• Title/Summary/Keyword: 능동 네트워크

Search Result 501, Processing Time 0.022 seconds

CipherSuite Setting Problem of SSL Protocol and It's Solutions (SSL 프로토콜의 CipherSuite 설정 문제점과 해결 방안)

  • Lee, Yun-Young;Hur, Soon-Haeng;Park, Sang-Joo;Shin, Dong-Hwi;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.359-366
    • /
    • 2008
  • As the use of Internet and information communication technology is being generalized, the SSL protocol is essential in Internet because the important data should be transferred securely. While the SSL protocol is designed to defend from active attack such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draw on a malfunction of the client system and modify the cipher suite setting to the symmetric key algorithm which has short key length, he should eavesdrop and cryptanalysis the encrypt data. In this paper, we examine the domestic web site whether they generate the security session through the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.

New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments (이동통신 환경에서 사용자 프라이버시 보호를 위한 새로운 이동 착호프로토콜)

  • Kim, Soon-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2193-2201
    • /
    • 2006
  • In related to mobile communication environment. Kesdogan and Pfitzmann[1,2,3] proposed solutions using temporary pseudonym identification, called TP(Temporary Pseudonym) to solve the problems concerning current locations of mobile users and exposure of their movements in the privacy aspect. After that, we proposed more improved method protecting mobile users from active attacks of network providers in [4]. But it is the case that mobile users are located in only home domain. As a more extended method. we propose new mobile terminated protocol protecting user privacy in case of moving from the home domain to the remote domain and analyze its security.

A Conceptual Model on the Influence of the Intranet Advertising to the Employees' Communication (인트라넷 광고가 조직구성원 커뮤니케이션에 미치는 영향의 개념적 모형 -팝업 및 배너광고 중심으로-)

  • Jang, In-Mo;Jun, Soon-Young
    • Proceedings of the KAIS Fall Conference
    • /
    • 2012.05a
    • /
    • pp.381-384
    • /
    • 2012
  • 사회의 근본적인 경제 구조가 농경사회에서 산업사회를 거쳐 정보사회로 전환되면서 인터넷 사용자와 인터넷에서의 마케팅 및 커뮤니케이션이 기하급수적으로 증가하고 있는 추세이다. 인터넷 매체의 빠른 확산과 인터넷 매체만이 갖는 특징 때문에 기존의 커뮤니케이션 환경과 양식, 기업의 활동양식, 나아가서는 개인의 라이프스타일이 크게 변모하고 있다. 통신과 네트워크 기술, 디지털 및 멀티미디어 기술의 발달에 힘입어 기존의 일방적이고 수동적인 정보전달 방식은 쌍방향적이고 능동적인 정보전달방식으로 바뀌어 가고 있다. 즉, 커뮤니케이션 주체간의 시간과 거리 공간의 벽이 없어지는가 하면 소비자의 정보수집, 구매, 의사 전달과 같은 행동양식도 크게 탈바꿈하고 있는 것이다. 뿐만 아니라 Interactive한 통신 기능을 기반으로 한 인터넷 광고는 마케팅이나 광고 캠페인에 대한 기업의 전통적 접근방식을 크게 변화시키고 있다. 본 연구에서는 이러한 정보화 시대의 인터넷 이용자들의 일반특성과 인터넷 사용 경향을 살펴보고 조직내에서 이뤄지는 인트라넷에서 실시되고 있는 배너광고(Banner Advertising)와 팝업창을 중심으로한 광고활용이 사내구성원의 효율적인 커뮤니케이션을 구축할 수 있는 방안을 모색하기 위한 개념적 모형을 제시하고자 한다.

  • PDF

A Study on Richmedia Application in Internet Advertisement (인터넷 광고에서 리치미디어의 활용방안 연구)

  • Kwon, Sang-Oh
    • Cartoon and Animation Studies
    • /
    • s.10
    • /
    • pp.149-157
    • /
    • 2006
  • With the expansion of the Internet population, the online market is achieving a rapid growth and the size of the Internet advertisement market is increasing at a high rate. Different from passive types of information transmission, online media allows active two way communication thanks to communication and network technologies, so they can ascertain the effects of advertisement and users' response immediately. Rich media refer to such new advertisement techniques on the Internet, and are expected to lead the future Internet advertisement market. Thus, the present study purposed to analyze the visual expression elements of rich media advertisements in order to understand and enhance the effects of rich media advertisements with higher interactivity than existing Internet advertisements, and to propose guidelines for applying unique designs for the promotion of businesses and organizations and the provision of effective information to users.

  • PDF

Analysis of Computer Virus Immune System (바이러스 면역시스템 분석)

  • 전완근;이중식;이종일;김홍윤
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.39-47
    • /
    • 2002
  • To recently with the love-letter and Back Orifice the same Worm-virus, with the Trojan and the Linux-virus back against the new species virus which inside and outside of the country to increase tendency the malignant new species virus which is the possibility of decreasing the damage which is enormous in the object appears and to follow a same network coat large scale PC is being quicker, it disposes spontaneously to respect, applied an artificial intelligence technique the research against the next generation malignant computer virus of new form is demanded. Will reach and to respect it analyzes the digital immunity system of the automatic detection which is quick against the next generation malignant virus which had become unconfirmed and the foreign countries which has an removal function.

  • PDF

A Study on the Improvement and Implementation of RTLS Algorithm using Wireless Network Technology (무선 네트워크 기술을 이용한 RTLS 알고리즘의 성능 개선 및 구현에 관한 연구)

  • Kim, Dong-Ok;Chung, Ho-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.155-162
    • /
    • 2012
  • In this paper, we proposed a method of improving the location estimation error existing in RTLS (Real Time Location Service) system for the mobility individual. According as Ubiquitous comes, interest for indoor location tracking system was more increased socially. However, existing indoor location tracking system doesn't correspond actively in frequent change of indoor environment, and there is a problem that correct location measurement of transfer object is difficult by NLOS property of indoor environment. Purpose of this paper proposes environment accommodation location tracking system that is improved location precision of transfer object and grasps location of indoor transfer object effectively that is essential element effectively to provide service to satisfy various user's request according as Ubiquitous comes.

Medical Service In Inernet of Things (사물인터넷 환경의 의료서비스)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.876-879
    • /
    • 2015
  • Inernet of Things(IoT) is a network to be interconnected with things anytime, anywhere. This means interaction with each other, collecting, sharing, and analysing the data. IoT also offers a new paradigm shift in industry. In particular, the combining with the fields of health care services has been noted. The convergence of IoT technology and health care is expected to be the innovation paradigm in the healthcare industry that includes all of the changes to bring the mobile health and wearable health care devices. This study analyzes IoT, health care status, and the use cases of the IoT in the medical field, finally analyses security on the Internet of Things, the most important issues of security challenges while still in medical services.

  • PDF

PSMS Design and Implementation for a Phishing Attack Intercept (피싱공격 차단을 위한 PSMS 설계 및 구현)

  • Yoo, Jae-Hyung;Lee, Dong-Hwi;Yang, Jae-Su;Park, Sang-Min;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.49-56
    • /
    • 2008
  • Recently, Phising attack uses trick of URL and sites, and technical concealment method which infiltrates sophisticated malicious code. However, sometimes Phising security technology cannot cover all of Phising methods. Consequently, this research proposes inspection to solve this problem. First, we can install Proxy server for a strong open information exchange of web environment between web servers and clients. Therefore, it compares and analyzes harmful site and Phising URL with White domain list, and filters them. Finally, designs for stable web based information so that we can block Phising with least regulation and active control. So the purpose of this paper is introducing this design system and structure, and inspect them.

  • PDF

Design and Implementation of A Load Balancer Based on Load Equality between Game Servers (게임 서버간 부하의 균일성에 기반한 부하 분산기 설계 및 구현)

  • Um, Nam-Kyoung;Moon, Hyung-Jin;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3B
    • /
    • pp.168-174
    • /
    • 2007
  • All of users who connect to mobile game want to play seamless real-time game without any loads on game servers. However, as for existing methods, it is not available to effectively distribute server loads. Therefore, in this paper, we design and implement an uniform variance-based load balancer for distributing loads of game servers for wireless online games by suitable load balancing methods. With this methods, we can deal with dynamically increasing game servers as the information about load balancing of specific period is applied to the administrator.

RFID Applications from 2005 to 2010 (2005년부터 2010년 사이의 RFID 기술 적용 현황)

  • Sheen, Dong-Mok;Choi, Sung-Hee;Lee, Gong-Seop
    • Journal of Ocean Engineering and Technology
    • /
    • v.24 no.4
    • /
    • pp.86-93
    • /
    • 2010
  • RFID has been used as an identification tool that substitutes for bar codes. Its areas of application are increasing due to its suitability in ubiquitous environment. In this paper, first, we review various aspects of RFID, including standards, characteristics, and relationships with wireless sensor networks. Then, we review the technical aspects of RFID and its areas of application, e.g., supply chain management (SCM) and manufacturing since 2005. SCM, in which RFIDs can shorten lead time and ensure the quality of products, is one of the most active application areas. Manufacturing is a relatively new area for RFID applications, but it is believed that it can enhance the productivity and the reliability of the products. Also, the authors suggest research issues and limitations of RFID, as well as possible application areas related to marine engineering.