• Title/Summary/Keyword: Security design

검색결과 3,411건 처리시간 0.044초

Closest Vector Problem Based Interactive Proof (Closest Vector Problem에 기반한 Interactive Proof)

  • Lee, Kyunghee;Nyang, DaeHun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권6호
    • /
    • pp.1265-1270
    • /
    • 2012
  • In this paper, we propose a new closest vector problem based interactive proof that is useful for authentication. Contribution of this paper is that the proposed protocol does not use a special form of a lattice, but a general lattice, which makes the protocol design very simple and easy to be proved. We prove its security in terms of completeness, soundness, simulatability.

Saudi Universities Electronic Portals: A Case Study of Northern Border University

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.103-109
    • /
    • 2021
  • The study aimed to analyze the current situation of the electronic portal of the Northern Border University, in terms of content and components, the extent of quality of use, service assurance and integrity, linguistic coverage of objective content, in addition to assessing the efficiency of the Blackboard e-learning platform and measuring the degree of safety of the portal, in addition to measuring the extent of satisfaction, through a sample that included 135 faculty members, as the researcher was keen to apply the case study methodology with the use of the questionnaire as the main tool for measurement, and the study found that there is an average trend among faculty members in the degree of content for the components of the portal and electronic security While it rose to good use, and very good at using the Blackboard platform.

Review of Biometrics-Based Authentication Techniques in Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.321-327
    • /
    • 2021
  • Mobile devices have recently developed to be an integral part of humans' daily lives because they meet business and personal needs. It is challenging to design a feasible and effective user authentication method for mobile devices because security issues and data privacy threats have significantly increased. Biometric approaches are more effective than traditional authentication methods. Therefore, this paper aims to analyze the existing biometric user authentication methods on mobile platforms, particularly those that use face recognition, to demonstrate the methods' feasibility and challenges. Next, this paper evaluates the methods according to seven characteristics: universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention. Last, this paper suggests that solely using the method of biometric authentication is not enough to identify whether users are authentic based on biometric traits.

Architectural Design for Protecting Data in NAND Flash Memory using Encryption (암호화를 이용한 낸드 플래시 메모리에서의 데이터 보호를 위한 설계)

  • Ryu, Sikwang;Kim, Kangseok;Yeh, Hongjin
    • Annual Conference of KIPS
    • /
    • 한국정보처리학회 2011년도 추계학술발표대회
    • /
    • pp.914-916
    • /
    • 2011
  • 최근 낸드 플래시 메모리 기술의 발전으로 플래시 메모리의 용량이 증가함에 따라 다양한 장치에서 데이터 저장소로 사용되고 있으며, 하드디스크를 대체할 저장 매체로서 주목을 받고 있다. 하지만 낸드 플래시 메모리의 특성으로 인해 데이터를 삭제하더라도 일정 기간 삭제된 데이터가 메모리에 남아있게 되며, 이러한 특성으로 사용자의 중요 데이터가 보호되지 않은 상태로 저장되어 외부에 노출될 수 있다. 따라서 이런 특성을 보완하는 방법이 필요하며 본 논문에서는 낸드 플래시 메모리의 단점을 해결하기 위하여 낸드 플래시 메모리를 위한 시스템 소프트웨어인 FTL(Flash Translation Layer) 계층에서 암호화 알고리즘을 사용하여 데이터를 노출하지 않게 하는 방법을 제안한다.

Investigating the Impact of IT Security Investments on Competitor's Market Value: Evidence from Korea Stock Market

  • Young Jin Kwon;Sang-Yong Tom Lee
    • Asia pacific journal of information systems
    • /
    • 제30권2호
    • /
    • pp.328-352
    • /
    • 2020
  • If a firm announces an investment in IT security, how the market value of its competitors reacts to the announcement? We try to shed light on this question through an event study design. To test the relationship, we collected 143 announcements on cybersecurity investment and measured the subsequent impact on 533 competitors' abnormal returns, spanning from 2000 to 2019. Our estimation results present that, on average, the announcements have no observable impact on the market value of announcing firms and competitors as well, which is consistent with findings of a prior study. Interestingly, however, the impact becomes evident when we classify our samples by industries (Finance vs. non-Finance or ICT vs. non-ICT) and firm size (Big vs. Small). We interpret our empirical findings through the lenses of contagion effect and competition effect between announcing firms and their competitors. Key finding of our study is that, for financial service firms, the effect resulting from the announcement on cybersecurity investment transfers to competitors in the same direction (i.e., contagion effect).

Design of Fast Encryption/Decryption Mechanism for Query in DAS(Database As a Service) Model (DAS 모델에서 데이터베이스 검색에 적합한 고속 암복호화 메커니즘 설계)

  • Song, You-Jin;Lee, Dong-Hyeok;Lee, Seung-Min;Nam, Taek-Yong
    • Annual Conference of KIPS
    • /
    • 한국정보처리학회 2007년도 추계학술발표대회
    • /
    • pp.1250-1253
    • /
    • 2007
  • 데이터베이스를 아웃소싱하는 DAS 모델 환경에서 데이터베이스를 암호화하기 위해 암호화 알고리즘을 적용할 때, 암호화된 데이터의 순서는 평문과 달라, 인덱스를 구축할 수 없기 때문에 암호화된 데이터베이스에 대한 검색 처리상의 효율성 문제가 발생한다. 따라서, 아웃소싱된 데이터베이스 환경에 적합한 효율적인 암호화 메커니즘이 요구된다. 본 논문에서는 평문을 노출시키지 않은 상태에서 범위 검색이 가능한 새로운 고속 메커니즘을 제안하였다. 제안한 메커니즘은 복호화시 평문 데이터당 1 회의 XOR 연산과 버킷당 1 회의 암호화 연산만을 요구하므로 기 제안된 $Hacig{\ddot{u}}m{\ddot{u}}{\c{s}}$의 방식보다 효율적이다.

A study on the Highspeed Railway Route Selection -Focusing on 4 design tools- (수도권 고속철도 노선선정 연구 -설계4공구를 중심으로-)

  • Kim, Jong-Seok;Kim, Woo-Je
    • Proceedings of the KSR Conference
    • /
    • 한국철도학회 2011년도 춘계학술대회 논문집
    • /
    • pp.200-207
    • /
    • 2011
  • The research which sees accomplishes the capital region high-speed railway and examines investigates about process of railroad construction project and an advance service contents from to understand a progress process, change process and technical investigation of basic design and the execution plan at the time of route led and accomplishes the plan which is detailed the process which in the center researched. Also plan start method and application plan, clear the security of the plan air which is proper is necessary and dividing which design phase is, plan process construction etc. improvements sacrifice froze.

  • PDF

General and New Perspectives on Product Design in Finland

  • Silvonen, Timo
    • International Journal of Costume and Fashion
    • /
    • 제4권
    • /
    • pp.1-20
    • /
    • 2004
  • Finland, the small Nordic country, far from anywhere, just happens to be one of the most modern and technologically advanced nations in the world. It is also the home of several leading global brands in their fields. Among these belong for example Nokia, Kone Elevators, and Metso Paper. This strange, cold country with its by reputation reserved and introvert Arctic people, manages to operate smoothly in the global village; in business, technology and also world politics. People from all over the world want go to Finland to study and work, knowing a lot about the clean, green, spacious country with extensive social security, equal women and general well-being.

Novel Design of Ultrashort Pulse Excimer Laser Amplifier System II (Temporal Gain Control and Phase Distortion/ASE Characteristics)

  • Lee, Young-Woo
    • Journal of information and communication convergence engineering
    • /
    • 제1권4호
    • /
    • pp.228-232
    • /
    • 2003
  • The previous design work for very large final amplifier pumped by electron beam module was described from the point of view of energy characteristics. In this work, the design problems for phase front distortion, ASE, and gain control in large aperture amplifier are presented in detail.

A Design of Remote and Wireless Control System using Bluetooth

  • Park Joon-Hoon;Kim Yong-Kwan
    • Journal of information and communication convergence engineering
    • /
    • 제4권1호
    • /
    • pp.13-17
    • /
    • 2006
  • In this paper a design and implementation method of remote control system for automobile is presented. For this, we used the Bluetooth technology for remote and wireless communications and microcontroller for system control. By using these techniques, we can design and implement automobile remote control system to improve data error rate, security and application.