• Title/Summary/Keyword: DLP

Search Result 225, Processing Time 0.026 seconds

An Anonymous Authentication in the Hierarchy for VANET (VANET 환경을 위한 계층적 구조의 익명 인증 기술)

  • Bae, Kyungjin;Lee, Youngkyung;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.563-577
    • /
    • 2018
  • In order to support secure communication in VANET(Vehicular Ad hoc Network), messages exchanged between vehicles or between vehicle and infrastructure must be authenticated. In this paper, we propose a hierarchical anonymous authentication system for VANET. The proposed system model reduces the overhead of PKG, which is a problem of previous system, by generating private keys hierarchically, thereby enhancing practicality. We also propose a two-level hierarchical identity-based signature(TLHIBS) scheme without pairings so that improve efficiency. The proposed scheme protects the privacy of the vehicle by satisfying conditional privacy and supports batch verification so that efficiently verifies multiple signatures. Finally, The security of the proposed scheme is proved in the random oracle model by reducing the discrete logarithm problem(DLP) whereas the security proof of the previous ID-based signatures for VANET was incomplete.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor (DRM 로그분석을 통한 퇴직 징후 탐지와 보안위협 사전 대응 방법)

  • Hyun, Miboon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.369-375
    • /
    • 2016
  • Most companies are willing to spend money on security systems such as DRM, Mail filtering, DLP, USB blocking, etc., for data leakage prevention. However, in many cases, it is difficult that legal team take action for data case because usually the company recognized that after the employee had left. Therefore perceiving one's resignation before the action and building up adequate response process are very important. Throughout analyzing DRM log which records every single file's changes related with user's behavior, the company can predict one's resignation and prevent data leakage before those happen. This study suggests how to prevent for the damage from leaked confidential information throughout building the DRM monitoring process which can predict employee's resignation.

A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device (모바일 단말을 이용한 Whitelist 기반 비인가 AP 탐지 및 접속 차단 기법)

  • Park, Jungsoo;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.632-640
    • /
    • 2013
  • In this paper, we proposed a system in a wireless LAN environment in case of security threats, the mobile terminal and the remote server-based WLAN security. The security of the wireless LAN environment in the recent technology in a variety of ways have been proposed and many products are being launched such as WIPS and DLP. However, these products are expensive and difficult to manage so very difficult to use in small businesses. Therefore, in this paper, we propose a security system, wireless LAN-based terminal and a remote server using whitelist according to development BYOD market and smartphone hardware. The proposed system that AP and personal device information to be stored on the server by an administrator and Application installed on a personal device alone, it has the advantage that can be Applicationlied to a variety of wireless network environment.

The Usability Assessment of Self-developed Phantom for Evaluating Automatic Exposure Control System Using Three-Dimensions Printing (자동노출제어장치 평가를 위한 3D 프린팅 기반의 자체 제작 팬텀의 유용성 평가)

  • Lee, Ki-Baek;Nam, Ki-Chang;Kim, Ho-Chul
    • Journal of Biomedical Engineering Research
    • /
    • v.41 no.4
    • /
    • pp.147-153
    • /
    • 2020
  • This study was to evaluate the usability of self-developed phantom for evaluating automatic exposure control (AEC) using three-dimensions (3D) printer. 3D printer of fused deposition modeling (FDM) type was utilized to make the self-developed AEC phantom and image acquisitions were conducted by two different type of scanners. The self-developed AEC phantom consisted of four different size of portions. As a result, two types of phantom (pyramid and pentagon shape) were created according to the combination of the layers. For evaluating the radiation dose with the two types of phantom, the values of tube current, computed tomography dose index volume (CTDIvol), and dose length product (DLP) were compared. As a result, it was confirmed that the values of tube current were properly reflected according to the thickness, and the CTDIvol and DLP were not significantly changed regardless of AEC functions of different scanners. In conclusion, the self-developed phantom by using 3D printer could assess whether the AEC function works well. So, we confirmed the possibility that a self-made phantom could replace the commercially expensive AEC performance evaluation phantom.

A USB DLP Scheme for Preventing Loss of Internal Confidential Files (내부 기밀파일 유출 방지를 위한 USB DLP 기법)

  • Shin, Gyu Jin;Jung, Gu Hyun;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2333-2340
    • /
    • 2017
  • Recently industry is suffering severe losses of important internal information, and most of the leaks result from the insiders. Thus, various technological counter measures are being studied in order to protect private organization information. In this paper, among various internal information leakage path protection mechanisms, we propose a technique for preventing files which are defined as confidential from being copied or moved through USB. The implemented confidential file loss prevention system is composed of both signature insert manager and confidential file detect manager. The signature insert manager allows a system administrator to insert a special pattern specifying a classified confidential file, while the confidential file detect manager protects confidential file leakage when a user attempts to move or copy a confidential file to the USB memory. This results would be contributed to reducing the damage caused by leakage of confidential files outside of the company via USB.

User-friendly 3D Object Reconstruction Method based on Structured Light in Ubiquitous Environments (유비쿼터스 환경에서 구조광 기반 사용자 친화적 3차원 객체 재구성 기법)

  • Jung, Sei-Hwa;Lee, Jeongjin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.523-532
    • /
    • 2013
  • Since conventional methods for the reconstruction of 3D objects used a number of cameras or pictures, they required specific hardwares or they were sensitive to the photography environment with a lot of processing time. In this paper, we propose a 3D object reconstruction method using one photograph based on structured light in ubiquitous environments. We use color pattern of the conventional method for structured light. In this paper, we propose a novel pipeline consisting of various image processing techniques for line pattern extraction and matching, which are very important for the performance of the object reconstruction. And we propose the optimal cost function for the pattern matching. Using our method, it is possible to reconstruct a 3D object with efficient computation and easy setting in ubiquitous or mobile environments, for example, a smartphone with a subminiature projector like Galaxy Beam.

A Study on the Radiation Exposure Dose of Brain Perfusion CT Examination a Phantom (Phantom을 이용한 뇌 관류 CT검사에서 방사선 피폭선량에 관한 연구)

  • Jung, Hong-Rynag;Kim, Ki-Jeong;Mo, Eun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.287-294
    • /
    • 2015
  • The purpose of this study, was Let's examine the exposure dose at the time of cerebral blood flow CT scan of acute ischemic stroke patients. In particular, long-term high doses of radiation sensitive organs and we Measured using phantom and a glass dosimeter. Apply the existing protocol suggested by the manufacturer (fixed time delay technique) and the proposed new convergence protocol (bolus tracking technique), reporting to measure the dose, dose reduction was to prepare the way. Results up to 39.8% as compared to the existing protocols in a new suggested convergence protocol, a minimum of 5.8% was long-term dose is reduced. Test dose of $CDTI_{vol}$ and DLP values decreased 25%, respectively, were measured at less than recommended dose. Try checking the protocol set out in the existing based on the analysis result of the above, by applying the proposed new convergence protocol by reducing the dose would have to contribute to improved public health. It is believed to be research continues to find the optimum protocol in the other tests.

Marginal and internal fit of 3D printed provisional crowns according to build directions

  • Ryu, Ji-Eun;Kim, Yu-Lee;Kong, Hyun-Jun;Chang, Hoon-Sang;Jung, Ji-Hye
    • The Journal of Advanced Prosthodontics
    • /
    • v.12 no.4
    • /
    • pp.225-232
    • /
    • 2020
  • PURPOSE. This study aimed to fabricate provisional crowns at varying build directions using the digital light processing (DLP)-based 3D printing and evaluate the marginal and internal fit of the provisional crowns using the silicone replica technique (SRT). MATERIALS AND METHODS. The prepared resin tooth was scanned and a single crown was designed using computer-aided design (CAD) software. Provisional crowns were printed using a DLP-based 3D printer at 6 directions (120°, 135°, 150°, 180°, 210°, 225°) with 10 crowns in each direction. In total, sixty crowns were printed. To measure the marginal and internal fit, a silicone replica was fabricated and the thickness of the silicone impression material was measured using a digital microscope. Sixteen reference points were set and divided into the following 4 groups: marginal gap (MG), cervical gap (CG), axial gap (AG), and occlusal gap (OG). The measurements were statistically analyzed using one-way ANOVA and Dunnett T3. RESULTS. MG, CG, and OG were significantly different by build angle groups (P<.05). The MG and CG were significantly larger in the 120° group than in other groups. OG was the smallest in the 150° and 180° and the largest in the 120° and 135° groups. CONCLUSION. The marginal and internal fit of the 3D-printed provisional crowns can vary depending on the build angle and the best fit was achieved with build angles of 150° and 180°.

The Study of Effectiveness of Volume Mode in Pediatric CT (소아 전산화단층촬영에서 Volume Mode의 유용성 연구)

  • Park, Yun;Kim, Sang-Hyun
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.425-431
    • /
    • 2014
  • The purpose of this study is to analyze dose comparison and image quality evaluation according to Volume and Helical mode using ATOM Phantom. It is to actively use the Volume mode in pediatric CT examinations. There was no significant difference with Helical and Volume in the value of Noise, HU, SNR(p>0.05). All dose values was no statistical difference(p>0.05). In the value of DLP and effective dose by part, Volume mode was measured lower than Helical mode. For qualitative analysis, by scan parameter helical mode showed respectively 2.6, 3.3, 4.36 and Volume mode indicated 2.8, 3.64, 4.44 point. Image evaluation for the follow-up, Helical mode and Volume mode were respectively 3.8 and 3.83. In fact, There was no significant difference. In CT scans in children under 5 years, because 640-MDCT Volume scan dose compared with Helical mode is lower and there is no significant difference with two modes in the image quality, 640-MDCT Volume scan is thought to be useful for pediatric CT scans.