• Title/Summary/Keyword: 키관리

Search Result 1,064, Processing Time 0.033 seconds

Efficient and Secure Member Deletion in Group Signature Scheme (그룹 서명 기법에서의 효율적이고 안전한 구성원 탈퇴 방법)

  • 김현정;임종인;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.41-51
    • /
    • 2001
  • Group signature schemes allow a group member to sign messages anonymously on behalf of the group. In case of dispute, only a designated group manager can reveal the identity of the member. During last decade, group signature schemes have been intensively investigated in the literature and applied to various applications. However, there has been no scheme properly handling the situation that a group member wants to leave a group or is excluded by a group manager. As noted in[3], the complexity of member deletion stands in the way of real world applications of group signatures and the member deletion problem has been a pressing open problem. In this paper we propose an efficient group signature scheme that allows member deletion. The length of the group public key and the size of signatures all independent of the size of the group and the security of the scheme relies on the RSA assumption. In addition, the method of tracing all signatures of a specific member is introduced.

A Study on Message authentication scheme based on efficient Group signature in VANET (VANET환경에서의 효율적인 그룹서명기반 메시지 인증 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.239-248
    • /
    • 2012
  • VANET (Vehicular Ad-hoc Network) is a type of MANET (Mobile Ad-hoc Network) which is the next-generation networking technology to provide communication between vehicles or between vehicle and RSU (Road Side Unit) using wireless communication. In VANET system, a vehicle accident is likely to cause awful disaster. Therefore, in VANET environment, authentication techniques for the privacy protection and message are needed. In order to provide them privacy, authentication, and conditional, non-repudiation features of the group signature scheme using a variety of security technologies are being studied. In this paper, and withdrawal of group members to avoid frequent VANET environment is suitable for vehicles produced by the group administrator for a private signing key to solve the key escrow problem of a group signature scheme is proposed. We proposed a message batch verification scheme using Bloom Filter that can verify multiple messages efficiently even for multiple communications with many vehicles.

A study on the trend of patent application and new material development by era of wigs (가발의 시대별 특허 출원 및 신소재 개발 동향에 관한 연구)

  • Lim, Sun-Nye;Park, Jang-Soon
    • Journal of Industrial Convergence
    • /
    • v.20 no.6
    • /
    • pp.117-123
    • /
    • 2022
  • Appearance, which is directly related to competitiveness, has become one of the essential self-care for modern people living in the era of the 4th industrial revolution. For the purpose of producing more practical and convenient wigs for suffering customers, data of research subjects were collected through an information search portal site. The trend of new material development of leading wig companies was analyzed. As a result of the study, it was found that many applications for wig attachment and binding technology were applied before 2005, artificial hair-related manufacturing technology for wigs from 2006 to 2013, and functional-related wig technology after 2014. In addition, both H and M companies showed the development trend of new materials for shape memory materials and nanoskins with their own characteristics. We believe that this study will be provided as basic data for the development of functional wigs that can lead to customer satisfaction while providing customers with a comfortable and convenient fit in the wig industry market.

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

Investigation on Characteristics of Riparian Vegetation Distribution in Korean Rivers (국내 하천 수변식생의 분포 특성에 관한 연구)

  • Un Ji;Jiyoung Jang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.523-523
    • /
    • 2023
  • 하천의 특성에 따라 활착하는 식생 및 형태는 다르며, 이러한 식생분포 특성은 다시 하천 수위와 유속 등에 영향을 미친다. 이처럼 식생과 하천의 상호작용을 이해하고, 이를 하천환경을 개선하는 하천관리를 위한 정보로 도출하기 위해서는 하천에 서식하는 식생에 대한 기초 정보를 수집하고 종합할 필요가 있다. 최근 기후변화와 강수 특성의 변화로 인해 국내 하천에서는 하천 규모와 위치에 관계없이 하도내 식생이 급격하게 증가하고 있다. 하천 내 식생의 활착은 흐름저항에 영향을 줄 수 있고 이는 홍수 발생시 통수능의 감소로 인해 결과적으로 홍수 피해를 유발할 수 있다. 특히 수목 식생이 패치나 군락의 형태로 하천에 존재할 경우 적은 양으로도 흐름저항을 증가시켜 홍수피해 규모가 커질 수 있다. 따라서 식생이 흐름저항에 미치는 영향을 파악하기 위해서는 국내 하천에 서식하는 수변식생의 종별 특성과 패치와 군락 형태의 물리적 특성 등을 이해할 필요가 있다. 국내 하천에서는 패치나 군락 형태로 서식하는 수목 식생 중 버드나무가 우점하는 것으로 알려져 있다. 따라서 본 연구에서는 한국 하천에 분포하는 버드나무속 식생을 중심으로 입지 환경 및 군집 분포에 대해 조사하고 하천과 식생의 관계를 분석한 문헌들을 중심으로 그 결과들을 살펴보고자 한다. 본 연구에서는 하천 수변에 서식하는 버드나무 5종(왕버들, 선버들, 갯버들, 키버들, 버드나무)의 수목별 특성과 버드나무속의 특징, 연도별 하천별 버드나무 데이터를 제시하였다. 버드나무속은 종에 따라 개화기, 결실기, 수고 등에서 차이를 보였으나 대체로 저수로 호안과 범람원에 분포하는 것으로 나타났다. 특히 물환경정보시스템의 수변식생 자료(2014년부터 2021년, 2015년 제외)에 따르면 환삼덩굴, 쑥, 달뿌리풀이 매년 80% 이상의 출현률을 보이며 가장 상위에 존재하였으며, 버드나무속 식생 중에서는 버드나무(Salix koreensis)가 매년 60% 이상의 출현률로 가장 드넓게 분포하고 있는 것으로 나타났다.

  • PDF

R and K Factors for an Application of RUSLE on the Slope Soils in Kangwon-Do, Korea (강원도 경사지 토양 유실 예측용 신USLE의 적용을 위한 강수 인자와 토양 침식성 인자의 검토)

  • Jung, Yeong-Sang;Kwon, Young-Ki;Lim, Hyung-Sik;Ha, Sang-Keun;Yang, Jae-E
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.32 no.1
    • /
    • pp.31-38
    • /
    • 1999
  • Rainfall factor. R, and soil factor, K were estimated to use the Revised Universal Soil Loss Equation (RUSLE) to predict the amount of soil erosion from a land on slope in Kangwon-do, Korea. The average of R factor was 405 with a range from 251 to 601. The R factor differed among regions. The R factor at Taegwalryung, in the highland region, was 409 and those at Inje and Hongchon, in the mid mountainous regions, ranged from 310 to 493. The R factors at Wonju and Chuncheon, in the plain regions, ranged from 505 to 601. The R factors at Sokcho, Kangnung and Samchok, in the east coastal region, which ranged from 251 to 368, were lowee than those in the western part of the Taebaeg Mountains. The R factor during the winter including the effect of winter freezing and thawing was 12 to 30% of the annual average value in the east coastal and highland regions, while that in the western part of Taebaeg Mountains was lower than 7%. The average of K factor in the surface soil was 0.21 with a range from 0.06 to 0.42. The K factors of Odae and Weoljeong serieses were the lowest, while that of Imog was the highest. The average of K factor in the subsoil was 0.28 with a range from 0.07 to 0.45. The K factor of the subsoil was 1.3 times higher than that of top soil. The average of K factor in he soil including the effect of the gravel covering and percolation was 0.18 with a range from 0.03 to 0.33. In contrast. the K factor excluding the effect of the gravel covering was lower than this. The average of K factor in the frozen subsoil was 0.33, which was 1.6 times higher than that of the non frozen subsoil.

  • PDF

A Research for Shorebirds on the Southernmost of Nakdong Estuary (낙동강 하구 최남단 사주의 도요.물떼새류에 관한 연구)

  • Hong, Soon-Bok
    • The Korean Journal of Ecology
    • /
    • v.28 no.4
    • /
    • pp.199-206
    • /
    • 2005
  • Estuary islets should be managed systematically because they are important places for birds to rest and breed. This paper investigates the environmental properties of islets where the sand banks are located from east to west on the southernmost of Nakdong estuary during a year (September 2003 $\sim$ August 2004). The research showed that 59 species and 19,148 individuals were found in the area A (Jangja Shinja-Do) and 61 species and 28,394 individuals in the area B (Saja-Do; Beakhapdeung Doyodeung). Totally, 74 species and 47,539 individuals were observed in both of this estuary. Shorebirds are the most observed species in both areas. In area, most of individuals were especially observed in the spring when Shorebirds migrate northward for breeding. In B area, various species were also observed in the fall when they migrate southward for wintering. Therefore, many groups of birds are observed around Shinja-Do in the spring. They passed the winter in Doyodueng, associated with feeding in the main stream of Nakdong river mainly. Although the southernmost sand bar is the breeding place to access to outside without interception, invasion by human beings and predators (mice, weasels and etc.) gives a fatal blow for birds to breed or rest. The reed which is a tall herbaceous plant is flourished according to the process of ecological succession. Therefore, the sand bar becomes a land. It results in reduction of habitats and breeding grounds for birds. In conclusion, these areas where birds can use the islets as habits and breeding places must be preserved by restraining luxuriance of reeds and systematic management of human beings and predators is necessary.

A Study on the Time Series Analysis of the Actual Unit Cost based on the Bid Prices (시계열을 이용한 실적단가 예측방안에 관한 연구)

  • Park, Won-Young;Seo, Jong-Won;Kang, Sang-Hyeok;Choi, Bong-Joon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.4
    • /
    • pp.50-57
    • /
    • 2009
  • The Korea Standard of Estimate which has been used as the only basis of Cost estimate of public construction projects is failed to reflect the fluctuation of current construction cost. Therefore, the government decided to gradually introduce historical construction cost into cost estimate of public construction projects from 2004 and to reduce the use of Korean Standard of Estimate. This paper presents a series of process and the methodology for computing Actual Cost and analyzing the fluctuation patterns based on not only previous contract prices which made a successful bid but also all of the other bid prices. Also, this paper mainly handles a device for extracting strategic bid price such as low price bid for assuring reliable data and for predicting the construction cost which is built by Wavelet Analysis of Time series Analysis data and Neural Network. It is anticipated that the effective use of the proposed process for estimating actual unit cost would make the cost estimation more current and reasonable.

Accident Prevention and Safety Management System for a Children School Bus (어린이 통학버스 사고 방지 및 안전 관리 시스템)

  • Kim, Hyeonju;Lee, Seungmin;Ham, Sojeong;Kim, Sunhee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.446-452
    • /
    • 2020
  • As the use of children's school buses increases, accidents caused by the negligence of school bus drivers and ride carers have also increased significantly. To prevent such accidents, the government is coming up with various policies. We propose an accident prevention and safety management system for children's school buses. Through this system, bus drivers can easily check whether each child is seated and whether the seat belt is used, so it is possible to quickly respond to children's conditions while driving. With the ability to recognize faces by analyzing camera images, children can use a seat belt that is automatically adjusted to their height. It is therefore possible to prevent secondary injuries that may occur in the event of a traffic accident. In addition, a sleeping child-check system is provided to confirm that all children get off the bus, and a text service is provided to inform parents of their children's locations in real time. Based on Raspberry Pi, the system is implemented with cameras, pressure sensors, motors, Bluetooth modules, and so on. This proposed system was attached to a bus model to confirm that the series of functions work correctly.