• Title/Summary/Keyword: Security Mechanisms

Search Result 398, Processing Time 0.027 seconds

A New Offline Check System with Spendable Refunds (남은 금액을 재사용할 수 있는 오프라인 전자수표시스템)

  • 김상진;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.27-40
    • /
    • 2001
  • In an offline system, the bank does not participate in payments. As a result, it is difficult to make the refund spendable. Due to this, current offline systems do not provide spendable refunds. In these systems, a check consists of two parts: a spendable part and a refund part. A client uses the spendable part during the payment phase, and uses the refund part to get the refund for the remainder of the check. Therefore, a client cannot reuse the remaining and must always refund it. Moreover, the relationship between the spent amount and the refund amount can be used to guess which check the client used when the client refunds the remaining. To remedy these problems, we propose a new offline system which allow clients to reuse the remaining values of the check. This system provides unlinkability of the payments made by using a single check. It also provides mechanisms to detect and identify clients who perform misconduct such as double spending and over spending. The required overall computational cost to withdraw, spend and refund a check in our system is lower than using several checks in other offline systems.

An IP Traceback "M"echanism with "E"nhanced "I"ntegrity for IPv6-based NGN Environment (IPv6 기반 NGN 환경에서 무결성을 제공하는 역추적 기법)

  • Jang, Jae-Hoon;Yeo, Don-Gu;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.31-41
    • /
    • 2010
  • It is difficult to identify attacker's real location when the attacker spoofs IP address in current IPv4-based Internet environment. If the attacks such as DDoS happen in the Internet, we can hardly expect the protection scheme to respond to these attacks in active or real-time manner. Many traceback techniques have been proposed to protect against these attacks, but most traceback schemes were designed to work with the IPv4-based Internet and found to be lack of verification of whether the traceback related information is forged or not. Few traceback schemes for IPv6-based network environment have been suggested, but it has these disadvantages that needs more study. In this paper, we propose the reliable IP traceback scheme supporting integrity of traceback-related information in IPv6 network environment, simulate it, and compare our proposed scheme with exsisting traceback mechanisms in terms of overhead and functionality.

The modernization approach to the regional processes monitoring of the social services provision in the context of the modern public policy

  • Koval, Kristina;Hrechko, Alla;Butko, Mykola;Shevchenko, Oleg;Smyrnov, Ivan;Olyfirenko, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.213-221
    • /
    • 2021
  • The modernization approach to monitoring regional processes of providing social services is proposed. The methodological approach is developed in the context of the modern public policy, which includes the following stages: the formation of a system of indicators that characterize the level of the social services modernization; the determination of the levels of regions development by such components as the modernization level of the economic sphere, the modernization level of the demographic component and the modernization level of employment; the determination of weights for each group of indicators and calculation of integrated indicators, ranking of regions; the allocation of criteria for classification and grouping of regions according to the modernization level of the social services sphere; highlighting the most important problems of each region. The proposed method is tested on the example of the Ukraine's regions. According to the results of calculations of the modernization level of the processes of providing social services, the ranking and grouping of the regions was carried out. The rating allowed to distinguish four groups of regions: regions with a high modernization level of social services, regions with above-average levels, as well as regions with medium and low levels. The author's modernization approach to monitoring the processes of providing social services allows to investigate the real state of the main indicators influencing these processes and to identify problem regions in order to develop mechanisms to stimulate their development.

Informatization of Early Childhood Education: the EU Experience

  • Puyo, Olga;Yemchyk, Oleksandra;Klevaka, Lesya;Voloshyn, Svitlana;Dulibskyy, Andriy
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.696-702
    • /
    • 2021
  • Informatization of early childhood education in the EU occurs in the context of the use of ICT as a means of sharing experiences, practices in the education and training of preschool children, communication, both at the national level and locally - within educational institutions, as a means of document management, search, data processing and information for the management of early childhood educational institutions, and planning activities for these institutions. This article aims to identify the features of the informatization of early childhood education in EU countries. Results. The countries of the EU have different levels of workload on the staff of early childhood education institutions, which is caused by different numbers of preschoolers and workforce. The greatest load on the staff in France due to a large number of preschoolers, which, despite the reduction, remained the highest among all the countries. By comparison, Poland's significant workload is mitigated by the size of its workforce. With almost equal numbers of staff in Poland and Germany, the countries differ significantly in the number of preschoolers. The countries also have different funding mechanisms for early childhood education, which determines the potential for digitalization. In France, total spending on early childhood education has grown the least (by 11 % between 2012 and 2018), in Poland by 51 %, in the Czech Republic by 44 %, and in Germany by 49%. In France, 100 % is funded by the government, in Poland 78 % is funded by the government, in the Czech Republic and Germany 87 % and 85 % respectively is funded by the government. The results of the survey of teachers' training in the use of ICTs and the level of specialists' readiness to use them in their studies indicate a mismatch between education and the practice of using technology. At the same time, given the high level of professional training of teachers in the use of technology in education, a low level of practice of ICT use in teaching preschool children was revealed. Teachers require professional development of ICT skills.

Guarantees of Applying Disclosure and Transparency on the Companies Listed in the Saudi Capital Market

  • Moanes, Hani Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.274-284
    • /
    • 2022
  • By explaining the essence of corporate governance as well as disclosure and transparency, the study examined the guarantees of applying disclosure and transparency to firms listed on the Saudi stock exchange. The research also addressed the disclosure and transparency duties of firms listed on the Saudi stock exchange. Finance to prepare a prospectus, as the Capital Market Authority's regulations required that the prospectus includes information that enables the investor in securities to make his investment decision based on real foundations based on the issuing company's financial position and to ensure that companies fulfill that disclosure in the prospectus. Firms who fail to disclose are required by law to do so, and the Capital Market Authority's laws mandate companies listed on the financial market to regularly report fundamental events linked to the issuer or the securities issued by it. The Capital Market Authority must make it available to the public dealing with the business issuing the securities, and The Capital Market Authority's Law and Regulations have imposed fines on corporations that do not comply with disclosure and make the Board of Director's report available. The research focused on activities that the legislator deemed to be a breach of the obligation of openness, such as the danger of many measures aimed at ensuring the impartiality and transparency of trading in the Saudi financial market, as well as the absence of conflicts of interest. The research also addressed the sanctions imposed on The source for failing to meet the obligation of disclosure and openness, as well as the mechanisms of compensating persons harmed by the failure to meet that responsibility.

Prospects For The Development Of Distance Educational Learning Technologies During The Training Of Students Of Higher Education

  • Rohach, Oksana;Pryhalinska, Tetiana;Kvasnytsya, Iryna;Pohorielov, Mykhailo;Rudnichenko, Mykola;Lastochkina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.353-357
    • /
    • 2022
  • This article identifies the problems and substantiates the directions for the development of distance learning technologies in the training of personnel. An example of using digital media to create a remote access laboratory is given. The article is devoted to the definition of the main aspects of the organization of distance education. Rapid digitization, economic, political and social changes taking place in Ukraine necessitate the reform of the education system. First of all, it concerns meeting the educational needs of citizens throughout their lives, providing access to educational and professional training for all who have the necessary abilities and adequate training. The most effective solution to the above-mentioned problems is facilitated by distance learning. The article analyzes the essence and methods of distance learning organization, reveals the features of the use of electronic platforms for the organization of this form of education in different countries of the world. The positive characteristics of distance learning are identified, namely: extraterritoriality; savings on transport costs; the interest of modern youth in the use of information tools in everyday life; increase in the number of students; simplicity and accessibility of training; convenient consultation system; democratic relations between the student and the teacher; convenience for organizations in training their employees without interrupting their regular work; low level of payment for distance education compared to traditional education; individual learning pace; new teacher status. Among the negative features of online education, the author refers to the following problems: authentication of users during knowledge verification, calculation of the teacher's methodological load and copyright of educational materials; the high labor intensity of developing high-quality educational content and the high cost of distance learning equipment; the need to provide users with a personal computer and access to the Internet; the need to find and use effective motivation mechanisms for education seekers.

Innovative Approaches to Training Specialists in Higher Education Institutions in the Conditions of Distance Learning

  • Oksana, Vytrykhovska;Alina, Dmytrenko;Olena, Terenko;Iryna, Zabiiaka;Mykhailo, Stepanov;Tetyana, Koycheva;Oleksandr, Priadko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.116-124
    • /
    • 2022
  • Information and communication technologies used in the social sphere are born due to the development of computer technologies. The main task of the distance learning process in higher education institutions is not to provide information, but to teach how to obtain and use it. The purpose of the article: to identify innovative approaches in the training of specialists in higher education institutions in the context of distance learning. Various innovative approaches to organizing the work of students of higher educational institutions in the context of distance learning are considered. Based on the conducted research, it is concluded that each of the approaches described by us outlines the study of the phenomenon of professional training of a specialist in the condition of distance learning. All the described approaches significantly contribute to the improvement of professional training of specialists, encourage students to self-improvement, professional development and enrich their professional competence in modern conditions. The emergence and spread of innovative technologies means not only a change in the activity itself and its inherent means and mechanisms of its implementation, but also a significant restructuring of goals, value orientations, specific knowledge, skills and abilities. Therefore, the current stage of the development of civilization, scientific and technological progress requires the emergence of such specialists who would have broad humanitarian thinking, would have good psychological training, would be able to build professional activities according to laws that take into account the relationship between economic productivity and creativity, as well as the desire of the individual for constant renewal, self-realization. Only such qualities will help you master the specifics of innovative technologies well. We see the prospects in the study of innovative approaches to training specialists in higher education institutions in the condition of distance learning in foreign countries.

e-Cryptex: Anti-Tampering Technology using Physically Unclonable Functions (e-Cryptex: 물리적으로 복제 불가능한 기능을 활용한 역공학 방지 기법)

  • Jione Choi;Seonyong Park;Junghee Lee;Hyung Gyu Lee;Gyuho Lee;Woo Hyun Jang;Junho Choi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.3
    • /
    • pp.23-40
    • /
    • 2024
  • Hardware attacks involve physical reverse engineering efforts to steal sensitive information, such as encryption keys and circuit designs. Encryption and obfuscation are representative countermeasures, but they are nullified if adversaries manage to find the key. To address this issue, we propose e-Cryptex, which utilizes a Physically Unclonable Function (PUF) as an anti-tampering shield. PUF acts as a random number generator and relies on unique physical variants that cannot be replicated or restored to enhance anti-tampering mechanisms. e-Cryptex uses PUF as a shield to protect the system's structure and generate the key. Tampering with the shield will result in the destruction of the key. This paper demonstrates that e-Cryptex meets PUF security requirements and is effective in detecting of tampering attempts that pierce or completely destroy the shield. Each board consistently generates the same key under normal conditions, while also showing key uniqueness across different boards.

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

Comparison on Patterns of Conflicts in the South China Sea and the East China Sea through Analysis on Mechanism of Chinese Gray Zone Strategy (중국의 회색지대전략 메커니즘 분석을 통한 남중국해 및 동중국해 분쟁 양상 비교: 시계열 데이터에 근거한 경험적 연구를 중심으로)

  • Cho, Yongsu
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.273-310
    • /
    • 2020
  • This study aims at empirically analyzing the overall mechanism of the "Gray Zone Strategy", which has begun to be used as one of Chinese major maritime security strategies in maritime conflicts surrounding the South China Sea and East China Sea since early 2010, and comparing the resulting conflict patterns in those reg ions. To this end, I made the following two hypotheses about Chinese gray zone strategy. The hypotheses that I have argued in this study are the first, "The marine gray zone strategy used by China shows different structures of implementation in the South China Sea and the East China Sea, which are major conflict areas.", the second, "Therefore, the patterns of disputes in the South China Sea and the East China Sea also show a difference." In order to examine this, I will classify Chinese gray zone strategy mechanisms multi-dimensionally in large order, 1) conflict trends and frequency of strategy execution, 2) types and strengths of strategy, 3) actors of strategy execution, and 4) response methods of counterparts. So, I tried to collect data related to this based on quantitative modeling to test these. After that, about 10 years of data pertaining to this topic were processed, and a research model was designed with a new categorization and operational definition of gray zone strategies. Based on this, I was able to successfully test all the hypotheses by successfully comparing the comprehensive mechanisms of the gray zone strategy used by China and the conflict patterns between the South China Sea and the East China Sea. In the conclusion, the verified results were rementioned with emphasizing the need to overcome the security vulnerabilities in East Asia that could be caused by China's marine gray zone strategy. This study, which has never been attempted so far, is of great significance in that it clarified the intrinsic structure in which China's gray zone strategy was implemented using empirical case studies, and the correlation between this and maritime conflict patterns was investigated.

  • PDF