• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.031 seconds

Receipt-free Sealed-bid Auction Scheme Using Cryptographic Techniques

  • Her, Yong-Sork
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.247-250
    • /
    • 2005
  • Recently, a concept of bid-rigging is issued in electronic auction. To prevent this attack, Abe-Suzuki proposed firstly receipt-free scheme based on bidding-booth. Chen-Lee-Kim pointed out that Abe-Suzuki's scheme only provides receipt-freeness for losing bidders. Also, they introduced a new receipt-free sealed bid auction scheme using the homomorphic encryption technique. The main participants of their scheme are Auctioneer, Auction Issuer, Bidder and Seller. Bid-rigging can happen by a seller in their scheme. We propose receipt-free sealed-bid auction scheme using a universal re-encryption mixnet. For our receipt-free sealed-bid auction, we use Pseudo ID of a bidder and universal re-encryption technique of Golle et al. Also, our scheme satisfies privacy, correctness, public verifiability, non-reputation, and receipt-freeness.

  • PDF

Policing Domestic Violence: Learning from the British Experience

  • Button, Mark;Lee, Julak
    • International Journal of Contents
    • /
    • v.10 no.1
    • /
    • pp.12-17
    • /
    • 2014
  • This paper will explore the problem of domestic violence in the UK. It will begin by defining the problem and then set out estimates of the extent of the problem, while also examining the problems that are involved in measurement. It will then examine the policing strategies that have been put in place to tackle this problem, such as intelligence gathering, effective investigations, and risk management techniques. The paper will also highlight the importance of multi-agency involvement when dealing with domestic violence and the wide range of orders that have been created in order to help deal with this problem.

Synchronization of Chaotic Secure Communication Systems with Interval Time-varying Delays (구간 시변 지연이 존재하는 카오스 보안 통신시스템의 동기화)

  • Kwon, Oh-Min;Park, Ju-Hyun;Lee, Sang-Moon;Park, Myeong-Jin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.6
    • /
    • pp.1215-1222
    • /
    • 2009
  • In this paper, a method of designing a controller which ensures the synchronization between the transmission and the reception ends of chaotic secure communication systems with interval time-varying delays is proposed. To increase communication security, the transmitted message is encrypted with the techniques of N-shift cipher and public key. And to reduce the conservatism of the stabilization criterion for error dynamic system obtained from the transmitter and receiver, a new Lyapunov-functional and bounding technique are proposed. Through a numerical example, the effectiveness of the proposed method is shown in the chaotic secure communication system.

Enzyme Based Biosensors for Detection of Environmental Pollutants-A Review

  • Nigam, Vinod Kumar;Shukla, Pratyoosh
    • Journal of Microbiology and Biotechnology
    • /
    • v.25 no.11
    • /
    • pp.1773-1781
    • /
    • 2015
  • Environmental security is one of the major concerns for the safety of living organisms from a number of harmful pollutants in the atmosphere. Different initiatives, legislative actions, as well as scientific and social concerns have been discussed and adopted to control and regulate the threats of environmental pollution, but it still remains a worldwide challenge. Therefore, there is a need for developing certain sensitive, rapid, and selective techniques that can detect and screen the pollutants for effective bioremediation processes. In this perspective, isolated enzymes or biological systems producing enzymes, as whole cells or in immobilized state, can be used as a source for detection, quantification, and degradation or transformation of pollutants to non-polluting compounds to restore the ecological balance. Biosensors are ideal for the detection and measurement of environmental pollution in a reliable, specific, and sensitive way. In this review, the current status of different types of microbial biosensors and mechanisms of detection of various environmental toxicants are discussed.

The Implementing a Color, Edge, Optical Flow based on Mixed Algorithm for Shot Boundary Improvement (샷 경계검출 개선을 위한 칼라, 엣지, 옵티컬플로우 기반의 혼합형 알고리즘 구현)

  • Park, Seo Rin;Lim, Yang Mi
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.829-836
    • /
    • 2018
  • This study attempts to detect a shot boundary in films(or dramas) based on the length of a sequence. As films or dramas use scene change effects a lot, the issues regarding the effects are more diverse than those used in surveillance cameras, sports videos, medical care and security. Visual techniques used in films are focused on the human sense of aesthetic therefore, it is difficult to solve the errors in shot boundary detection with the method employed in surveillance cameras. In order to define the errors arisen from the scene change effects between the images and resolve those issues, the mixed algorithm based upon color histogram, edge histogram, and optical flow was implemented. The shot boundary data from this study will be used when analysing the configuration of meaningful shots in sequences in the future.

Gene Algorithm of Crowd System of Data Mining

  • Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.1
    • /
    • pp.40-44
    • /
    • 2012
  • Data mining, which is attracting public attention, is a process of drawing out knowledge from a large mass of data. The key technique in data mining is the ability to maximize the similarity in a group and minimize the similarity between groups. Since grouping in data mining deals with a large mass of data, it lessens the amount of time spent with the source data, and grouping techniques that shrink the quantity of the data form to which the algorithm is subjected are actively used. The current grouping algorithm is highly sensitive to static and reacts to local minima. The number of groups has to be stated depending on the initialization value. In this paper we propose a gene algorithm that automatically decides on the number of grouping algorithms. We will try to find the optimal group of the fittest function, and finally apply it to a data mining problem that deals with a large mass of data.

Korea's Participation in the Rim of the Pacific and It's Future Development (한국의 환태평양연합훈련 참여와 발전방향)

  • Kim Hyeon-Gi
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.1
    • /
    • pp.25-42
    • /
    • 1991
  • Participation of ROK navy in the Rim of the Pacific(RIMPAC) in likely to stimulate rethinking of Korea's defense role in Northeast Asia. Although the RIMPAC exercise was originally maneuvers to improve combat techniques in ASW, anti-aircraft combat. ocean supply support. surface combat. and electronics warfare. it will be finally be directed to ward securing the SLOC connecting the US, Canada. Australia and the Far East. Based on this concept, my conclusion is that two future arrangements are possible for the security of the Korean peninsula and protecting the SLOC in the combined defense of the Pacific. One is the naval cooperation between ROK and Japan. the other is the Standing Naval Force Pacific(STANAVFORPAC) The concepts of the Naval Cooperation between ROK and Japan and the STANAVFORPAC is whose time has come. The leaders, policymakers, and planners of the countries concerned need to consider such a move seriously.

  • PDF

Diagnosis of Power Transformer Using Modified Self Organizing Map (변형된 SOM을 이용한 유입변압기 열화진단)

  • Lee Jong Pil;Ji Pyeong Shik;Lim Jae Yoon;Kim Sung Soo
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.578-580
    • /
    • 2004
  • Substation facilities have become large and complex in the electric power systems. Development of condition monitoring and diagnosis techniques have been very important to improve the security of substation transformers. This paper presents a method to analyze the cause and the degree of aging of power transformers by Self organizing map(SOM). Dissolved gas data were non-linearly transformed by sigmoid function to make determination of SOM close to that of human. Potential of a failure and the degree of aging of a normal transformer are identified by using the proposed quantitative criterion. Furthermore, transformer aging is monitored by the proposed criterion for a set of transformers. To demonstrate the validity of the proposed method, a case study is performed and its results are presented.

  • PDF

A Study on Securing the Funds Liquidity of Construction Phase (건설공사단계의 자금 유동성 확보 방안에 관한 연구)

  • Je, Yeong-Deuk;Lee, Sang-Beom;Song, Ho-San
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2011.11a
    • /
    • pp.69-70
    • /
    • 2011
  • During the financial crisis in the late 1990s, we witnessed the large corporations failing at one moment. It is clear that the debt-dependant size augmentation and duplicate investment, and the failure in fund liquidity adjustment were the greatest causes rather than the long-term strategic advantage. Such fact, however, has led to the introduction of advanced financial techniques and security/management of fund liquidity. In order to propose a method to secure fund liquidity at the construction level, this study considers the documentational/precedent studies on project financing among fund procurement methods. And the fund liquidity status at construction level is investigated domestically/internationally to analyze the fund flow. Finally, the actual data is used to analyze progress rate and sales rate to end with the proposal of the method to secure fund liquidity in the progression of this study.

  • PDF

Feature Analysis and Detection Techniques for Piracy Sites

  • Choi, Seul-Ki;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2204-2220
    • /
    • 2020
  • In recent years, digital content has become easily accessible because of internet technology. Representative examples of such digital content include various types, such as music, TV, (program, sport, drama etc.) and films. However, there are cases where internet technology is used in illegal ways without the authorization of the copyright holder for digital content. Such actions have a direct impact on copyright owners' profits and further affect the development of the digital culture industry adversely. Therefore, in this study, we analyze features to detect piracy sites that cause copyright infringement. Further, we develop a piracy site detection crawler based on these features and present the analysis of its performance.