• 제목/요약/키워드: Private key

검색결과 694건 처리시간 0.026초

The Mobile Terminal System Implementation of Medical Imaging based on Motion-JPEG

  • Kim, Jae-Joon;Jung, Dae-Wha
    • 한국멀티미디어학회논문지
    • /
    • 제12권12호
    • /
    • pp.1701-1709
    • /
    • 2009
  • The mobile terminal system plays a key role in medical industries which require in fast and accurate diagnosis from heterogeneous acquisition equipment. The demand for PACS (picture archiving and communication systems) has continued to increase in major hospitals and private clinics. Patient care depends on how fast the medical imaging system provides images and how accurately the images are interpreted by physicians. In this paper, we propose an efficient method to decipher the hundreds of images required by physicians to accurately diagnose patients. By exploring Motion- JPEG (M-JPEG), this paper has demonstrates the possibilities for efficient management of medical images with a newly designed image file format and improvement in imaging diagnoses through the replaying of moving pictures of a patient in a mobile environment.

  • PDF

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments

  • Han, Seungjin
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권1호
    • /
    • pp.111-116
    • /
    • 2018
  • Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.

How Does Family Succession Impact Family Firms' Innovation?

  • Ballal, Juili Milind;Bapat, Varadraj
    • Asian Journal of Innovation and Policy
    • /
    • 제8권2호
    • /
    • pp.302-324
    • /
    • 2019
  • Family business is the oldest and the most prevalent type of entity in the world. In India, 85% of the enterprises are owned and/or managed by families, contributing to two-third of GDP. Thus the survival of family firms, which also generates 79% of private sector employment, is of paramount importance. Effective succession planning and innovation to gain competitive edge are the two key ways to ensure family firm survival. In this paper, the interplay between family succession and innovation is qualitatively studied using case study approach. Successors and Predecessors are interviewed to gain insights in the areas of succession planning and innovation. It is observed that family succession has a positive relationship with innovation, i.e. the presence of founding family members in the ownership and/or management of the enterprise has a positive influence on innovation tendency of the family firms. The findings contribute to the family business literature on succession planning and innovation, and their inter-relationship.

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

A Study of Video-Based Abnormal Behavior Recognition Model Using Deep Learning

  • Lee, Jiyoo;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • 제9권4호
    • /
    • pp.115-119
    • /
    • 2020
  • Recently, CCTV installations are rapidly increasing in the public and private sectors to prevent various crimes. In accordance with the increasing number of CCTVs, video-based abnormal behavior detection in control systems is one of the key technologies for safety. This is because it is difficult for the surveillance personnel who control multiple CCTVs to manually monitor all abnormal behaviors in the video. In order to solve this problem, research to recognize abnormal behavior using deep learning is being actively conducted. In this paper, we propose a model for detecting abnormal behavior based on the deep learning model that is currently widely used. Based on the abnormal behavior video data provided by AI Hub, we performed a comparative experiment to detect anomalous behavior through violence learning and fainting in videos using 2D CNN-LSTM, 3D CNN, and I3D models. We hope that the experimental results of this abnormal behavior learning model will be helpful in developing intelligent CCTV.

Nakazato-Wang-Yamamura '07의 프라이버시가 강화된 크레덴셜 시스템에 대한 크레덴셜 위조 공격 (Credential Forging Attack against Privacy Enhancing Credential System in Nakazato-Wang-Yamamura '07)

  • 양대헌;이경희
    • 정보보호학회논문지
    • /
    • 제18권5호
    • /
    • pp.195-199
    • /
    • 2008
  • 이 논문에서는 ASIAN 2007에서 Nakazato, Wang, Yamamura 등이 발표한 프라이버시가 강화된 크레덴셜 시스템에서 크레덴셜 발급자인 서버의 도움 없이도 사용자와 검증자가 공모하는 경우에 크레덴셜을 위조할 수 있음을 보인다. 이 공격은 크레덴셜의 생성과정에서 사용하는 서버의 비밀키를 겹선형 사상의 성질을 이용해서 우회하는 방법을 이용한다. 또한, 이 공격방법의 이론적인 영향과 실질적인 영향을 고찰해 본다.

80비트 블록 암호알고리즘(80-DES)의 설계 및 비도분석에 관한 연구 (A Study on the Design and Cryptanalysis of 80-bit Block Cipher Algorithm(80-DES))

  • 윤용정;공헌택;남길현
    • 정보보호학회논문지
    • /
    • 제5권1호
    • /
    • pp.25-36
    • /
    • 1995
  • Differential Cryptanalysis(DC) 및 선형암호분석 공격방법은 DES와 같은 비밀키 암호시스템을 실질적으로 공격할 수 있는 효과적인 방법들이다. 본 논문에서는 DC 및 선형암호분석을 통한 DES의 취약점을 분석하고 이를 보완할 수 있는 효과적인 80비트 블록 암호시스템을 설계하였다. 설계된 암호알고리즘은 DES보다 일반 특성과 DC 및 선형암호분석 공격에 대한 비도를 향상시킨 것으로 분석되었다.

Start-Up Visa: Rethinking Entrepreneurship and Human Capital in Immigration Policy

  • Istad, Felicia
    • Asian Journal of Innovation and Policy
    • /
    • 제11권1호
    • /
    • pp.30-49
    • /
    • 2022
  • As industrialized countries transition into knowledge economies, there is a rising demand for talent and innovation. Support for start-ups through incubation, acceleration, and venture capital has turned into a key area of investment, with public and private actors searching for the next unicorn. This article examines start-up visas as an emerging policy tool in the global competition for highly innovative entrepreneurs. The study builds on a sample of eight national start-up immigration programs and applies human-capital citizenship (Ellermann, 2020) as a guiding framework. The article first proposes a conceptualization of start-up visas, suggesting that innovation and entrepreneurship also be considered in the theorization of skills. Second, the study examines the implications of start-up visas for international mobility. By focusing on the logic of entry requirements and subsequent benefits accrued through the status as a start-up founder, the findings of this study highlight the role of start-up visas in expanding privileged pathways to cross-border mobility. The article concludes with a discussion of implications for policy and research concerned with the international mobility of start-ups

First Smart Contract Allowing Cryptoasset Recovery

  • Kim, Beomjoong;Kim, Hyoung Joong;Lee, Junghee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권3호
    • /
    • pp.861-876
    • /
    • 2022
  • Cryptoassets such as Bitcoin and Ethereum are widely traded around the world. Cryptocurrencies are also transferred between investors. Cryptocurrency has become a new and attractive means of remittance. Thus, blockchain-based smart contracts also attract attention when central banks design digital currencies. However, it has been discovered that a significant amount of cryptoassets on blockchain are lost or stranded for a variety of reasons, including the loss of the private key or the owner's death. To address this issue, we propose a method for recoverable transactions that would replace the traditional transaction by allowing cryptoassets to be sent to a backup account address after a deadline has passed. We provide the computational workload required for our method by analyzing the prototype. The method proposed in this paper can be considered as a good model for digital currency design, including central bank digital currency (CBDC).

ID기반 그룹서명에서의 안전한 개인 서명키 생성기법에 관한 연구 (A Study on Creating a Secure Private Signature Key in ID-based Group Signature)

  • 김수현;이임영
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.1275-1278
    • /
    • 2010
  • 1984년 A.Shamir에 의해 처음 소개된 ID 기반 공개키 암호시스템은 ID나 메일, 주소, 소속 등 유일하게 특정할 수 있는 것을 사용자의 공개키로 사용함으로써 송신자의 공개키에 대한 정당성 확인 과정을 필요 없게 하는 방식으로 전자서명에 적용되어 다양한 방식으로 제안되었다. 하지만 ID 기반 그룹 서명에서는 그룹 관리자만이 사용자의 서명키를 생성하기 때문에 그룹 내 사용자로 위장이 가능한 문제점을 가지고 있다. 본 논문에서는 ID기반 서명에서의 문제점인 키 위탁 문제를 해결할 수 있고, 그룹 관리자만이 부담하고 있는 그룹 구성원들의 개인 서명키 생성 및 사용자 식별 연산을 소그룹 관리자를 이용하여 연산량을 분산시킬 수 있는 그룹 서명 방식을 제안한다.