• Title/Summary/Keyword: C2 공격

Search Result 173, Processing Time 0.021 seconds

PayWord System using ID-based tripartite Key Agreement Protocol (ID 기반 키동의 프로토콜을 이용한 PayWord 시스템)

  • 이현주;이충세
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.348-353
    • /
    • 2004
  • Development of an efficient and secure payment system is prerequisite for the construction of electronic payment mechanism in mobile environment. Since current PayWord protocol system generates vendor's certificate for each transaction, it requires lot of operation for transaction. In this paper, we use a session key generated by ID-based tripartite Key agreement protocol which use an Elliptic Curve Cryptosystem over finite field $F_{q}$ for transactions. Therefore, our protocol reduces algorithm operations. In particular, proposed protocol using ID-based public key cryptosystem has the advantages over the existing systems in speed and it is more secure in Man-in-the-middle attacks and Forward secrecy.

Prevalence of Emergency Traumatic Injuries in 100 Wild Boar Hunting Dogs (100마리의 야생 멧돼지 사냥견에서 응급 외상성 질환의 분류)

  • Ko, Jae-Jin;Kim, Se-Hoon;Ji, Joong-Ryong;Shim, Kwan-Seob;Kim, Nam-Soo
    • Journal of Veterinary Clinics
    • /
    • v.27 no.6
    • /
    • pp.718-722
    • /
    • 2010
  • To investigate patterns and severity of hunting-related emergency traumatic injuries in wild boar hunting dogs. One hundred wild boar hunting dogs with emergency traumatic injuries sustained during wild boar hunting as a result of wild boar attack and accidental shooting of ensnarement in a trap. The retrospective study involved 100 dogs brought to CAMC for treatment of emergency traumatic injury sustained during wild boar hunting in Jeon-buk province from August 2007 to April 2008. Medical information obtained from the medical records included signalment; cause of injury; number, location and severity of injuries; and mortality. The 100 patients displayed 136 injuries (single injury in 71 dogs and multiple injuries in 29 dogs). Causes of the emergency traumatic injuries were wild boar attack (n = 92), accidental shooting (n = 7), and entrapment (n = 1). The thoracic area was the most common site of injury. The most common injury severity score (ISS) was code 2. The mortality rate was 9%, and all deaths involved thoracic injury. Emergency traumatic injuries sustained during wild boar hunting are most commonly thoracic injuries caused by prey attack. The nature of the injuries can differ from those typically encountered by small animal veterinarians.

Analysis of Anti-Jamming Techniques for Satellite Navigation Systems (위성항법시스템을 위한 항재밍 기술 분석)

  • Kim, Ki-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1216-1227
    • /
    • 2013
  • GNSS(Global Navigation Satellite System) is now being widely used in both civilian and military applications where accurate positioning and timing information are required and it is considered as a representative convergence technique in IT-Military application techniques. However, GNSS has low sensitivity level of GNSS receivers and is vulnerable to jamming signal, since the signals come from the satellite located at approximately 20,000 Km above the earth. The studies for the anti-jamming techniques in military applications have been passively performed in the domestic, because the information related GNSS are dependent on the countries that have GNSS. In this paper, we show the effect of jammer ERP by analyzing the link budget of GPS J/S power as a function of distance between jammer and receiver. Also, we categorize the anti-jamming techniques based on the functional block diagram of GNSS receiver structure and analyze the recent anti-jamming GNSS products and their technologies developed in domestic and foreign countries.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.

Development of a Simultaneous Seed Separation and Drying Method of Red Pepper -Part II. Dehydration Effect on the Impact Seed Separation of Red Pepper- (고추의 동시탈종(同時脫種) 건조방법(乾燥方法)의 개발(開發)에 관한 연구 -제2보 열풍건조(熱風乾燥)가 고추씨의 충격분리(衝擊分離)에 미치는 영향-)

  • Chun, Jae-Kun;Park, Sang-Ki
    • Korean Journal of Food Science and Technology
    • /
    • v.9 no.1
    • /
    • pp.68-72
    • /
    • 1977
  • Seed separation out of fresh red pepper by impact methods was effective but impossible to separate over 45% of seed. For the increase of seed separation, dehydration effect was studied with the slices of pepper. Heat deformation during the course of drying at hot air of 0. 61m/sec velocity at temperature of $65^{\circ}C$, increased the separation up to 93% with a halfcut pepper. Seed separation was remarkably different upon the location of cut, but it was completed prio tothe completion of drying in every cutting orientations. From these results a simultaneous seed separation and drying operation techniques is successfully developed.

  • PDF

Monitoring the Rate of Frozen Denaturation of Bovine Myosin by Competitive Indirect ELISA Method (Competitive Indirect ELISA를 이용한 Bovine Myosin의 동결 변성도 측정)

  • Kim, Seong-Bae;Lee, Ju-Woon;Park, Jong-Heum;Do, Hyung-Ki;Hyun, Chang-Kee;Shin, Heuyn-Kil
    • Korean Journal of Food Science and Technology
    • /
    • v.30 no.4
    • /
    • pp.862-870
    • /
    • 1998
  • This study shows the application of Ci-ELISA method for monitoring the denaturation of myosin by the frozen treatment in order to differentiate thawed beef from chilled. Hanwoo M.Semitendinosus (n=25) was treated under the two different frozen process as follows; simple frozen treatment (Exp-1) at 4 different temperatures, -10, -20, -50 and $-80^{\circ}C$, respectively, and repeated thawing-refreezing treatment (Exp-2) stored at 4 different temperatures, -10, -20, -50 and $-80^{\circ}C$, respectively. Antibodies (Abs) were produced from rabbits immunized with myosin whole molecule (MWM) isolated from beef round, heavy meromyosin S-1 (S-1) and light meromyosin (LMM) prepared by digestion of MWM. Each immunoglobulin G (IgG) was separated from antiserum. At 6 month storage, IA of anti-MWM IgG for myosin was decreased to 32.67, 32. 23, 51.52 and 34.27% in Exp-1 and to 14.82, 15.61, 25.3 and 23.7% in Exp-2 at -10, -20, -50 and $-80^{\circ}C$, respectively (P<0.05). In Exp-1, the reactivities of anti-LMM IgG were decreased to 25.12, 21.42, 49.05 and 28.96%, and those of Exp-2 were to 11.88, 9.56, 20.63 and 12.64% at -10, -20, -50 and $-80^{\circ}C$, respectively, at 6 times thawing (P<0.05). Conclusively, myosin was denaturated by freezing treatment and LMM or myosin rod part might have suffered from more extreme demage than HMM S-1, and samples at $-50^{\circ}C$ were slightly injured less than others by freezing treatment.

  • PDF

Digital Video Watermarking Using Block Reordering Algorithm Based on DCT (DCT 기반의 블록 재정렬 알고리즘을 이용한 디지털 비디오 워터마킹)

  • Kim Kyoung-Sik;Park Kyung-Jun;Ko Hyung Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.696-705
    • /
    • 2005
  • The rapid progress of the software has enabled individuals to copy and remake digital contents, which was only done by professionals. However, this rapid growth of software has brought many other defects. As a solution to the problems, contents producer needs to have certification and inspection of its contents text and hold the proprietary rights. In this paper, the new video watermarking scheme is proposed which is appropriate for the requirements mentioned for digital video contents and it is applied to MPEG-2 video encoder and decoder. In order to insert watermark sequence for digital video data, watermarking used blocks reordering algorithm and SCL(secret code list). It is satisfied two properties of cryptography that confidentiality and integrity. We test the proposed algorithm to see its performance in terms of watermark capacity, compression robustness and visual quality impact. According to the experiment of proposed watermarking algorithm, we obtained satisfactory results that watermark can still be extracted after MPEG-2 re-encoding at lower bit rates. It is important property for data hiding and user authentication in video data.

Development and Validation of Classroom Problem Behavior Scale - Elementary School Version(CPBS-E) (초등학생 문제행동선별척도: 교사용(CPBS-E)의 개발과 타당화)

  • Song, Wonyoung;Chang, Eun Jin;Choi, Gayoung;Choi, Jae Gwang;ChoBlair, Kwang-Sun;Won, Sung-Doo;Han, Miryeung
    • Korean Journal of School Psychology
    • /
    • v.16 no.3
    • /
    • pp.433-451
    • /
    • 2019
  • This study aimed to develop and validate the Classroom Problem Behavior Scale - Elementary School Version (CPBS-E) measure which is unique to classroom problem behavior exhibited by Korean elementary school students. The focus was on developing a universal screening instrument designed to identify and provide intervention to students who are at-risk for severe social-emotional and behavioral problems. Items were initially drawn from the literature, interviews with elementary school teachers, common office discipline referral measures used in U.S. elementary schools, penalty point systems used in Korean schools, 'Green Mileage', and the Inventory of Emotional and Behavioral Traits. The content validity of the initially developed items was assessed by six classroom and subject teachers, which resulted in the development of a preliminary scale consisting of 63 two-dimensional items (i.e., Within Classroom Problem Behavior and Outside of Classroom Problem Behavior), each of which consisted of 3 to 4 factors. The Within Classroom Problem Behavior dimension consisted of 4 subscales (not being prepared for class, class disruption, aggression, and withdrawn) and the Outside of Classroom Problem Behavior dimension consisted of 3 subscales (rule-violation, aggression, and withdrawn). The CPBS-E was pilot tested on a sample of 154 elementary school students, which resulted in reducing the scale to 23 items. Following the scale revision, the CPBS-E was validated on a sample population of 209 elementary school students. The validation results indicated that the two-dimensional CPBS-E scale of classroom problem behavior was a reliable and valid measure. The test-retest reliability was stable at above .80 in most of the subscales. The CPBS-E measure demonstrated high internal consistency of .76-.94. In examining the criterion validity, the scale's correlation with the Teacher Observation of Classroom Adaptation-Checklist (TOCA-C) was high and the aggression and withdrawn subscales of the CPBS-E demonstrated high correlations with externalization and internalization, respectively, of the Child Behavior Checklist - Teacher Report Form CBCL-TRF). In addition, the factor structure of the CPBS-E scale was examined using the structural equation model and found to be acceptable. The results are discussed in relation to implications, contributions to the field, and limitations.

Experiments on An Network Processor-based Intrusion Detection (네트워크 프로세서 기반의 침입탐지 시스템 구현)

  • Kim, Hyeong-Ju;Kim, Ik-Kyun;Park, Dae-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.319-326
    • /
    • 2004
  • To help network intrusion detection systems(NIDSs) keep up with the demands of today's networks, that we the increasing network throughput and amount of attacks, a radical new approach in hardware and software system architecture is required. In this paper, we propose a Network Processor(NP) based In-Line mode NIDS that supports the packet payload inspection detecting the malicious behaviors, as well as the packet filtering and the traffic metering. In particular, we separate the filtering and metering functions from the deep packet inspection function using two-level searching scheme, thus the complicated and time-consuming operation of the deep packet inspection function does not hinder or flop the basic operations of the In-line mode system. From a proto-type NP-based NIDS implemented at a PC platform with an x86 processor running Linux, two Gigabit Ethernet ports, and 2.5Gbps Agere PayloadPlus(APP) NP solution, the experiment results show that our proposed scheme can reliably filter and meter the full traffic of two gigabit ports at the first level even though it can inspect the packet payload up to 320 Mbps in real-time at the second level, which can be compared to the performance of general-purpose processor based Inspection. However, the simulation results show that the deep packet searching is also possible up to 2Gbps in wire speed when we adopt 10Gbps APP solution.

A Study on the Kinetics and Mechanism of the Hydrolysis of Dihydro-1,4-oxathiin Derivatives (Dihydro-1,4-oxathiin 유도체의 가수분해 Mechanism과 반응속도론적 연구)

  • Lee, Kwang Il;Kwak, Chun Geun;Jang, Byung Man;Kim, Young Ju;Hahn, Hoh Gyu;Nam, Kee Dal;Lee, Ki Chang
    • Journal of the Korean Chemical Society
    • /
    • v.40 no.2
    • /
    • pp.128-134
    • /
    • 1996
  • The kinetics of the hydrolysis of dihydro-1, 4-oxathiin derivatives were investigated by ultraviolet spectrophotometry in H2O at $25^{\circ}C.$ A rate equation which can be applied over a wide pH range was obtained. The substituent effects on the hydrolysis of dihydro-1, 4-oxathiin derivatives were studied and the rate of hydrolysis was shown to be accelerated by electron accepting groups. Final product of the hydrolysis was 2-(2-hydroxyethylthio)acetoacet-anilide enol form. On the basis of rate equations derived and judging from hydrolysis products obtained and from general base effect and substituent effects, plausible mechanism of the hydrolysis in various pH range have been proposed. Below pH 3.5, the hydrolysis was initiated by the protonation and followed by the addition of water to 2-carbon. Above pH 10.0, the hydrolysis was proceeded by the addition of hydroxide to 2-carbon. In the range of pH 4.0∼10.0, the addition of water to dihydro-1,4-oxathiin is rate controlling step.

  • PDF