• Title/Summary/Keyword: 키 유일성

Search Result 33, Processing Time 0.023 seconds

A Study of Methodology to Grant UFID(Unique Feature IDentifier) of Geographic Features (지형지물 유일식별자(UFID : Unique Feature IDentifier) 부여방안에 관한 연구)

  • Kim, Ju-Han;Jeong, Dong-Hoon;Kim, Byung-Guk
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.2 s.10
    • /
    • pp.23-31
    • /
    • 2003
  • As the results of the information project, manufacturing of the digital map and various thematic maps of the national land has been completed. Furthermore, it is necessary to organize a systemized management system, which can control and utilize all artificial features (e.g. buildings, roads, bridges etc.) as well as natural geographic features (e.g. rivers etc). Howener, it has difficulties in managing NGIS as a unified system, because of the discordance of DB of each geographic management organizations. Therefore, this study has been conducted to apply to the system and method providing geographic UFID that can be a key in order to managing, searching and utilizing geographic and artificial features and that makes it be able to estimate the location with the only identifier. Moreover, the system and method, providing geographic UFID, applies to systemized management of NGIS DB as well as consistency of information.

  • PDF

건설안전리포트 - 쌍용건설(주) 퇴계원-진접간 도로공사 현장 -도로공사 안전관리의 교과서

  • Yeon, Seul-Gi
    • The Safety technology
    • /
    • no.165
    • /
    • pp.12-14
    • /
    • 2011
  • 경기 남양주 진접지구는 수도권에서 인기가 높은 신도시 중 하나다. 서울과 인접해 있으면서도 한적한 전원의 정취를 느낄 수 있기 때문. 최적의 주거환경을 갖춘 곳이지만 딱 한 가지 아쉬운 것이 있으니 바로 교통문제다. 진접지구와 서울을 잇는 유일한 도로인 국도47호선 퇴계원-진접구간은 상습 지 정체구간으로 악명 높다. 진접지구가 개발됨에 따라 인구유입은 지속적으로 늘고 있는데 반해 도로는 이를 감당키 어려운 4차로에 불과한 것. 그래서 지역민들은 늘 교통대란에 시달리고 있는 상황이다. 하지만 이 고생도 올해면 끝날 듯하다. 퇴계원-진접간 도로를 8차로로 확장하는 공사를 맡고 있는 쌍용건설이 공사에 더욱 박차를 가하고 있기 때문이다. 게다가 우수한 안전관리로 대 내외에 이름까지 떨치고 있어 도로의 안전성은 물론 공정 전반이 신뢰를 얻고 있다. 안전으로 미래 진접을 열어갈 길을 만들고 있는 쌍용건설(주) 퇴계원-진접간 도로공사 현장을 찾아가 봤다.

  • PDF

Deep Learning Based Side-Channel Analysis for Recent Masking Countermeasure on SIKE (SIKE에서의 최신 마스킹 대응기법에 대한 딥러닝 기반 부채널 전력 분석)

  • Woosang Im;Jaeyoung Jang;Hyunil Kim;Changho Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.151-164
    • /
    • 2023
  • Recently, the development of quantum computers means a great threat to existing public key system based on discrete algebra problems or factorization problems. Accordingly, NIST is currently in the process of contesting and screening PQC(Post Quantum Cryptography) that can be implemented in both the computing environment and the upcoming quantum computing environment. Among them, SIKE is the only Isogeny-based cipher and has the advantage of a shorter public key compared to other PQC with the same safety. However, like conventional cryptographic algorithms, all quantum-resistant ciphers must be safe for existing cryptanlysis. In this paper, we studied power analysis-based cryptographic analysis techniques for SIKE, and notably we analyzed SIKE through wavelet transformation and deep learning-based clustering power analysis. As a result, the analysis success rate was close to 100% even in SIKE with applied masking response techniques that defend the accuracy of existing clustering power analysis techniques to around 50%, and it was confirmed that was the strongest attack on SIKE.

The Growth Inhibitory Effects of Atrina Pecitinata Fractions on Cancer Cell Lines (암세포주 성장 억제에 미치는 키조개 분획물의 영향)

  • Park Soune-Young;Shin Mi-Ok;Lee Sang Hyun;Bae Song-Ja
    • Journal of Nutrition and Health
    • /
    • v.38 no.4
    • /
    • pp.307-312
    • /
    • 2005
  • We investigated the growth inhibitory effects of Atrina pecitinata (AP) on the proliferation in human cancer cell lines in vitro. AP was extracted with methanol which was further fractionated into four different types: methanol (APMM), haxane (APMH), butanol (APMB), and aquous layers (APMA). Among various partition layers, the APMM showed the strongest cytotoxic effects on all cancer cell lines which we used. In the MTT assay of AP fractions, the growth inhibitory effects was increased in proportion to its concentration. We observed quinone reductase (QR) induced effects in all fraction layers of AP on HepG2 cells. The QR induced effects of APMM on HepG2 cell at 80 $\mu$g/mL concentration indicated 2.0 with a control value of 1.0.

Study of Biometrics using Tritone Paradox (트라이톤 패러독스를 이용한 생체인증의 고찰)

  • Jung, Changhoon;Shin, DongOh;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1085-1095
    • /
    • 2015
  • In music theory, the triton is defined as a musical interval composed of three adjacent whole tones(or six semitones), which generates a harmonic and melodic dissonance. The triton paradox is an auditory illusion which is heard as ascending by some people and as descending by others. In this paper we examine an emerging non-static biometric technique that aims to identify users based on analyzing uniqueness and consistency through the user experiences. We also propose some authentication schemes which provides protection against key logging, shoulder surfing, and brute force attacks.

Implementing a Light-Weight Authentication Protocol for Resource-Constraint Mobile Device in Ubiquitous Environment (유비쿼터스 환경에서 제한적인 능력을 갖는 이동장치를 위한 경량의 인증 프로토콜 구현)

  • Lim, Kyu-Sang;You, Il-Sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.823-826
    • /
    • 2007
  • In ubiquitous environment, mobile devices, which users carry, tend to be resource-constraint, thus resulting in the need for an authentication protocol, which provides light-weight computations as well as strong security. Recently S/Key based protocols, which satisfy such a requirement by achieving light-weight computations, strong authentication and session key exchange, have been proposed. In particular, You and Jung's protocol is more efficient and secure than others. In this paper, we compare and analyze You-Jung with other protocols. Also, we design an authentication scenario and status of mobile devices while implementing the protocol.

  • PDF

Insect Fauna of Cemetery Area in Forest from Korea (산림 내 묘지 지역의 곤충상에 관한 연구)

  • Park, Jin-Young;Park, Jong-Kyun
    • Asian Journal of Turfgrass Science
    • /
    • v.25 no.2
    • /
    • pp.153-159
    • /
    • 2011
  • This study was carried out to know the insect fauna of turf grass area in forest. In Korea, graves and public cemetery in mountain areas are usually covered by turf grass which were mainly examined. There were 86 species belonging to 77 genera of 39 families in 11 orders. Among them, site 3 had highest occurrence (38%), second was site 2 (36%) and in the last place was site 1 (26%). Hemiptera revealed best species composition (29.1%) and came Coleoptera (19.8%), Orthoptera (15.1%), Lepidoptera (12.8%) and Odonata (5.8%) etc. The reason why Hemiptera and Orthoptera are mainly found in these areas is because they usually feed on short plants that grow in there. Taxonomic species composition, occurrence ratio by site and species and comparison analysis were provided.

An Improved Protocol for the Secure Mobile IPv6 Binding Updates (안전한 모바일 IPv6 바인딩 갱신을 위한 개선된 프로토콜)

  • You, Il-Sun;Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.605-612
    • /
    • 2004
  • In MIPv6, unauthenticated binding updates expose the involved MN and CN to various security attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols have been proposed. In this paper, we pro-pose a novel protocol for the secure binding updates in MIPv6, which can resolve the drawbacks of the Deng-Zhou-Bao's protocol [2], by adopt-ing Aura's CGA scheme with two hashes [9]. Aura's scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA's public key than the Deng-Zhou-Bao's protocol. Through the comparison of our protocol with other protocols such as the Deng-Zhou-Bao's protocol, CAM-DH and SUCV, we show that our protocol can provide better performance and manageability in addition to stronger security than other approaches.

A Formal Security Analysis on the Enhanced Route Optimization Protocol for Mobile IPv6 (이동 IPv6의 확장된 경로 최적화프로토콜에 대한 형식화된 보안 분석)

  • You, Il-Sun;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.691-699
    • /
    • 2009
  • Recently, the ERO protocol has been adopted as a standard to protect the routing optimization mode introduced by MIPv6. This protocol uses the public key cryptography and the early binding update method to improve the Return Routeability protocol while optimizing both security and performance. On the other hand, though various security approaches including the ERO protocol have been proposed for MIPv6, they lack formal verification. Especially, to our best knowledge, there is no formal analysis on the ERO protocol. In order to provide a good example for formal analysis on MIPv6 security protocols, this paper verifies the correctness of the ERO protocol through BAN-logic. For this goal, BAN-logic is extended to consider the address tests on the mobile nodes's CoA and HoA. It is expected that the analysis presented in this paper will be useful for the formal verifications on the security protocols related to MIPv6.

Implementation of Personal Certification Using i-PIN Service (i-PIN 서비스를 활용한 인증 서비스 구현)

  • Kim, Hyun-Joo;Shin, In-Chul;Lee, Soo-Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.117-128
    • /
    • 2012
  • Recently IT infrastructure plays a central role in the base of the society. However, use of personal registration number on internet sites has become a major factor increasing danger of leaking of personal information. Currently, the government is recommending various information protection services in order to prevent the collection of personal registration numbers and leaking of personal information on the internet. Among them, i-PIN service is the one recommended for minimal use of personal registration numbers on the internet. Although i-PIN can be used as a way to substitute personal registration numbers on the internet, there are certain limitations in using i-PIN as the only key to recognize individuals. This study proposes organization of web system in which self certification can be conducted using i-PIN as a tool for personal certification. Also its usability and stability have been verified through performance test when i-PIN service is linked with web service and used as personal certificate. But i-PIN service is unavailable if obstacles occur in providers of i-PIN self certification. To settle this inconvenience, the study also proposes how to cope with such obstacles.