• Title/Summary/Keyword: Masquerade

Search Result 48, Processing Time 0.023 seconds

A Contextual Study of the Pluralization of Sexuality Represented in Mainstream Fashion and Anti-Fashion Since the Late $19^{th}$ Century (19세기 후반 이후 주류패션과 반패션에 표현된 성의 다원화에 관한 맥락적 연구)

  • Choi, Kyung-Hee
    • Journal of the Korean Society of Costume
    • /
    • v.57 no.5 s.114
    • /
    • pp.166-182
    • /
    • 2007
  • The purpose of this study is to reinterpret sexuality represented in fashion since the latter half of the 19th century in a contextual view, on the basis of Foucauldian idea of post-structural sexuality. As for research methodology, literary research was undertaken from the conception of sexuality to a historical review of the culture and dress. Foucault maintains the view of plural sexuality, which floats by power relationship between dominant and oppositional discourses in a specific historical context. In contextual approach sexual ideology codified in fashion since the latter 19C shows the following aspects: First, the traditional sexual ideology in the latter 19C is a capitalist value, which gives a priority to bourgeois man's profits, and the Victorian discourses of sexuality constructs the dichotomized fashion of the period. Next, the former half of the $20^{th}$ C is regarded as the period of conformity rather than opposition with various alternatives appropriated to the mainstream, so the traditional sexual ideology in fashion of this period is still preserved. Finally, in post-capitalism period of the latter 20C a variety of anti-fashion visualized plural sexuality from the enormous oppositional discourses. Although it doesn't all mean deconstruction of sexuality in fashion by the anti-fashion re-appropriated without oppositional meanings, pluralization of sexuality implies dynamics of sexual discourses in the next historical period. As a result, fashion since the latter 19C has been changed as a means for expressing age and sexual desire out of gender and class. And mainstream fashion in even postmodern period keeps the modern value on the center of the hegemonic heterosexual masculinity though the increase of Androgynous Femininity in women's fashion may connote the meaning of femininity. The plural sexuality represented in fashion has a contextual flexibility, thus sexuality floats with a specific socio-cultural context and fashion represents a masquerade as an identity vehicle.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

Representation of women in visual representation system of fashion photography structuralized by male gaze (남성적 응시에 의해 구조화되는 패션사진의 시각적 재현체제에 기반 한 여성의 재현)

  • Lee, Younghee;Yim, Eunhyuk
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.6
    • /
    • pp.1038-1050
    • /
    • 2015
  • This study is a theoretical research to investigate a methodological framework for analyzing the representation of women in fashion photography. For this study, this article attempts to develop a conceptual framework of the visual representation system through Lacan's gaze theory, and analyze the representational aspects of women configured by gendered characteristics in the visual representation system. Structuralizing the visual representation system based on that theory, the gaze, the image/screen, and the subject of representation in the Lacan's triangle diagram are replaced by the camera as the signifier of gaze, the representational image, and the seeing subject respectively. In the visual representation system, the camera creates a male-oriented visual field and structures a relationship of gendered power between male gaze as the seeing subject and female eye as an object to be seen. Looking into the representational aspects of women in this visual representation system structuralized by male gaze, women are represented in a way that reflects male desire through masquerade to comply with the patriarchal gaze, or differences that emphasizes the uniqueness and autonomy of women released from a patriarchal discourse. This study would be significant in that it provides theoretical basis for an analytic approach to the representation of women in fashion photography which we accept as a fixed one through the ideology of naturalization.

A Case of Meckel's Diverticulum Presented with Acute Abdomen in a Newborn (신생아에서 급성 복증으로 발현된 Meckel 게실 1예)

  • Lim, Jae Young;Jang, Sun Hwa;Cho, Jae Min;Ko, Gyung Hyuck;Park, Eun Sil;Seo, Ji Hyun;Park, Chan Hoo;Woo, Hyang Ok;Youn, Hee Shang
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.8 no.2
    • /
    • pp.222-225
    • /
    • 2005
  • Meckel's diverticulum is generally acknowledged to be the most prevalent congenital anomaly of the gastrointestinal tract. The preoperative diagnosis of Meckel's diverticulum is difficult, especially in neonates, because of the lesions ability to masquerade as one of a variety of much more common abdominal pathologies. Recently we experienced a case of perforated Meckel's diverticulum with mild inflammatory reaction, intestinal adhesion, and small bowel obstruction in a previous healthy 9-day-old neonate. The spontaneous perforation of Meckel's diverticulum in neonate is very rare but serious entity. The course was rapid and progressed to sepsis. So despite its varied presentation, Meckel's diverticulum should be kept in mind as a cause of acute abdomen in neonates.

  • PDF

Socio-semiotic Analysis of Plural Sexuality represented in Modern Fashion (II) (현대패션에 표현된 다원적 성에 관한 사회기호학적 분석 (II))

  • Choi, Kyung-Hee;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.57 no.4 s.113
    • /
    • pp.126-142
    • /
    • 2007
  • The second part of this study is to typify plural sexuality articulated with fashion images in men's and women's popular fashion magazines in Korea since 2000 and ultimately to infer sexual ideology codified in modern fashion by a framework of this study, the socio-semiotic model. From this, sexuality represented in modern fashion was typified as follows: in women's fashion Traditional Femininity, Glamor Femininity, Androgynous Femininity, Babydoll Femininity and Genderless sexuality, while in men's fashion Traditional Masculinity, Macho Masculinity, Androgynous Masculinity, Adolescent Masculinity and Genderless sexuality. The conclusion of this study is as follows: First, modern fashion has been changed from a means expressing gender and class into a sign vehicle representing the new ruling system of age and sexual desire. The binary oppositional sexuality on center of man in the 19 C capitalist period has been gradually pluralized towards the post-capitalist period. Next, mainstream society in Korea is still positioned in the traditional heterosexuality, keeping the vertical power relationship between man and woman even in the post-modern period. However, the fact that both Traditional Femininity and Androgynous Femininity acquire the position of dominant femininity connotes the change of modern femininity. Finally, plural sexuality represented in modern fashion has family resemblance and it shows contextual flexibility within contemporary period as well as a historical context. As a result, sexuality floats with a specific historical and socio-cultural context, and fashion as a material culture represents a masquerade as a identity vehicle, which constructs and de-constructs sexuality at the same time.

A Study on the Aesthetic Thought and Expression Tendency of Contemporary Architecture from the Concept of the Uncanny (언캐니 개념으로 바라 본 현대건축의 미적사유와 표현경향 연구)

  • Park, Kyoung-Ah
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.1
    • /
    • pp.164-173
    • /
    • 2013
  • This study aims to analyze the aesthetic thought and expression tendency appeared in contemporary architecture by looking at today's architectural art based on the concept of the uncanny that Sigmund Freud contended as an aesthetic principle, of the aesthetic concepts tossed around to define the contemporary times in the aesthetics field and discuss the architectural analysis possibility of the concept of the uncanny. The generation structure of the uncanny that generates experiences of fear and surprise is classified into dual structure, trauma, threatening structure, and repetition compulsion. This is the principle that evokes a sense of experiencing subject, incorporates sensibility, and vitalizes internal process. This is also the methodology to organize and structure the concept of the uncanny. When seen from the four factors drawn from the concept of the uncanny and aesthetic expressions, the uncanny expression characteristics of contemporary architecture includes isolation, subversion, trace, absence, oblique line, flotation, concealment, and disturbance. Isolation and subversion refers to producing the space of the pressure of tension and relaxation caused by repression and relief from repression and eliciting the maximum expansion of the sense of space through spatial change. Trace and absence indicates being able to elicit more intense emotions from the experiencing subject by applying the images of alienation and absence in the way to reproduce historical trauma. This happens by implementing the potential value of physical activity. Oblique line and flotation means visual impulse. This happens in the way to visualize uneasy points. This causes uncanny by threatening the survival. Finally, concealment and disturbance refers to creating unpredictable space. The concept of masquerade and maze space composition are applied in the way to activate spatial perception, including space exploration and unintended subject's forced selection. As stated above, the uncanny expression characteristics shown in contemporary architecture can be presented as indicators that are available to analyze the undecided and diversified contemporary architecture aesthetically. In this respect, this study has great significance.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.