• 제목/요약/키워드: Attack

검색결과 6,391건 처리시간 0.03초

A Study on Chloride Attack Resistibility in Light Weight Aggregate Concrete and Normal Weight Aggregate Concrete (보통 콘크리트와 인공경량골재 콘크리트의 염해 저항성에 관한 실험적 연구)

  • Lee, Chang-Soo;Nam, Chang-Sik;Yoo, Bo-Sun
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 한국콘크리트학회 2010년도 춘계 학술대회 제22권1호
    • /
    • pp.197-198
    • /
    • 2010
  • The purpose of this study is to compare chloride attack resistibility of light weight aggregate concrete to chloride attack resistibility of normal concrete and confirm the utility. As a result, light weight aggregate concrete's chloride attack resistibility is lower than normal concrete's chloride attack resistibility.

  • PDF

Client-Side Deduplication to Enhance Security and Reduce Communication Costs

  • Kim, Keonwoo;Youn, Taek-Young;Jho, Nam-Su;Chang, Ku-Young
    • ETRI Journal
    • /
    • 제39권1호
    • /
    • pp.116-123
    • /
    • 2017
  • Message-locked encryption (MLE) is a widespread cryptographic primitive that enables the deduplication of encrypted data stored within the cloud. Practical client-side contributions of MLE, however, are vulnerable to a poison attack, and server-side MLE schemes require large bandwidth consumption. In this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces the amount of traffic to be transmitted over a network, and requires fewer cryptographic operations to execute the protocol. The proposed primitive was analyzed in terms of security, communication costs, and computational requirements. We also compared our proposal with existing MLE schemes.

A NUMERICAL STUDY OF FLOWFIELD AT A SUPERSONIC INLET BY CHANGING ANGLES OF ATTACK AND CHANNEL LENGTH (초음속 흡입구의 통로길이와 받음각에 따른 유동장 변화 연구)

  • Ryu, K.J.;Lim, S.;Kim, S.D.;Song, D.J.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 한국전산유체공학회 2010년 춘계학술대회논문집
    • /
    • pp.21-27
    • /
    • 2010
  • The flow characteristics on a supersonic inlet with bleeding system by changing angles of attack and channel length conditions are studied by computational 3D turbulent flow analysis. A compressible upwind flux difference splitting Navier-Stokes method with $k-{\omega}$ turbulence model is used to analysis the inlet flowfield. More non-uniform flowfields are shown at the AIP when angle of attack becomes bigger and bigger. These non-uniform flowfield works the performance aggravating factors of the supersonic engine. Non-uniform flowfield by changing channel length at the various angle of attack are investigated.

  • PDF

An Improved Smart Card-based User Authentication Scheme with Session Key Agreement for Telecare Medicine Information System

  • Yang, Hyungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권3호
    • /
    • pp.35-43
    • /
    • 2017
  • In 2013, Lee-Lie proposed secure smart card based authentication scheme of Zhu's authentication for TMIS which is secure against the various attacks and efficient password change. In this paper, we discuss the security of Lee-Lie's smart card-based authentication scheme, and we have shown that Lee-Lie's authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to overcome these security problems of Lee-Lie's authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved smart card based user authentication scheme for TMIS is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack, the session key generation attack and provides mutual authentication between the user and the telecare system.

Thyroid Indices in Patients with Panic Attack (공황장애 환자에서의 갑상선 지표)

  • Kim, Young-Chul
    • Sleep Medicine and Psychophysiology
    • /
    • 제2권1호
    • /
    • pp.65-72
    • /
    • 1995
  • The author compared indices of thyroid function in 76 patients with panic attack and 80 control subjects. And SCL-90-R was performed to evaluate the relationship between the psychiatric symptoms and thyroid indices in the patients with panic attack The results were as follows: 1). No siginificant differences in T3, T4 or TSH were found between the two groups. But T3 level was significantly lower in male panic patients than male controls(p<0.005). 2) The T3 level was significantly lower in male panic patients who had higher depression socre than average in SCL-90-R(p<0.025). 3) The TSH level was significantly lower in patients with higher anxiety(p<0.001) and phobia(p<0.05) score and in female panic patients(p<0.001) with higher anxiety and phobia score than average in SCL-90-R. 4) The phobic symptom(p<0.001) was siginificantly higher and the T3 level(p<0.005) was lower in the male than the female patients with panic attack.

  • PDF

Asymmetric Vortices around a Body at High Angle of Attack Subsonic Flow (아음속 유동하의 고 받음각 물체 주위의 비대칭 와류 특성 연구)

  • Park, Mee-Young;Kim, Wan-Sub;Lee, Jae-Woo;Park, Soo-Hyung
    • 한국전산유체공학회:학술대회논문집
    • /
    • 한국전산유체공학회 2008년도 춘계학술대회논문집
    • /
    • pp.33-38
    • /
    • 2008
  • Numerical investigation of asymmetric vortices at high angles of attack subsonic flow is performed using three-dimensional Navier-Stokes equations. A small bump has been carefully selected and attached near the nose of an ogive cylinder to simulate symmetric vortices. Selected bump shape does develop asymmetric vortices and is verified using Lamont's experimental results. By changing the angle of attack, Reynolds numbers, and Mach numbers, the characteristics of asymmetric vortices are observed. The angle of attack which contributes significantly to the generation of asymmetric vortices are over 30 degrees. By increasing Mach number and Reynolds number asymmetric vortices, hence the side forces show decreasing trend..

  • PDF

Traffic Monitoring Tool Applicable to IPv6 Environment (IPv6 환경에 적용 가능한 트래픽 모니터링 툴)

  • Lee Hong-Kyu;Kim Sun-Young;Koo Hyang-Ohk;Kim Young-Gi;Oh Chang-Suk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 한국콘텐츠학회 2005년도 춘계 종합학술대회 논문집
    • /
    • pp.97-100
    • /
    • 2005
  • Recently, Internet user grows larger every year. So, It brought about lack of IP address. Because of it, IPv4 is being substituted to IPv6. In this thesis, proposed attack tool in IPv6 base, attack detection tool have algorithm which is consist of 2 steps attack confrontation with analysis packet header data using packet capture. and automatic attack isolation tool against attack using tool.

  • PDF

DDoS Attack Detection using SNMPGET (SNMPGET을 이용한 DDoS 공격 탐지)

  • 박한상;유대성;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 한국콘텐츠학회 2004년도 춘계 종합학술대회 논문집
    • /
    • pp.278-282
    • /
    • 2004
  • Recently traffic flooding attack has happened faster and faster owing to expansion of the worm attack and development of the method of traffic flooding attack. The method in the past time is problematic in detecting the recent traffic flooding attacks, which are running quickly. Therefore, this paper aims to establish the algorithm which reduces the time of detection to traffic flooding attack in collecting and analyzing traffics.

  • PDF

An ID-Based Remote User Authentication Scheme in IoT (사물인터넷에서 ID기반 원격 사용자 인증 방식)

  • Park, KiSung;Lee, SungYup;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • 제18권12호
    • /
    • pp.1483-1491
    • /
    • 2015
  • Applications of Internet of Things (IoT) supply various conveniences, however unsolved security problems such as personal privacy, data manipulation cause harm to persons, even nations and an limit the applicable areas of Internet of IoT technology. Therefore, study about secure and efficient security system on IoT are required. This paper proposes ID-based remote user authentication scheme in IoT environments. Proposed scheme provides untraceability of users by using different pseudonym identities in every session and reduces the number of variables. Our proposal is secure against inside attack, smart card loss attack, user impersonation attack, server masquerading attack, online/offline password guessing attack, and so on. Therefore, this can be applied to the lightweight IoT environments.

Security Analysis of AES-CMAC Applicable to Various Environments (다양한 환경에 적용 가능한 AES-CMAC에 대한 안전성 분석)

  • Jeong, Ki-Tae
    • Journal of Advanced Navigation Technology
    • /
    • 제16권2호
    • /
    • pp.211-218
    • /
    • 2012
  • In this paper, we propose a fault injection attack on AES-CMAC, which is defined by IETF. The fault assumption used in this attack is based on that introduced at FDTC'05. This attack can recover the 128-bit secret key of AES-CMAC by using only small number of fault injections. This result is the first known key recovery attack result on AES-CMAC.