• Title/Summary/Keyword: 존재 증명

Search Result 529, Processing Time 0.025 seconds

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

A Study on the Identification of fake Estimate Service using DID (분산신원증명 기술을 활용한 허위 부동산 매물정보 검출에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Jin-Mook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.649-651
    • /
    • 2021
  • In recent years, O2O services for real estate sales are widely distributed in web platforms and apps. This allows sellers, buyers, and real estate brokers to quickly and conveniently conduct real estate sales and charter contracts. However, in the O2O-based real estate sales information system, it wastes time and money for real estate buyers due to the posting of fake information, partial correction of the sales information, and intentional non-posting of the sales information. Therefore, we propose a method of detecting the false or not of real estate property information that can occur on the web platform, and design and implement a proposal system for this. To this end, we propose a method of detecting personal identity and property information based on DID, a distributed identity authentication protocol. The false real estate sales information detection system proposed by us can determine the existence of real estate sales information, partially correct the false sales information, or prove whether or not intentionally unpublished in three steps.

  • PDF

The Equilibrium Between Public and Private Transports on Seoul Metropolitan Area (Downs-Thomson의 역설은 존재하는가? (수도권을 중심으로))

  • Kim, Kang-Soo;Yook, Dong-Hyung;Cho, Hye-Jin
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.8 s.86
    • /
    • pp.43-51
    • /
    • 2005
  • Thomson(1977) proposed that the equilibrium status can exist among modes when each mode's attractivenesses' are equal. His theories key point is that when the equilibrium status is achieved the additional investment for individual car user such as constructing more roads or widening the existing roads, can lead to more congestion. That's the so called 'Downs-Thomson's Paradox. This paper is intended to demonstrate that the paradox is applicable to Seoul Metropolitan area. Before doing that job, we reviewed Downs-Thomson's paradoxes related Papers such as Mogridge's (1985) research for London case. and Seung Jea-Lee's(2004) research for Seoul. In conclusion, the equilibrium status that Thomson proposed can't be applied to Seoul Metropolitan area. because the suppressed demand's behaviour is different from real situation and that of in the theory.

Equilibrium trip distribution model (균형 통행분포모형연구)

  • Im, Yong-Taek
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.6
    • /
    • pp.159-166
    • /
    • 2010
  • Trip distribution is to connect travel demand for each OD pair based on travel cost, trip production and attraction derived from trip generation step. In real world the travel cost is a function of travel demand, but existing models could not fully consider such functional relation between travel cost and demand, which leads to an equilibrium in trip distribution model. This paper proves the equilibrium trip distribution by using gravity model. In order to obtain such equilibrium this paper also presents a solution algorithm based on fixed point theorem. The algorithm will be tested with an example and confirmed the equilibrium solution of trip distribution.

Link-Disjoint Embedding of Complete Binary Trees into 3D-Meshes using Dimension-Ordered Routing (순위차원라우팅을 사용한 완전 이진트리의 3차원 메쉬로의 링크 충돌 없는 임베딩)

  • Park, Sang-Myeong;Lee, Sang-Kyu;Moon, Bong-Hee
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.2
    • /
    • pp.169-176
    • /
    • 2000
  • This paper is considered with the problem of embedding complete binary trees into 3-dimensional meshes using dimension-ordered routing with primary concern of minimizing link congestion. The authors showed that a complete binary tree with $2^P-1$ nodes can be embedded into a 3-dimensional mesh with optimum size, $2^P$ nodes, if the link congestion is two[14], (More precisely, the link congestion of each dimension is two, two, and one if the dimension-ordered routing is used, and two, one, and one if the dimension-ordered routing is not imposed.) In this paper, we present a scheme to find an embedding of a complete binary tree into a 3-dimensional mesh of size no larger than 1.27 times the optimum with link congestion one while using dimension-ordered routing.

  • PDF

Reliability of Distribution System Divided into Community Energy Systems (구역전기사업자로 분리된 배전계통의 신뢰도 평가)

  • Bae, In-Su;Kim, Jin-O
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.1
    • /
    • pp.85-90
    • /
    • 2010
  • This paper presents a technique to evaluate the reliability of customers in Community Energy System(CES). Operators of the CES are responsible for a reliable energy supply to their customers. Due to the strategy of the priority on their customers, the restoration process of DGs should be reordered when system outage happens. The previous study has proposed the technique in the distribution system in which one operator owns all DGs. Case studies in Bus 2 of Roy Billinton Test System(RBTS) verify that the accuracy of the proposed technique is comparable to that of previous technique, and the distribution system divided into several CESs changes the reliability index of customers in the CESs.

Calcium Uptake in Mouse Oocyte Matured in Vitro (배양액 내에서 성숙한 생쥐 난자의 $Ca^{2+}$ Uptake)

  • Bae, In-Ha;Chang, Bo-Young
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.16 no.1
    • /
    • pp.1-7
    • /
    • 1989
  • 배양중인 생쥐 난자의 성숙에 미치는 배양액 내 calcim의 영향을 알아보기 위하여 1.71mM $Ca^{2+}$을 처리한 배양액과 $Ca^{2+}$이 존재하지 않는 배양액에서 난자를 배양하여 불꽃 원자 흡수 분광 광도계를 이용하여 배양된 난자의 $Ca^{2+}$농도를 측정하였다. 1) $Ca^{2+}$처리한 배양액에서 배양된 cumulus-cell이 제거된 (denuded oocyte)난자들은 시간이 지남에 따라 $Ca^{2+}$농도가 높게 나타났고, 2) $Ca^{2+}$처리하지 않은 배양액에서는 denuded난자는 3시간째 배양될때 부터 $Ca^{2+}$양이 줄어 들었다. Cumulus-enclosed난자는 $Ca^{2+}$존재하에서는 GVBD가 일어났다고 생각되는 4시간까지 계속 증가를 보인 반면 $Ca^{2+}-free$에서는 배양되지 않은 난자와 거의 차이가 없게 나타났다. 3) 핵막붕괴가 일어난 후부터 15시간까지 배양시컸을 때에는 CEO와 denuded oocyte에서 공히 $Ca^{2+}$의 농도는 다시 증가된 상태로 계속 되었다. 이런 결과로 미루어 보아 난자 성숙시 부터 성숙과정이 끝날때가지 exteral $Ca^{2+}$이 요구되고 있음을 증명해 주고있다. 그러나 이러한 세포질내의 $Ca^{2+}$및 bound calcium이 난자 성숙시부터 어떤 역활을 하고 있는 기작에 대해서는 좀 더 연구가 있어야겠다.

  • PDF

Influence Map Method based on Intransitive Relationship Information for Game Character's Strategic Movement (게임 캐릭터의 전략적인 이동을 위한 상성 정보에 기반한 영향력 분포도 방법)

  • Yoon, Tae-Bok;Lee, Jee-Hyong;Choi, Young-Mee;Choo, Moon-Won
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.615-623
    • /
    • 2009
  • Games are usually composed with several units such as monsters, weapons etc.. There are often intransitive relationships between units, like the one among rock, scissors and paper. Intransitive relationships guarantee the variation of strategy choices while playing. But AIs in many games have been ignored intransitive relationships because decision making with those relationships is complex to model. This paper suggests how to use intransitive relationships to modify influence map. With the modified influence map game AI can make a different decision to win the game. With path-finding technique, this paper shows that the modified influence map makes AI's behaviors better.

  • PDF

Growth of high quality InSb on InxAl1-xSb grading buffer on GaAs ($x=1{\rightarrow}0$)

  • Sin, Sang-Hun;Song, Jin-Dong;Han, Seok-Hui;Kim, Tae-Geun
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.08a
    • /
    • pp.223-223
    • /
    • 2010
  • InSb 물질은 다른 III-V족 물질들과 비교해서 bandgap이 낮고 전자 이동도가 높아, 소자 구현 시 낮은 전압으로도 고속 동작 특성을 제어할 수 있다는 장점이 있다. 그러나 Si, GaAs 또는 InP 등 쉽게 구할 수 있는 기판과 격자 부정합이 커서 상기 기판에 성장시 많은 defect가 존재하는 단점이 있다. 그러므로 이를 상기 기판에 성장하는데 meta-morphic이라 불리는 성장 기술이 요구되는 어려움이 있다. 본 발표에서 Semi-insulating GaAs 기판위에 고품질의 InSb 박막을 성장하기 위해 grading buffer technique을 도입하며 이에 대한 여러 가지 비교실험과 함께 최적의 성장 방법과 기술에 대해 논의 한다. GaAs와 InSb 물질사이의 bandgap과 격자 부정합을 고려하여 AlSb 물질을 먼저 성장하면서 동시에 InxAl1-xSb로 변화를 주어 InSb 박막이 성장되도록 하였다. ($x=0{\rightarrow}1$). 성장 온도 변화 및 In과 Al의 조성비에 변화를 주어 grading 기법으로 성장하였고 상기 grading buffer위에 InSb 박막을 0.65um 성장하였다. $10um{\times}10um$ AFM 측정결과 2.2nm 정도의 표면 거칠기를 가지며 상온에서의 전자 이동도는 약 46, 300 cm2/Vs 이고 sheet electron density는 9.47(e11) /cm2의 결과를 확인하였다. 실험결과 InSb 박막을 올리는데 있어 가장 고려할 사항인 GaAs 기판과 InSb 박막 사이에 존재하는 격자 부정합을 어떻게 해결하는가에 대해서, 기존의 여러가지 방법과 비교해서 grading buffer 기술이 유효하다는 것을 증명하였다.

  • PDF