• Title/Summary/Keyword: 카드 유형

Search Result 113, Processing Time 0.024 seconds

Types of Stress for the Improvement of Quality of Life for Nursing Students (간호대학생의 삶의 질 향상을 위한 스트레스 유형 연구)

  • Kim, Soon-Ae;Lee, Hye-Jin;Lee, Song-Hyun;Hong, Eun-Hee
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.2
    • /
    • pp.237-247
    • /
    • 2020
  • Purpose: The study aimed to explore the stress experience of nursing college students. Methods: A Q-methodology to analyze the subjectivity of each item was used. 57 statements were derived from a literature review and interviews. 40 nursing college students were classified into a shape of normal distribution using a 13-point scale. Collected data were analyzed by the PC QUANL program. Results: Four types have been identified for the stress experience of nursing college students. Type I was "curriculum burden", Type II was "goal-oriented", Type III was "outsider frustration" and Type IV was "growth stagnation" Conclusion: These results can be useful for developing education programs based on the type of stress in nursing college students.

Fault Based Cryptanalysis of AES (AES에 대한 오류기반 공격)

  • 장화선;김광조
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.138-141
    • /
    • 2003
  • 스마트카드와 같은 장치의 부채널 공격이 가능한 것으로 입증되면서 많은 연구가 진행되고 있다. 부채널 공격의 일종인 오류기반 공격은 구현 가능성이 논란의 대상이었지만 카메라 플래쉬를 이용한 광학적 공격이 보고되면서 실현 가능성이 높은 것으로 인식되고 있다. 본 논문에서는 AES에 대해 향상된 오류기반 공격을 제안한다. 제안된 방법을 사용하면 공격에 필요한 암호문 수를 기존 방법보다 많이 줄일 수 있으며 최적의 조건에서는 하나의 암호문만으로 키를 얻을 수 있다. 오류는 일시적으로 생긴 후 없어지는 유형을 사용할 수도 있고 영구적인 것일 수도 있다. 오류에 의한 변경 확률이 1이 아닌 경우와 오류 발생 시점의 오차에 대해서도 살펴본다.

  • PDF

전자상거래 보완을 관한 연구

  • 한국희
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.45-45
    • /
    • 1997
  • 최근 국내외에서 활발히 추진되고 있는 전자상거래는 비즈니스의 모든 프로세스를 전자화하고 디지털 통신망에 접속을 자동화하는 정보화 혁명으로써, 전자상거래의 보편화되면서 신용카드번호, 비밀번호 등 대금결제를 위한 중요한 개인 정보가 네트워크에 노출될 수밖에 없고 해커들의 공격 유형도 다양해 질 것으로 보인다. 본 논문에서는 전자상거래의 체계의 특징, 지불 시스템, 인증 시스템의 종류, 개인정보 위협요소들의 분석을 통해 전자상거래 최적환경을 만들기 위한 전자상거래 보안 시스템을 설계하였다.

Restoration of Numeral Strings Touched with Lines in Various Form Documents (서식 문서의 선과 접촉된 숫자열 복원에 관한 연구)

  • Lee, Chang-Hyeon;Choe, Yeong-U;Kim, Gyeong-Hwan;Lee, Il-Byeong
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.6
    • /
    • pp.439-449
    • /
    • 2001
  • 본 논문에서는 서식 문서의 선과 숫자의 획이 접촉된 경우 숫자의 획을 접촉되기 전 상태의 원 이미지로 복원하는 방법을 제안한다. 제안하는 방법에는 서기 문서에서 추출한 숫자열을 대상으로 열 단위로 복원한다. 과정은 우선 숫자열과 접촉된 선의 위치를 찾아내고, 선을 추적하면서 접촉으로 판정되는 영역을 유형별로 분류하여, 각 유형에 적합한 획 복원 방법을 제안한다. 또한 선에 숫자의 획이 완전히 포함된 경우의 복원 방법도 제안하여 현장에서의 서식 처리 과정에서 발생하는 문제점을 해결하고자 하였다. 제안하는 방법을 평가하기 위해서 은행 입출금전표, 신용카드 매출전표 및 NIST 필기 숫자열 데이터베이스 이미지를 사용하였다.

  • PDF

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Plant Regeneration and Protein Analysis from Cadmium Resistant Callus of Tobacco (Nicotiana tabacum cv. BY4) (담배 (Nicotiana tabacum cv. BY4)카드뮴 저항성 캘러스로부터 식물체 재생과 단백질 분석)

  • 오승철;소웅영;조덕이;양덕춘
    • Korean Journal of Plant Tissue Culture
    • /
    • v.28 no.1
    • /
    • pp.7-13
    • /
    • 2001
  • Calli were induced from diploid and haploid tobacco after 4 weeks and maintained on MS medium with combination of 2.0 mg/L 2,4-D,0.1 mg/L BAP and 2.0 mg/L kinetin. Suspension cells were screened through 65 $\mu$m-nylon mesh and 100 $\mu$m-mesh, then they were smeared on selection medium combined with cadmium and PFP by using the low melting agarose of 0.8%. After 30days smeared cultures of the medium the cell was treated with 500 $\mu$M and 1000 $\mu$M to select the resistant cell line were selected. Plant regeneration was induced from the selected cell lines on medium with 0.5, 1.5, 2.0 mg/L BAP and on media with combination of auxin and BAP under 500 $\mu$M and 1000 $\mu$M cadmium. At this time, plant regeneration was achived on cadmium free medium. In case of haploid, occurred from the cell line which is selected in medium with cadmium and PFP. In case of diploid regeneration occurred is in the medium with cadmium alone. The plantlet regenerated from cadmium resistant calli grew well in cadmium 500 $\mu$M. Protein pattern of leaf, root, stem of regenerated plants was analyzed. The quantum was 6.5188 ug/mg.fr.wt in the leaf of plant, 5.3611 ug/mg.fr.wt in the stem, 3.0213 ug/mg.fr.wt in the root. On the other hand, 5.9652 ug/mg.fr.wt. in the leaf of control, 3.5974 ug/mg.fr.wt in the stem of the control, 4.3766 ug/mg.fr.wt. in the root of the control. The one dimension bends regenerated from cadmium resistant calli resistant to cadmium in leaf were 49 involving 198.7KD etc. Disappeared were 4 involving 160.5KD etc, The protein bends were combinized were 3 involving 83.4KD etc. The bends resistant to cadmium stress in stem were 41 involving 4.3KD etc. Disappeared were 5 involving 114.8KD etc. The protein bends combinized were 6 involving 128.7KD etc. The bends which had the resistance to cadmium stress in root is 27 in volving 166,9KD etc. The bends which disappeared were 198.7KD etc. There were 5 involving 83.4KD etc.

  • PDF

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

A study for USIM Forensic Tools (USIM 포렌식 툴에 관한 연구)

  • Lim, Jae-Yoon;Yun, Seung-Hwan;Lim, Sun-Hee;Yi, Ok-Yeon;Lim, Jong-In
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.71-76
    • /
    • 2007
  • 정보 통신기술의 발전으로 단말기와 네트워크에 독립적인 부가서비스를 이용할 수 있는 개방형 가입자인증 카드인 USIM(Universal Subscriber Identification Module) 카드가 이용되고 있다. 모바일 정보기기의 성능 향상으로 다양한 기능이 추가되고 USIM에 저장된 개인정보의 중요성이 부각되어 범죄 도구로 이용될 가능성이 높아 졌으며 법정 증거자료로서의 중요성도 증가되었다. 모바일 포렌식은 기존의 데이터 저장장치와는 다른 파일시스템을 가지고 있기 때문에 거기에 맞는 전용 포렌식 툴들이 필요하며, USIM과 관련된 범죄가 일어날 때, 자료의 복구와 빠른 검사를 통해 법적 증거화 시킬 수 있는 USIM 포렌식 틀을 요구한다. 본 논문에서는 USIM의 기본적인 구조와 파일시스템을 분석하고 USIM 포렌식 관점에서 증거화 시킬 수 있는 다양한 유형과 절차들을 알아보고, 현재 사용 중인 USIM 포렌식 툴들에 대해 비교 분석한다.

  • PDF

A secure token-updated authentication scheme using security key (비밀키를 이용한 토큰 업데이트 보안 인증 기법)

  • Liang, Jun;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2007
  • Recently, a large number of authentication schemes based on smart cards have been proposed, using the thinking of OTP (one-time password) to withstand replay attack. Unfortunately, if these schemes implement on PCs instead of smart cards, most of themcannot withstand impersonation attack and Stolen-Verifier attack since the data on PCs is easy to read and steal. In this paper, a secure authentication scheme based on a security key and a renewable token is proposed to implement on PCs. A comparison with other schemes demonstrates the proposed scheme has following merits: (1) Withstanding Stolen-Verifier attack (2) Withstanding Impersonation attack (3) Providing mutual authentication; (4) Easy to construct secure session keys.

  • PDF

A Brokered Authentication Scheme Based on Smart-Card for Multi-Server Authentication (다중서버 인증을 위한 스마트카드 기반 중재 인증 기법 연구)

  • Kim, Myungsun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Since the facilities for the remote users tend to be deployed in distributed manner, authentication schemes for multi-server communication settings, which provide various web services, are required for real-world applications. A typical way to authenticate a remote user relies on password authentication mostly. However, this method is vulnerable to attacks and inconvenient as the system requires users to maintain different identities and corresponding passwords. On the other hand, the user can make use of a single password for all servers, but she may be exposed to variants of malicious attacks. In this paper, we propose an efficient and secure authentication scheme based on a brokered authentication along with smart-cards in multi-server environment. Further we show that our scheme is secure against possible attacks and analyze its performance with respect to communication and computational cost.