• Title/Summary/Keyword: public verification

Search Result 421, Processing Time 0.024 seconds

The Application Technology of Korean-style R&D in Verification for deploying the Neo-Korean Style Public Building - Focused on the R&D Technologies in Changed Drawings of Neo-Korean Style Public Daycare Center in Sunchang-gun, Korea -

  • Kim, Young-Hoon;Peck, Yoo-Jung;Park, Joon-Young
    • KIEAE Journal
    • /
    • v.15 no.5
    • /
    • pp.35-46
    • /
    • 2015
  • Purpose: This study is to research how New-Hanok R&D technologies of first stage are appearing and adapted to the New-Hanok style public buildings, especially in Daycare Center in Sunchang-gun, Korea. Unlike Hanok houses, public buildings which has special needs for the public and restricted by laws and regulations need not only new system of law incentives but also new components of New-Hnaok R&D technologies used only in Hanok house. Method: For this purpose, we checked the drawings for Daycare Center in Sunchang-gun. The drawings have been changed 6 times for the purpose of adopting New-Hanok R&D technologies of first stage and actual needs for current laws and regulations for public buildings and it reveals not only the possibilities for adapting new technologies in New-Hanok but also meetings the current and public needs for public buildings. Result: The result of this study as follows. Approximately 40-50 percent of New-Hanok R&D technologies in the first stage are adapted in Daycare Center in Sunchang-gun, and this means there are limitations in adapting New-Hanok R&D which are mainly for the Korean style houses. The main reasons are the costs still remaining high and lacking in confidence for using traditional structures and materials still under verification. Some are changed and proposed in another solutions suitable for public buildings as like truss structure system in roof.

A Public Opinion Polling Application with Robust Verification Based on the Ethereum Bolckchain (견고한 검증을 제공하는 이더리움 블록체인 기반의 여론조사 어플리케이션)

  • Jin, Jae-Hwan;Eom, Hyun-Min;Sun, Ju-Eun;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.895-905
    • /
    • 2018
  • Public opinion polls have a strong influence on modern society as a means of examining the tendency of social groups on specific issues. As the influence of the polls increases, the problem of forgery and falsification of the results becomes an important issue. So, to guarantee the reliability of the results, our society needs novel mechanisms. As one of such mechanisms, the Ethereum blockchain is an environment for developing decentralized applications with the reliable blockchain technology. Ethereum decentralized applications can utilize smart contracts to provide services for users in transparent and reliable ways. In this paper, we propose a polling method that guarantees reliability using the blockchain technology, which is a distributed ledger technique that makes forgery or falsification actually impossible. The proposed method provides a robust verification function on the results of the associated polls for individual voters and verification organizations. Also, we present a distributed opinion polling application running on our private Ethereum blockchain network, showing the effectiveness of the proposed method.

Software Verification & Validation for Digital Reactor Protection System (디지털 원자로 보호계통의 소프트웨어 확인 및 검증)

  • Park, Gee-Yong;Kwon, Kee-Choon
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.185-187
    • /
    • 2005
  • The reactor protection system is the most important function for the safe operation of nuclear powerplants (NPPs) in that such system protects a nuclear reactor tore whose damage can cause an enormous disaster to the nuclear facility and the public. A digital reactor protection system (DRPS) is being developed in KAERI for use in the newly-constructed NPPs and also for replacing the existing analog-type reactor Protection systems. In this paper, an software verification and validation (V&V) activities for DRPS, which are independent of the DRPS development processes, are described according to the software development life cycle. The main activities of DRPS V&V processes are the software planning documentations, the verification of software requirements specification (SRS) and software design specification (SDS), the verification of codes, the tests of the integrated software and system. Moreover, the software safety analysis and the software configuration management are involved in the DRPS V&V processes. All of the V&V activities are described, in detail, in this paper.

  • PDF

CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY

  • Chande, Manoj Kumar;Lee, Cheng-Chi
    • Bulletin of the Korean Mathematical Society
    • /
    • v.53 no.4
    • /
    • pp.1051-1069
    • /
    • 2016
  • Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with message recovery using self-certified public key. The security of the proposed scheme is based on the discrete logarithm problem (DLP) and one-way hash function (OWHF). Their scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, their scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer. In this paper, it is shown that in their signature scheme a malicious signer can cheat the system authority (SA), by obtaining a proxy signature key without the permission of the original signer. At the same time malicious original signer can also cheat the SA, he can also obtain a proxy signature key without the permission of the proxy signer. An improved signature scheme is being proposed, which involves the remedial measures to get rid of security flaws of the LZZ et al.'s. The security and performance analysis shows that the proposed signature scheme is maintaining higher level of security, with little bit of computational complexity.

Development of the Tool for Measuring the Care Satisfaction of Home Health Nursing based on Watson's Theory of Human Caring (가정간호에 대한 돌봄만족도 측정도구 개발 - Watson의 돌봄개념을 중심으로 -)

  • Jun, Yeon-Sook;Kang, Kyung-Ah
    • Journal of Korean Public Health Nursing
    • /
    • v.28 no.1
    • /
    • pp.57-70
    • /
    • 2014
  • Purpose: This study is a methodological research study for development of a tool for measurement of care satisfaction of home health nursing in patients who have received care through home health nursing and to test the validity and reliability of the tool. Method: Based on Watson's theory of caring and its constituent factors, the literature related to home health nursing was reviewed, and the standard of home health nursing was compared and analyzed. For verification of the validation and reliability of the final tool which has been developed, data were collected from 166 people who were receiving home health nursing care. Result: According to results of analysis of the factors based on Kaiser and scree test, 10 factors with an eigenvalue greater than 1.0 were extracted, and they explained 72.26% of the total variance. In addition, the factor loadings of 56 questions were greater than .30. For verification of reliability, Cronbach's alpha for all 56 items was .98 and Guttman split half reliability coefficient was .90. Conclusion: This tool based on Watson's theory of caring contributed to development and application of the nursing theory through verification of the theory.

Wireless PKI Based Certificate Verification Using Virtual Identifier (무선 PKI 기반의 가상 식별자를 이용한 인증서 검증)

  • Choi Seung-Kwon;Shin Jung-Won;Shin Dong-Hwa;Kim Sun-Chul;Lee Byong-Rok;Cho Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.804-813
    • /
    • 2006
  • In wireless Internet environment that demand of wireless Internet service increase steadily, wireless PKI(Public Key Infrastructure) service is appearing on stage as necessary essential base technology for information protection service offer, In this paper, we propose the method for verification to reduce the communication overload using VID to CSMP made with a goal of the performance guarantee for security and use in a real time and examine the existent certificate verification methods. The performance of security and the use in a real time is guaranteed by managing the note of authentification by the person who verifies and reducing the amount of the data transmission using VID.

Effective Certificate Verification of Wireless PKI Based in WAP (WAP에서 무선 PKI기반의 효율적인 인증서 검증)

  • Shin Jung-Won;Choi Seong-Kwon;Ji Hong-Il;Lee Byong-Rok;Cho Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.175-180
    • /
    • 2005
  • To data service is offered successfully including electronic commercial transaction in radio Internet, security problem should be solved. Security protocole for radio internet does certification and key exchange by leitmotif and designed because suppose WPKI(WAP Public Key Infrastructure) mainly and use certificate. Wish to discuss efficient certificate verification of PKI that consider radio surrounding hereupon.

  • PDF

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.7 no.3
    • /
    • pp.549-560
    • /
    • 2011
  • Vote validity proof and verification is an efficiency bottleneck and privacy drawback in homomorphic e-voting. The existing vote validity proof technique is inefficient and only achieves honest-verifier zero knowledge. In this paper, an efficient proof and verification technique is proposed to guarantee vote validity in homomorphic e-voting. The new proof technique is mainly based on hash function operations that only need a very small number of costly public key cryptographic operations. It can handle untrusted verifiers and achieve stronger zero knowledge privacy. As a result, the efficiency and privacy of homomorphic e-voting applications will be significantly improved.

Influence of public-private cooperation awareness and organizational commitment among social welfare public officials -Verification of the moderating effect of supervision-

  • Jung Hye Youn;Hyun Jin Kwon;Soo Young Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.144-150
    • /
    • 2024
  • There is no prior research on organizational commitment and supervision for social welfare public officials in charge of public-private cooperation in public welfare fields. Therefore we are designed to determine the impact of social welfare public officials' public-private cooperation awareness on organizational commitment to verify the moderating effect of supervision on the effect between public-private cooperation awareness and organizational commitment. The analysis data is 242 questionnaires collected from Incheon public health and welfare officials visiting towns, villages, and villages in 10 counties. Using the SPSS 22.0 program, descriptive statistics and relationships between variables were analyzed, regression analysis was performed to analyze the influence between variables, and hierarchical regression analysis was performed to verify supervision control. As a result of the study, it was confirmed that the perception of public-private cooperation affects organizational commitment, interacts with supervision satisfaction, and has a moderating effect. Based on this, in order to improve the organizational commitment of social welfare public officials during public-private cooperation work, specific measures were proposed for sharing awareness and understanding between the public and private sectors, establishing an official system, and establishing a supervision system.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.