniform basaloid cells, cribriform pattern, and cylindrical hyaline bodies.

  • PDF

타석증을 동반한 이하선의 정맥관 기형 1례 (A Case of Venous Malformation with Sialolithiasis in the Parotid Gland)

  • 한승훈;성전;유윤종;김광현;정영호
    • 대한두경부종양학회지
    • /
    • 제32권1호
    • /
    • pp.29-32
    • /
    • 2016
  • Venous malformation with phleboliths is uncommon cause of unilateral parotid swelling. The clinical and radiographic appearance of venous malformation with phleboliths may masquerade as sialolithiasis. A 49-year-old female complained about unilateral parotid swelling for 6 years. Preoperative evaluation including computed tomography and sonography showed the suspicion of venous malformation with phleboliths. Superficial parotidectomy was performed. Pathological examination confirmed that the mass was venous malformation with phleboliths combined with sialolith in the parotid gland. We present the case of unilateral parotid swelling caused by a venous malformation combined with sialolithiasis.

디지털시대 패션에 나타난 사이버페미니즘 연구 (제2보) -미적가치를 중심으로- (A Study of Cyberfeminism in fashion in the digital era (Part II) - Focused on aesthetic values -)

  • 김현수;양숙희
    • 한국의류학회지
    • /
    • 제28권2호
    • /
    • pp.200-211
    • /
    • 2004
  • The Purpose of this study was to review the effects of the cyberspace mentality on fashion as a visible symbol of feminity and to analyze terms of its aesthetic values. As for the research methodology, relevant theories across cultures and disciplines are reviewed and an experimental study is conducted to explore spiritual objectives in cyberspace. Then, major issues facing the digital society. symbolized in the computer networks, are reviewed in terms of feminine identity and physical beauty from a feminist's viewpoint. Lastly, the aesthetic values found in the spatial meditation of a new dimension (reality versus virtuality) is comparatively analyzed. The virual reality technology and bio-medical technology are combined to be represented in fashion to create a more realistic virtual world than the real one. Such a world may well be characterized by virtuality, artificiality, masquerade, and fantasy. The intrinsic values which are revealed as psychiatrical or psychological implicated values featuring virtual or artificial implications may well be characterized by distopia, hyper, hybridity and Sur Reality.

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

패스워드 추측공격에 안전한 원격 사용자 인증 스킴 (Secure Remote User Authentication Scheme for Password Guessing Attack)

  • 신승수;한군희
    • 한국산학기술학회논문지
    • /
    • 제12권12호
    • /
    • pp.5895-5901
    • /
    • 2011
  • 본 논문에서는 An[7]이 제안한 스킴이 패스워드 기반 스마트카드를 이용한 사용자 인증 스킴에서 고려하는 보안 요구사항을 만족하지 못함을 보였다. 이러한 보안 취약점을 해결하기 위하여 해시함수와 ElGamal 서명기반의 개선된 사용자 인증 스킴을 제안한다. 제안한 사용자 인증 스킴은 패스워드 추측공격, 위장공격, 재전송공격에 대응할 수 있고, 순방향 비밀성을 제공하는 스킴이다. 제안한 스킴은 An의 인증 스킴과 비교할 때,계산복잡도는 별 차이가 없이 유사하나, 안전성은 상대적으로 효율적임을 알 수 있다.

개인정보유출 2차 피해로 인한 스마트폰 Smishing 해킹과 Forensic 연구 (A Study on SmartPhone Hacking and Forensic of Secondary Damage caused by Leakage of Personal Information)

  • 박인우;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.273-276
    • /
    • 2014
  • 2014년 카드3사의 개인정보유출로 약 1건의 고객정보가 유출되었다. 카드사는 개인정보유출로 인한 2차 피해는 없다고 단정지었지만, 실제로 개인정보유출 2차 피해가 발생하고 있다. 특히 스마트폰에서 Smishing은 유출된 개인정보를 이용하여 지인을 가장한 송금과 소치올림픽 김모양 소송, 차량단속대상적발 등 개인정보 유출로 인한 2차피해가 스마트폰에서 Smishing사고가 발생하고 있다. 본 논문에서는 스마트폰 Smishing사고에 대한 개인정보유출에 대한 Forensic 하고 스미싱 사고로 인한 금융피해에 대한 Forensic을 분석 하고자 한다.

  • PDF

클라우드 기반 IoT 환경의 원격 헬스케어 시스템에 대한 보안성 분석 (Security Analysis of Remote Healthcare System in Cloud-based IoT Environment)

  • 권재민;홍세웅;최윤성
    • 디지털산업정보학회논문지
    • /
    • 제19권1호
    • /
    • pp.31-42
    • /
    • 2023
  • As computer performance is leveled upward, the use of IoT systems is gradually expanding. Although IoT systems are used in many fields, it is true that it is difficult to build a safe system due to performance limitations. To overcome these limitations, many researchers have proposed numerous protocols to improve security issues. Among them, Azrour et al. except. We proposed a new efficient and secure authentication protocol for remote healthcare systems in a cloud-based IoT environment, and claimed that the new protocol could solve the security vulnerabilities of the existing protocols and was more efficient. However, in this paper, through the security analysis of the remote healthcare system in the cloud-based IoT environment proposed by Azrour et al., the protocol of this system was found to be vulnerable to Masquerade attack, Lack of Perfect Forward Secrecy, Off-line password guessing attack, and Replay attack.

스마트폰을 위한 무선 AP 인증 방법 (A Method of Authenticating WLAN APs for Smartphones)

  • 신동오;강전일;양대헌;이석준;이경희
    • 한국통신학회논문지
    • /
    • 제39B권1호
    • /
    • pp.17-28
    • /
    • 2014
  • 스마트폰 사용자의 증가는 이동 통신사업자에게 커피숍, 지하철과 같은 공공장소에 와이파이 핫스팟을 제공함으로써 폭증하는 3/4G 트래픽을 분산시키는 노력을 하게 하였다. 전통적인 무선랜에서의 인증은 서비스 제공자측면에서 설계되었기 때문에, 서비스 이용자는 서비스 제공자에게 자신이 고객임을 증명하는 방식으로 이루어진다. 802.11 표준에서는 802.1X를 이용한 상호인증이 지원되지만, 서비스 이용자는 자신이 접속하려는 무선 AP가 정말 서비스제공자가 설치한 것인지 확인하는 것은 어렵다. 공격자는 사용자들의 개인 정보를 얻어내기 위하여 서비스 제공자가 설치한 AP와 동일한 SSID를 가진 위장 AP를 설치할 수 있다. 이 논문에서는 스마트폰 사용자 입장에서 정상적인 무선 AP를 인증하는 기법에 대해 소개한다. 그리고 이 논문의 제안이 이미 제공된 와이파이 핫스팟에서 보안 플러그인 형태로 잘 동작할 수 있음을 보이고, 이를 실험을 통해 증명한다.

PC에 탑재된 OTP의 취약점 분석 (Vulnerabilities Analysis of the OTP Implemented on a PC)

  • 홍우찬;이광우;김승주;원동호
    • 정보처리학회논문지C
    • /
    • 제17C권4호
    • /
    • pp.361-370
    • /
    • 2010
  • OTP(One Time Password)란 사용자가 인증시 안전한 메커니즘을 이용하여 매번 다른 패스워드를 생성하여 인증하는 방식을 말한다. OTP 인증 방식을 이용할 경우 공격자는 패스워드를 가로채어 정당한 사용자로 위장할 수 없게 된다. 이러한 OTP는 H/W 기반 또는 S/W 기반 형태로 구현될 수 있다. H/W를 기반으로 하는 단말기형과 카드형의 경우 배포 및 사용의 편의성 문제로 인해 대중화에 어려움이 존재하였다. 이를 대체하기 위한 방법으로 모바일이나 PC에 S/W 형태로 구현하는 OTP가 도입되고 있다. 하지만 S/W 제품은 구현상에 취약점이 존재할 경우 악의적인 공격의 대상이 될 수 있다는 문제점이 있다. 실제로 금융보안연구원의 보고서에서는 모바일 상에 탑재된 OTP의 경우 구현상에 취약점이 존재한다고 밝혔다. 하지만 PC상에 탑재된 OTP에 대해서는 현재까지 취약점 분석 사례가 존재하지 않는다. 이에 본 논문에서는 PC에 탑재된 OTP의 보안 검토사항을 도출하고, 실제 역공학을 통해 OTP 생성 메커니즘을 파악하여 취약점 분석을 수행하였다.

19세기 후반 이후 주류패션과 반패션에 표현된 성의 다원화에 관한 맥락적 연구 (A Contextual Study of the Pluralization of Sexuality Represented in Mainstream Fashion and Anti-Fashion Since the Late $19^{th}$ Century)

  • 최경희
    • 복식
    • /
    • 제57권5호
    • /
    • pp.166-182
    • /
    • 2007
  • The purpose of this study is to reinterpret sexuality represented in fashion since the latter half of the 19th century in a contextual view, on the basis of Foucauldian idea of post-structural sexuality. As for research methodology, literary research was undertaken from the conception of sexuality to a historical review of the culture and dress. Foucault maintains the view of plural sexuality, which floats by power relationship between dominant and oppositional discourses in a specific historical context. In contextual approach sexual ideology codified in fashion since the latter 19C shows the following aspects: First, the traditional sexual ideology in the latter 19C is a capitalist value, which gives a priority to bourgeois man's profits, and the Victorian discourses of sexuality constructs the dichotomized fashion of the period. Next, the former half of the $20^{th}$ C is regarded as the period of conformity rather than opposition with various alternatives appropriated to the mainstream, so the traditional sexual ideology in fashion of this period is still preserved. Finally, in post-capitalism period of the latter 20C a variety of anti-fashion visualized plural sexuality from the enormous oppositional discourses. Although it doesn't all mean deconstruction of sexuality in fashion by the anti-fashion re-appropriated without oppositional meanings, pluralization of sexuality implies dynamics of sexual discourses in the next historical period. As a result, fashion since the latter 19C has been changed as a means for expressing age and sexual desire out of gender and class. And mainstream fashion in even postmodern period keeps the modern value on the center of the hegemonic heterosexual masculinity though the increase of Androgynous Femininity in women's fashion may connote the meaning of femininity. The plural sexuality represented in fashion has a contextual flexibility, thus sexuality floats with a specific socio-cultural context and fashion represents a masquerade as an identity vehicle.