• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.03 seconds

A Study on the Environment Characteristics and Continuous Usage Intention for Improvement of Fintech (핀테크 활성화를 위한 사용환경특성과 지속사용의도)

  • Jung, Dae-Hyun;Chang, Hwal-Sik;Park, Kwang-O
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.123-142
    • /
    • 2017
  • Purpose The development of the Fintech industry can be on the basis of the development in IT technologies such as Big data, IoT, cloud computing, it can be considered that the financial industry is repeating the evolution into Fintech. But the awareness of the consumers is still very low. Therefore the current dissertation, tries to deduce the suggestions for invigoration measures for Fintech by conducting an empirical study on the factors that influence the intention of reuse of Fintech on the consumer's point of view. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the Expectation Confirmation Theory. This paper empirically analyzes the impact of Continuous Usage Intention for Improvement of Fintech. The 302 survey responses were used to verify research hypotheses through covariate structural equation model. Findings According to the empirical analysis result, this study confirmed that the ultimate purpose of the Fintech service is to eliminate the social cost's waste element occurring from issue of money by not using or reducing the usage of cash. Since many Fintech users have pointed out security as the priority task, a direction for the related institutions has been proposed. Second, the content of the current dissertation will be the opportunity of broadening the perception of the current consumers that perceive Fintech as only a NFC simple payment service.

Design and Implementation of OTP Based Authentication Mechanism for Web Service (OTP 기반의 웹서비스 인증 메커니즘 설계 및 구현)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.2
    • /
    • pp.89-108
    • /
    • 2005
  • The SOAP specifications are not provided a functions of information security, especially authentication function. In case of user authentication, delivery of the username and password elements can be exposed to sniffing/replay attack by malicious attacker. In this paper, we propose a new mechanism to protect authentication attacks for the SOAP messages. The proposed mechanism is compensated for weakness of S/KEY system. Our mechanism has no limitation for time and overhead and also provide a more effective and secure delivery.

  • PDF

Development of Stream Cipher using the AES (AES를 이용한 스트림 암호 개발)

  • Kim, Sung-Gi;Kim, Gil-Ho;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.972-981
    • /
    • 2013
  • Future aspects of the has turned into a network centric warfare(NCW). Organically combined wired and wireless networks in a variety of cross-of-the-art combat power factor utilization of information and communication technology is a key element of NCW implementation. At used various information in the NCW must be the confidentiality and integrity excellent then quick situation assessment through reliability the real-time processing, which is the core of winning the war. In this paper, NCW is one of the key technologies of the implementation of 128-bit output stream cipher algorithm is proposed. AES-based stream cipher developed by applying modified OFB mode the confidentiality and integrity as well as hardware implementation to the security and real-time processing is superior.

A Study on the AHP based Evaluation Criteria for the Combinatorial Technology of Smart Water Grid (AHP를 활용한 SWG 조합기술 평가기준에 관한 연구)

  • Kim, Yun-Jung;Kwark, Dong-Geun;Kim, Won-Tae;Kim, Jeong-Joo;Shin, Heung-Sup;Kim, Yong-Sung;Kim, Sang-Seon;Kim, Chae-Soo
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.28 no.1
    • /
    • pp.103-110
    • /
    • 2014
  • In this study, the evaluation criteria of performance and applicability is developed to rank the combinatorial technologies for SWG (Smart Water Grid) system using AHP (Analytic Hierarchy Process) method. Security, safety, solution, suitability and sustainability which are goals of SWG technology, are used as upper level hierarchy elements. And three detailed elements for each upper level hierarchy are adopted as the lower level hierarchy. The weighted value which represents the importance of each element, could be determined through questionnaires accomplished by groups of specialists who are engaged in relevant waster industry and research area. To assess the accuracy of the evaluation criteria developed in this study, a simulation on four decision alternatives for smart water grid was carried out as an evaluation. Consequently which showed 90 % of accuracy.

CardioSentinal: A 24-hour Heart Care and Monitoring System

  • Gao, Min;Zhang, Qian;Ni, Lionel;Liu, Yunhuai;Tang, Xiaoxi
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.1
    • /
    • pp.67-78
    • /
    • 2012
  • People are willing to spend more for their health. Traditional medical services are hospital-centric and patients obtain their treatments mainly at the clinics or hospitals. As people age, more medical services are needed to exceed the potentials of this hospital-centric service model. In this paper, we present the design and implementation of CardioSentinal, a 24-hour heart care and monitoring system. CardioSentinal is designed for in-home and daily medical services. It mainly focuses on the outpatients and elderly. CardioSentinal is an interdisciplinary system that integrates recent advances in many fields such as bio-sensors, small-range wireless communications, pervasive computing, cellular networks and modern data centers. We conducted numerous clinic trials for CardioSentinal. Experimental results show that the sensitivity and accuracy are quite high. It is not as good as the professional measurements in hospital due to harsh environments but the system provides valuable information for heart diseases with low-cost and extreme convenience. Some early experiences and lessons in the work will also be reported.

Designed and Implementation of Layered Configuration Management for the Efficient Management of Intranet (효율적인 인트라넷 관리를 위한 계층적 구성 관리 시스템 설계 및 구현)

  • 라연경;김호철;서승호;문해은;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1228-1237
    • /
    • 2002
  • Network management is composed of five major functional areas, fault, configuration, account, performance and security management in the ITU standards. Configuration management identifies, exercises control over, collects data from network element node system and provides data to the management systems. The proposed architecture is designed based on the Distributed Processing Environment of CORBA(Common Object Request Broker Architecture) Spec v2.3. In this paper, configuration management system has been designed and implemented with layered managed object. It provides that integrated management of various data link layer technology. We suggest MIB(Management Information Base)/MIT(Management Information Tree) to support integrated management and distributed environment.

A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment (Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

Optical and Thermal Influence Analysis of High-power LED by MCPCB temperature (MCPCB의 온도에 따른 고출력 LED의 광학적, 열적 영향력 분석)

  • Lee, Seung-Min;Yang, Jong-Kyung;Jo, Ju-Ung;Lee, Jong-Chan;Park, Dae-Hee
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.12
    • /
    • pp.2276-2280
    • /
    • 2008
  • In this paper, we present thermal dependancy of LED package element by changing temperature of MCPCB for design high efficiency LED lamp, and confirmed influence of LED chip against temperature with analysis of thermal resistance and thermal capacitance. As increasing temperature, WPOs were decreased from 25 to 22.5 [%] and optical power were also decreased. that is decreased reason of optical power that forward voltage was declined by decrease of energy bandgap. Therefore optical power by temperature of MCPCB should consider to design lamp for street light and security light. Moreover, compensation from declined optical efficiency is demanded when LED package is composed. Also, thermal resistances from chip to metal PCB were decreased from 12.18 to 10.8[$^{\circ}C/W$] by changing temperature. Among the thermal resistances, the thermal resistance form chip to die attachment was decreased from 2.87 to 2.5[$^{\circ}C/W$] and was decreased 0.72[$^{\circ}C/W$] in Heat Slug by chaning temperature. Therefore, because of thermal resistance gap in chip and heat slug, reliability and endurance of high power LED affect by increasing non-radiative recombination in chip from heat.

The bubble problem of the plasma facing material: A finite element study

  • Kang, Xiaoyan;Cheng, Xiyue;Deng, Shuiquan
    • Nuclear Engineering and Technology
    • /
    • v.52 no.10
    • /
    • pp.2290-2298
    • /
    • 2020
  • The damage of first wall material in fusion reactor due to the bubbles caused by plasma has been studied by introducing a relation between the von Mises equivalent stress and the temperature field. The locations and shapes of the bubbles and the synergetic effect between the different bubbles under steady operational conditions have been studied using the finite elements method. Under transient heat loads, plastic deformations have been found to occur, and are significantly enhanced by the presence of the bubbles. The calculated concentration locations of von Mises equivalent stress are well consistent with the observed crack positions of the tungsten surface in many test experiments. Our simulations show that the damage of the bubbles is not severe enough to lead to catastrophic failure of the tungsten armor; however, it can cause local and gradual detachment of tungsten surface, which provides a reasonable explanation for the observed pits and rough or hairy surface morphology etc. Considering the transient heat loads, the lower bound of the security thickness of the tungsten tile is estimated to be greater than 2 mm.

Improvement of Okamoto-Uchiyama Probabilistic Public Key Cryptosystem (Okamoto-Uchiyama 확률 공개키 암호 방식의 효율성 개선)

  • Choi, Duk-Hwan;Kim, Hyun-Jue;Choi, Seung-Bok;Won, Dong-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.346-351
    • /
    • 2002
  • We improve a new probabilistic public key cryptosystem, in which the one wav function was defined only on the discrete logarithmic functions, proposed by Okamoto and Uchiyama. The plaintexts are calculated from the modular product of two these functions, one of which has a fixed value depending on a given public key. The improvement is achieved by a well-chosen public key assuming an unit element 1 as the fixed function value. Because it is possible to reduce the number of operations at the decryption. Also the concrete method for a public key of our improved scheme is suggested.