• Title/Summary/Keyword: Anonymous system

Search Result 92, Processing Time 0.028 seconds

BioCC: An Openfree Hypertext Bio Community Cluster for Biology

  • Gong Sung-Sam;Kim Tae-Hyung;Oh Jung-Su;Kwon Je-Keun;Cho Su-An;Bolser Dan;Bhak Jong
    • Genomics & Informatics
    • /
    • v.4 no.3
    • /
    • pp.125-128
    • /
    • 2006
  • We present an openfree hypertext (also known as wiki) web cluster called BioCC. BioCC is a novel wiki farm that lets researchers create hundreds of biological web sites. The web sites form an organic information network. The contents of all the sites on the BioCC wiki farm are modifiable by anonymous as well as registered users. This enables biologists with diverse backgrounds to form their own Internet bio-communities. Each community can have custom-made layouts for information, discussion, and knowledge exchange. BioCC aims to form an ever-expanding network of openfree biological knowledge databases used and maintained by biological experts, students, and general users. The philosophy behind BioCC is that the formation of biological knowledge is best achieved by open-minded individuals freely exchanging information. In the near future, the amount of genomic information will have flooded society. BioGG can be an effective and quickly updated knowledge database system. BioCC uses an opensource wiki system called Mediawiki. However, for easier editing, a modified version of Mediawiki, called Biowiki, has been applied. Unlike Mediawiki, Biowiki uses a WYSIWYG (What You See Is What You Get) text editor. BioCC is under a share-alike license called BioLicense (http://biolicense.org). The BioCC top level site is found at http://bio.cc/

The Trend of Blockchain in Vietnam and Its Implications for ROK

  • Cho, Hanbum (Albert);Choi, Jack;Nguyen, Huy-Nam;Nguyen, Thi-Hong
    • Journal of Multimedia Information System
    • /
    • v.8 no.3
    • /
    • pp.197-202
    • /
    • 2021
  • Bitcoin and blockchain are often making headlines not only on TV or media but also among the public in today's society. These technologies have been developed after the risk of the centralized financial system came to the fore during the 2007 global financial crisis. Since then, an anonymous inventor called Satoshi Nakamoto penned the bitcoin white paper where a blockchain-based reference implementation was introduced. Bitcoin was able to achieve unprecedented growth by positioning itself as one of the top global currencies in terms of market capitalization after five years since its development. The pace of Vietnam's economic development is notably fast among Asian nations, while the nation was expected to be a Southeast Asian blockchain hub but they have banned virtual currency trading recently. However, they've also designated the State Bank of Vietnam (SBV) as a responsible agency for the research of blockchain-based cryptocurrencies, the construction of a service ecosystem, and their test operations. The fast-growing economy, increasing number of smartphone users, and the Vietnam government's support policies for startups substantiate these efforts. Therefore, this paper attempts to study the current status of Vietnam's blockchain technology that has been considered to be the center of blockchain systems right behind Singapore, and its implications for Korean companies.

A Mobile Multimedia Auction System (모바일 멀티미디어 경매 시스템)

  • Ahn, Hoo-Young;Ryu, Ki-Young;Park, Young-Ho;Ha, Sun-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.320-332
    • /
    • 2007
  • Recently, new interests on digital contents and UCC(User Created Content)s are growing fast through the development of internet. However, there have been many side-effects on those interests. The representative problems are perversing illegal copies and the distributions for personal valuable digital contents to unauthorized anonymous users. These decrease creation of good digital contents by interfering with the growth of information technology industry and the content provider#s creative will. To resolve these problems, in the paper, we propose a novel auction system for multimedia contents and bidding processes. The system applies the concept of used goods onto digital contents. Especially, the auction system is based on mobile environment. Finally, the performance evaluation shows that those main auction process algorithms indicate the time complexity of logarithm scale for insertions and searches. Therefore, the performance of the system is not significantly influenced by the amount of contents even though the volume of contents in the system is increasing.

Opened Problem Bank System with Anonymous Review (익명평가 가능한 개방형 문제은행 시스템)

  • Jang, Hee-suk;Park, Yoo-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.443-449
    • /
    • 2017
  • Opened platform is called that anybody can be a producer and consumer in some platform. And many opened platforms are using in various area such as general goods, smart phone application and contents. In this paper, we will propose the opened platform system for the problems for evaluation the level of learners. Any user can register problems as public or private-type in this system and use them. So our proposed system has the advantage in selecting the high quality problems by continuous reviews about that even after they have been registered. Proposed system has three different modules such as submit, evaluate and produce problems modules. A user can submit various kind of problems in the submit module. The evaluation module is a module that allows the user who is not the problem registrant to evaluate the registered problem. The production module can use the registered problems for online and offline evaluation.

(A New Offline Check System with Reusable Refunds) (거스름의 재사용이 가능한 새로운 오프라인 수표시스템)

  • 김상진;최이화;오희국
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.355-370
    • /
    • 2003
  • In offline check systems, a client does not have to pay the exact amount. Instead, a client refunds the difference between the check value and the paid amount. In most offline systems, clients can not spend the remainder. But if the refund can be made spendable, it would provide a more convenient payment method. In this paper, we present a new offline system, which allows refunds to be reused as payments. In our system, the shop issues a new check using its private key for the difference. This new check, called the refund check, can be spent in the same way as checks issued by the bank. If the refund check is deposited to, or refunded at the bank, the bank charges the issuer of the check for the amount. The form of a check in this system is much simpler than previous check systems. It also uses a more flexible and efficient denomination method. The refund check is unlinkable to the check used in the payment where the refund check was issued. This system provides coin and owner tracing mechanisms to reinforce controls on illegal use of anonymous checks and was designed with consideration to the atomicity of transactions.

Development and Implementation of a Cyber Counseling Service System using Class Homepage (학급 홈페이지를 활용한 사이버 상담실 구축 및 운영)

  • Heo, Hong-Mu;Jo, Mi-Heon
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.1
    • /
    • pp.127-137
    • /
    • 2005
  • The interest in cyber counseling services has been increased recently by needs and merits of cyber counseling service found through various related studies. A cyber counseling service system has not only merits but also demerits such as anonymous one-off access and difficulties of forming relations. In this study, a cyber counseling service system using class homepage was developed and implemented in order to investigate counseling methods that can enhance merits and supplement demerits of cyber counseling services. As a result, it was found that the implementation of a cyber counseling service system using class homepage can fill counseling needs of students, teachers and parents by providing various counseling methods and inducing active interaction using the site-on function. Interesting menu on class homepage was effective to lead students and parents to visit the cyber counseling room, and they prefered the secret board and counseling cases to e-mail counseling. Prior acquisition of information about students and the environment allowing teachers to continuously observe students improved counseling effects and solved problems of existing counseling services.

  • PDF

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

Construction of an Asymmetric Traitor Tracing Schemes with Anonymity (익명성을 보장하는 비대칭 공모자 추적 기법의 설계)

  • Lee, Moonsik;Kang, SunBu;Lee, Juhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1231-1242
    • /
    • 2012
  • Traitor tracing schemes deter traitors from sharing their private keys by tracing at least one of the subscribers who were implicated in the construction of a pirate decoder. In general, it is assumed that the system manager in the scheme generates and distributes the subscribers' private key. But if the system manager knows the subscribers' private keys, he cannot convince a third party of a certain subscriber's piracy. To solve this problem, the system manager should not know the whole parts of subscribers' private keys and this leads to researches of asymmetric schemes. Moreover for the purpose of enhancing subscribers' privacy, there were two proposals of introducing anonymity onto asymmetric traitor tracing schemes, but one of them turned out to be a failure. In this paper, we point out that the other proposal also has flaws. We consider how to introduce anonymity to traitor tracing schemes, as a result, we suggest a new framework which is practical. We also construct a scheme by using an anonymous credential system and an asymmetric traitor tracing scheme. We prove the security of our scheme and consider the typical applications.

A Secure Protocol for the Electronic Auction (전자경매를 위한 보안 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.29-36
    • /
    • 2007
  • Recently, Jaiswal et al. proposed a protocol to improve the multi-agent negotiation test-bed which was proposed by Collins et al. Using publish/subscribe system, time-release cryptography and anonymous communication, their protocol gives an improvement on the old one. However, it is shown that the protocol also has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, anonymity disclosure, collusion between customers and a certain supplier. So proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that the way that market generates random number to the supplier is better than the supplier do by himself in guaranteeing anonymity. Market publishes interpolating polynomial for sharing the determination process data. It avoids collusion between customer and a certain supplie

  • PDF

A Study on the User Acceptance Model of Mass Collective Intelligence (대중 집단지성의 사용자 수용 모형에 관한 연구)

  • Lee, Hyoung-Yong;Ahn, Hyun-Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.4
    • /
    • pp.1-17
    • /
    • 2010
  • As web technologies evolve and so-called Web 2.0 technologies appear, collective intelligence is being applied in widespread areas. In general, mass collective intelligence like Wikipedia is created, revised, and managed by anonymous participants in an uncontrolled system. Thus, the knowledge provided by mass collective intelligence may be distorted, and may not be true, which may affect the user acceptance behavior. However, there have been few academic studies that analyzed the factors that affect user acceptance of mass collective intelligence, and their relationships. Under this academic background, we develop a model to examine how mass collective intelligence is accepted by users. The theoretical model is validated through an online survey of the Wikipedia users from three universities in Korea. The results reveal that the users will have positive attitude towards adopting mass collective knowledge when they perceive that the knowledge from mass collective intelligence is useful. We also find that the perceived usefulness of the knowledge is affected by perceived knowledge quality and trust in knowledge contributors. The results also suggest that perceived knowledge quality is determined by perceived level of collaboration, perceived objectivity, and recipient expertise, whereas trust in knowledge contributors is determined by natural propensity to trust and perceived objectivity. Theoretical and practical implications about mass collective knowledge are discussed.

  • PDF