• Title/Summary/Keyword: Anonymous

Search Result 434, Processing Time 0.033 seconds

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

Simplified ANonymous Dynamic Source Routing Scheme for Ad-hoc Networks (SANDSR) (애드혹 네트워크에서의 간소화된 익명성 DSR 기법)

  • Kong, Chun-Um;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1102-1103
    • /
    • 2007
  • 적대적이고 급변하는 애드혹 네트워크에서 각 노드들은 항상 적대적인 공격자들로부터 위조나 변조의 공격을 받을 수 있어서 통신 내용과 경로의 보안성이 필요하다. AnonDSR 기법은 보안성을 유지하면서 익명성을 효율적으로 보장하는 것으로 알려져 있지만 기존 기법에 비해 암호키를 설립하는 추가적인 절차를 수행하므로 통신 수행시간이 길어지는 문제가 발생한다. 제안 기법에서는 암호키 설립 단계와 통신경로를 설정하는 단계를 동시 수행하고 데이터 전송시에는 공유키로 암호화를 추가적으로 수행해서 보안 강도를 높인다. 결과적으로 제안기법은 AnonDSR 에 비해 매번 통신 수행시간이 최대 31% 향상되고 보안성도 강화된다.

  • PDF

A distributed algorithm for the coordination of dynamic barricades composed of autonomous mobile robots

  • Lee, Geun-Ho;Defago, Xavier;Chong, Nak-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2030-2035
    • /
    • 2005
  • In this paper, we study the distributed coordination of a set of synchronous, anonymous, memoryless mobile robots that can freely move on a two-dimensional plane but are unable to communicate directly. Based on this model, we analyze the application problem that consists in having a group of robots form a barricade line to protect from car traffic a crowd of demonstrators parading on the street. For the sake of robustness, we privilege fully decentralized solutions to the problem. In particular, we give a self-stabilizing distributed algorithm to address the problem, in this presentation

  • PDF

A Study on the Trust Building of Trusted Third Parties in e-Trade (제3자 신뢰기관의 전자무역 신뢰구축에 관한 연구)

  • Cho, Won-Gil;Shin, Seung-Man
    • International Commerce and Information Review
    • /
    • v.6 no.3
    • /
    • pp.159-180
    • /
    • 2004
  • This paper focus on building online trust in electronic commerce between partner that have never traded with each other before, the so-called first trade situation. For this, this paper proposes the model to build trust for conduction first trade transaction in e-trade(so-ca1led Trust Matrix Model : TMM). The TMM is based on the idea that for business to business electronic trade a balance has to be found between anonymous procedural trust, i.e. procedural solutions for trust building, and personal trust based on positive past experiences within for first trade situation, because of the lack of experience in these situations. The procedural trust solutions are related in the notion of institution-based trust, because the trust in the procedural solutions depends on the trust one has in the institutions that issued or enforces the procedure. The TMM can be used as a tool to analyze and develope trust-building services to help organizations conduct first -trade electronic trade.

  • PDF

A Preliminary Study on the Emotional Child Abuse Reported by the Children (아동이 평가한 부모의 정서적 아동학대에 관한 예비연구)

  • 고성혜
    • Journal of the Korean Home Economics Association
    • /
    • v.27 no.3
    • /
    • pp.161-171
    • /
    • 1989
  • The purposes of this study are to find out the recent trends of child abuse which is reported by children, and to investigate the relations between emotional and verbal child abuse and socio-psycological variables. The subjects were 196 children in a public elementary school in Seoul (5th grade). They completed an anonymous questionnaire. The major findings are as follows: 1. Most of the children in the survey reported that their parents didn't abuse them. But there were significant differences in the frequency of child abuse with their mother and father. 2. Emotional and verbal child abuse differed significantly by the level of socioeconomic status, child's personality, parent's personality, marital dispute. But child abuse was not related to the sex of children.

  • PDF

Analysis of Anonymous P2P System (익명성을 제공하는 P2P 시스템 비교 분석)

  • Kim, Hyun-Cheol;Kim, Bum-Han;Lee, Dong-Hoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.3-5
    • /
    • 2008
  • Peer-to-Peer 네트워크는 사용자들이 컨텐츠를 공유하고 배포하기 위한 매우 유용하고 널리 알려진 클라이언트-클라이언트 네트워크이다. 근래에 다양한 방송 컨텐츠들이 생겨나고 광고 수익을 얻기 위한 기업들의 전략과 컨텐츠를 필요로 하는 사용자들의 요구사항이 맞아 떨어지면서 새로운 수익 구조가 발생하였다. 이러한 컨텐츠를 사용자들이 공유하고 배포하기 위한 수단으로 P2P 네트워크가 가장 효과적인 방법이다. P2P 네트워크에서는 사용자들의 정보가 드러나지 않도록 익명성을 제공하는 것이 관건이다. 본 논문에서는 서로 다른 접근을 통해 익명성을 제공하는 P2P 시스템을 비교 분석하고 P2P 네트워크에서 가능한 공격들을 다루고 이를 막기 위한 대응 방법을 알아본다.

  • PDF

A Study on the Floral Pattern in Baroque Textile (Baroque직물에 나타난 Floral 패턴의 텍스타일 디자인 연구)

  • Lee, Sun-Hwa;Kwon, Young-Suk
    • Fashion & Textile Research Journal
    • /
    • v.4 no.2
    • /
    • pp.117-127
    • /
    • 2002
  • Patterns presented at baroque were mostly floral pattern. Abstract anonymous flower, tulip, Acandus leaf, pomegranate were blended with one another and had a distinct leaning toward continuation and repetition. Components of design could be classified into flower and leaf, flower and fruit, flower and circumferential ornament, bunch of flowers, flower and pot, flower and geometry, and flower and animal. Floral patterns in this era were mostly fullness type being large, simple, and having more formalized motive and were fronted with unit type and vine shape. Unit type shows reflection of baroque style which aims to present absolute unification rather than freedom, which was inherent property of baroque style, by using symmetric pattern. Vine type were unfolded with C type curved line which was main characteristics of that time and showed flowage as a whole and pliable beauty. Floral pattern was filled the whole surface of fabric, thus background of fabric can not be discerned. So, it showed extreme decorative tendency and lavishness.

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

Cooperative and Collaborative Learning through Reciprocal Peer Tutoring in EFL University Reading Instruction

  • Jeong, Kyeong-Ouk
    • English Language & Literature Teaching
    • /
    • v.17 no.4
    • /
    • pp.75-95
    • /
    • 2011
  • The purpose of this study was to evaluate a group activity, reciprocal peer tutoring (RPT), in order to investigate advantages and challenges of RPT in promoting cooperative and collaborative learning environment for EFL University reading instruction. The participants in this study were 89 students taking an English reading course at a Korean university. RPT is a learning strategy whereby learners help each other and learn by teaching. This program was supported by a Vygotskyan perspective which assumes that learners gain mastery and develop cognitive skills through social interaction with more proficient others and their environment. This study relied particularly on participant perceptions through questionnaire survey and Anonymous Online class Report of the course. This study showed various advantages for tutors such as learning through teaching and becoming more autonomous and responsible for their own learning. Non-threatening and highly motivating learning atmosphere are parts of benefits for tutees. Other advantages for tutees included improved level of academic self-confidence, and motivation. This study also revealed several drawbacks associated with the problem of inaccuracy in students' production and students' demand for more direct teacher role. (182 words).

  • PDF

Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

  • Jung, Jaewook;Moon, Jongho;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3720-3746
    • /
    • 2017
  • At present, numerous hospitals and medical institutes have implemented Telecare Medicine Information Systems (TMIS) with authentication protocols to enable secure, efficient electronic transactions for e-medicine. Numerous studies have investigated the use of authentication protocols to construct efficient, robust health care services, and recently, Liu et al. presented an authenticated key agreement mechanism for TMIS. They argued that their mechanism can prevent various types of attacks and preserve a secure environment. However, we discovered that Liu et al.'s mechanism presents some vulnerabilities. First, their mechanism uses an improper identification process for user biometrics; second, the mechanism is not guaranteed to protect against server spoofing attacks; third, there is no session key verification process in the authentication process. As such, we describe how the above-mentioned attacks operate and suggest an upgraded security mechanism for TMIS. We analyze the security and performance of our method to show that it improves security relative to comparable schemes and also operates in an efficient manner.