• 제목/요약/키워드: Technology and Education

Search Result 13,616, Processing Time 0.047 seconds

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.

An Efficient Anonymous Routing Protocol Without Using Onion Technique in MANET (Onion 기법을 사용하지 않는 효율적인 MANET 익명 라우팅 프로토콜)

  • Lee, Sung-Yun;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.71-82
    • /
    • 2009
  • There have been a lot of researches on providing privacy in MANET (Mobile Ad hoc NETwork) using trapdoor, onion, and anonymous authentication. Privacy protection in MANET can be divided into satisfying ID privacy, location privacy, route privacy, and unlinkability between sessions. Most of the previous works, however, were unsatisfactory with respect to location privacy or route privacy. Moreover, in previous schemes, cryptographic operation cost needed to meet the privacy requirements was relatively high. In this paper, we propose a new efficient anonymous routing protocol that satisfies all the privacy requirements and reduces operation costs. The proposed scheme does not use onion or anonymous authentication techniques in providing privacy. We also provide a more accurate analysis of our scheme's efficiency by considering all the nodes involved in the route establishment.

An Efficient Signature Batch Verification System for VANET (VANET를 위한 효율적인 서명 일괄 확인 시스템)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.17-31
    • /
    • 2010
  • In VANET (Vehicular Ad hoc NETwork), vehicles can efficiently verify a large number of signatures efficiently using batch verification techniques. However, batch verification performed independently in each vehicle raises many redundant verification cost. Although, an RSU (Road Side Unit) can perform the batch verification as a proxy to reduce this cost, it additionally requires an efficient method to identify invalid signatures when the batch verification fails. In this paper, we analyze several ways of constructing a distributed batch verification system, and propose an efficient distributed batch verification system in which participating vehicles perform batch verification in a distributive manner for a small size signature set. In our proposed system, each node can report the batch verification result or the identified invalid signatures list and the RSU who received these reports can identify the invalid signatures and efficiently exclude them.

Self Generable Conditionally Anonymous Authentication System for VANET (VANET를 위한 차량자체생성 조건부익명 인증시스템)

  • Kim, Sang-Jin;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.105-114
    • /
    • 2009
  • Messages exchanged among vehicles must be authenticated in order to provide collision avoidance and cooperative driving services in VANET. However, digitally signing the messages can violate the privacy of users. Therefore, we require authentication systems that can provide conditional anonymity. Recently, Zhang et al. proposed conditionally anonymous authentication system for VANET using tamper-resistant hardware. In their system, vehicles can generate identity-based public keys by themselves and use them to sign messages. Moreover, they use batch verification to effectively verify signed messages. In this paper, we provide amelioration to Zhang et al.'s system in the following respects. First, we use a more efficient probabilistic signature scheme. Second, unlike Zhang et al., we use a security proven batch verification scheme. We also provide effective solutions for key revocation and anonymity revocation problems.

Awareness of Dental Hygiene Department Students regarding the Protection of Patients' Personal Information (환자 개인정보보호에 대한 치위생 전공 학생의 인식도)

  • Cho, Myung-Sook;Lee, Seong-Sook
    • Journal of Korean Dental Hygiene Science
    • /
    • v.4 no.1
    • /
    • pp.89-98
    • /
    • 2021
  • Background: The purpose of the present study was to gather basic data necessary for developing an educational program regarding the protection of patients' personal information. Such a program would stress the importance of the protection of patients' personal information for dental hygiene students obtaining clinical practice. Methods: A self-reported questionnaire-based survey was conducted targeting dental hygiene undergraduates who were obtaining clinical practice in the capital region. A total of 543 questionnaires were included in the analysis. Results: The results of this study were as follows: 1) the average score for awareness of the Patient Privacy Act was 2.93 on a 4-point scale; 2) the average score for the recognition of the protection of patients' personal information was 3.22 on a 4-point scale; 3) the area-based perception of the protection of patient's personal information was 3.37 points for communication, which scored highest, followed-by the linked-work area at 3.27 points, the patient's information management at 3.22 points, and the direct dental hygiene work at 3.18 points; 4) with regard to awareness of the protection of patients' personal information according to general characteristics, the perception was higher in the advanced academic year (p < 0.01), in those who had education regarding the protection of patients' personal information at both the university and the clinical practice institution (p < .05), and in those with higher grades (p < 0.01). Conclusions: Based on the above findings, the development and application of an educational program to improve awareness of the protection of patients' personal information are considered to be necessary by both universities and clinical practice institutions.

Context-awareness User Analysis based on Clustering Algorithm (클러스터링 알고리즘기반의 상황인식 사용자 분석)

  • Lee, Kang-whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.942-948
    • /
    • 2020
  • In this paper, we propose a clustered algorithm that possible more efficient user distinction within clustering using context-aware attribute information. In typically, the data provided to classify interrelationships within cluster information in the process of clustering data will be as a degrade factor if new or newly processing information is treated as contaminated information in comparative information. In this paper, we have developed a clustering algorithm that can extract user's recognition information to solve this problem in using K-means algorithm. The proposed algorithm analyzes the user's clustering attributed parameters from user clusters using accumulated information and clustering according to their attributes. The results of the simulation with the proposed algorithm showed that the user management system was more adaptable in terms of classifying and maintaining multiple users in clusters.

Antioxidant and Anti-inflammatory activity of Colpomenia sinuosa extract (불레기말 추출물의 항산화 및 항염효과)

  • Cho, Young Jae;Kim, Sook-hee;Choi, Jae Young;Lee, Ja-bok
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.135-143
    • /
    • 2022
  • In this study, the antioxidant and anti-inflammatory properties of Colpomenia sinuosa extracts were identified. Antioxidant experiments included DPPH, ABTS, nitrite scavenging experiments, and FRAP, polyphenol concentration measurements, flavonoid concentration measurements. DPPH assay results showed an antioxidant function of 2.821 mg ascorbic acid/g extract. ABTS assay results showed an antioxidant function of 3.923 mg ascorbic acid/g extract. nitrite assay results showed an antioxidant function of 17.89 mg ascorbic acid/g extract. In FRAP, 1 mg of the Colpomenia sinuosa extract showed a reduction of 2.062±0.177 ㎍ of ascorbic acid. For polyphenols, 62.85±3.18 mg/g was shown. Flavonoids showed 10.01±0.24 mg/g. In the meantime, cell experiments showed cytotoxicity and anti-inflammatory functions. In cytotoxicity experiments, Colpomenia sinuosa extracts showed cytotoxicity of less than 20% and an inflammatory inhibition of 30.93±2.93% at a concentration of 100 ㎍/mL. These results indicate that Colpomenia sinuosa extract is available as functional cosmetic material.

A Study on the Effectiveness of University Employment Support Programs (대학 취업지원 프로그램의 실효성에 관한 연구)

  • Nam, Jae-Woo;Choi, Young-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.66-75
    • /
    • 2022
  • In this study, the effectiveness of the employment support program provided by the university employment support center was evaluated. To this end, the 17 employment support programs operated by K University were divided into six dimensions, including corporate linkage, counseling, certification, employment support, and special lectures. As a result, all employment support programs were found to have more than average usefulness. By dimension, the usefulness was counted in the order of certification, employment support, overseas, special lectures, counseling, and business-related programs. Among them, programs related to business connection, special lectures, and counseling were analyzed as factors that increased the overall usefulness of the employment support program. Therefore, when planning a new program for the employment support center, it would be a desirable direction to plan programs related to business connection, special lectures, and counseling first.

A Study on the Determinants of Pilot Competency to Improve Work Management in the Civilian Pilot Transition Course (민간 조종사 전환과정 중 업무안배 능력 향상을 위한 조종역량 요인 분석연구)

  • Jung, Jin-Yong
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.3
    • /
    • pp.136-143
    • /
    • 2022
  • The pilot's role is absolutely critical to the safety of an airline. It can be predicted that there is a difference in the acquisition of pilot competency required in actual flight at the initial flight training stage. In this study, the progress and effects of education and training for each background are analyzed, and differentiated competency-based training is to be studied. By sampling a sample of civil airline pilots, we are trying to determine whether there is a difference in the results of the regular proficiency check among the eight competencies defined by ICAO according to military and civil backgrounds. Accordingly, an independent t-test was conducted to test the average difference between the two groups, from the military and civilian origin, to confirm the average difference in the piloting competency between the groups. Based on these results, it will be helpful to design future training courses.

The Study on Health Care Consumer's Medical Information Serching Behavior according to Chronic Disease (의료소비자의 만성질환 유무에 따른 의료정보 탐색 행태에 관한 연구)

  • Jung, Tae-Young;Han, Jae-Hoon
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.212-218
    • /
    • 2022
  • This study aims to understand health care consumer's information searching behavior according to their presence of chronic diseases. For this purpose, 240 patients' data of university hospital located in Seoul were collected by surveys from 9 February to 11 February 2016. For statistical analysis, we used SPSS Ver. 26.0. The main results of this study are as follows: First, Chi-square test showed that chronic patients used expert information sources and experiential information sources more than those without chronic diseases. Second, chronic patients were found to search nutrition management, exercise management, and patient case. Lastly, in the case of hospital-related searches, patients with chronic diseases searched more waiting time and medical expenses than those without chronic diseases. The significance of this study is to provide basic data for efficient information provision and establishment of marketing strategies reflecting information needs of health care consumers.