• Title/Summary/Keyword: cyber parties

Search Result 24, Processing Time 0.018 seconds

Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation (Yi등이 제안한 그룹 키 교환 프로토콜의 보안 취약성 및 개선 방법)

  • Lee, Young-Sook;Kim, Jee-Yeon;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.'s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.'s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.'s protocol and show how to solve it.

A Study on Seeking an Alternative Approach to the Remedy for Breach of the Duty of Disclosure in English Marine Insurance Law (영국 해상보험법에서 고지의무 위반에 대한 구제의 대안에 관한 연구)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.24
    • /
    • pp.25-49
    • /
    • 2004
  • English contract law has traditionally taken the view that it is not the duty of the parties to a contract to give information voluntarily to each other. In English law, one of the principal distinctions between insurance contract law and general contract law is the existence of the duty of disclosure in insurance law. This article is, therefore, designed to analyse the scope or extent of the duty of disclosure and the remedy for breach of the duty in English marine insurance law. The main purpose of this article is also to seek the alternative remedy for the breach. The results of analysis are as following : First, the scope of the duty of disclosure is closely related to the test of materiality and the concept of a hypothetical prudent insurer. The assured is required to disclose only material circumstances subject to MIA 1906, s. 18(1). The test of materiality, which had caused a great deal of debate in English courts over 30 years, was finally settled by the House of Lords in Pan Atlantic and the House of Lords rejected the 'decisive influence' test and the 'increased risk' test, and the decision of the House of Lords is thought to accept the 'mere influence' test in subsequent case by the Court of Appeal. Secondly, an actual insurer is, in order to avoid contract, required to provide proof that he is induced to enter into the contract by reason of the non-disclosure of the assured. But this subjective test of actual inducement is somewhat meaningless in sense that English court takes the test of materiality as a starting point and assumes the presumption of inducement even in case of no clear proof on the inducement. Finally, MIA 1906, s. 18 provides expressly for the remedy of avoidance of the contract for breach of the duty of disclosure. This means rescission or retrospective avoidance of the entire contract, and the remedy is based upon a fairly crude 'all-or-nothing' approach. The remedy of rescission is too draconian from the point of view of the assured, because he can be deprived of all cover despite he is innocent perfectly. An inadvertent breach from an innocent mistake is as fatal as wilful concealment. What is, therefore, needed in English marine insurance law with respect to remedy for the breach is to introduce a more sophisticated or proportionate remedy ascertaining degrees of fault.

  • PDF

The Effects of the Attractiveness of an Internet Shopping Mall and Flow on Affective Commitment

  • Kang, Sung-Ju;Kim, Jae-Yeong;Park, Young-Kyun
    • Journal of Distribution Science
    • /
    • v.9 no.4
    • /
    • pp.29-42
    • /
    • 2011
  • With the many advantages of the internet, online shopping has become one of the fastest growing types of retail businesses. However, internet-based firms are much more firmly required to retain existing customers rather than secure new ones, and to make them revisit the site by strengthening trust and loyalty, thereby improving profits and outrivaling competitors. Commitment is an essential part of successful long-term relationships between buyers and sellers. Although commitments by both parties in an exchange can provide the foundation for the development of relational social norms, disproportionate commitments can lead to opportunism by the less committed partner. Moreover, flow, which is characterized by intense concentration and enjoyment, was found to be significantly linked with exploratory use behavior, which in turn was linked to the extent of computer use. The level of flow was, itself, determined by the individual's sense of being in control, and the level of challenge perceived in maneuvering a website. Website attractiveness goes hand in hand with the attractiveness of an internet shopping mall, and it can be conceptualized as the persuasive effectiveness of a message by the use of familiarity, favor, similarity, etc. It occurs when information receivers try to achieve self-satisfaction when they actually or emotionally identify themselves with an information source. This study investigates the relationship between the perceived system characteristics of an internet shopping mall and the loyalty of online consumers, and it examines how perceived website attractiveness and flow play mediating roles between the perceived system characteristics of an internet shopping mall and the affective commitment in the context of a clothes internet shopping mall. For these purposes, a structural model comprising several variables was developed. That model was tested with an analysis of moment structure (AMOS) using data from respondents who had purchased clothing through the internet during the past three months. In this model, the perceived system characteristics of an internet shopping mall, such as familiarity, reputation, uniqueness, positive emotions, self-efficacy, and interactivity, were proposed to affect the website's attractiveness and flow, and lead to a higher affective commitment over time. Thus, the perceived website attractiveness and flow were proposed as core mediating variables between perceived system characteristics and affective commitment. The results of a reliability test using Cronbach's Alpha, and a confirmatory factor analysis warranted using unidimensionality for the measures for each construct. In addition, the nomological validity of the measures was warranted from the results of a correlation analysis. The results of empirical analyses indicated that systematic attributes resulting in website attractiveness and user's characteristics, thereby triggering customers' flow, play a crucial role in inducing customers' affective commitment, and a user's characteristics are twice as important as systematic attributes in this study. Moreover, familiarity, reputation, and uniqueness all have a significant effect on website attractiveness, and the research showed that uniqueness took the first place, and that familiarity and reputation followed in order of magnitude. The fact that reputation was not the most important factor that affects the attractiveness of an internet shopping mall, with uniqueness or familiarity having a greater impact, suggests much deeper implications. Finally, positive emotion, self-efficacy, and interactivity all have a significant effect on customers' flow. In particular, the fact that positive emotion, compared to self-efficacy or interactivity, has much more impact on flow is very suggestive.

  • PDF

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.