• Title/Summary/Keyword: Dual Security

Search Result 143, Processing Time 0.026 seconds

Attribute Set Based Signature Secure in the Standard Model

  • Li, Baohong;Zhao, Yinliang;Zhao, Hongping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1516-1528
    • /
    • 2015
  • We introduce attribute set based signature (ASBS), a new cryptographic primitive which organizes user attributes into a recursive set based structure such that dynamic constraints can be imposed on how those attributes may be combined to satisfy a signing policy. Compared with attribute based signature (ABS), ASBS is more flexible and efficient in managing user attributes and specifying signing policies. We present a practical construction of ASBS and prove its security in the standard model under three subgroup decision related assumptions. Its efficiency is comparable to that of the most efficient ABS scheme.

Implementations of Wireless DVR System on Koinonia Technology (Koinonia 기반 무선 DVR 시스템의 구현)

  • Kim, Yong-Sung;Cho, Jin-Woong;Hong, Dae-Ki
    • Journal of the Semiconductor & Display Technology
    • /
    • v.12 no.1
    • /
    • pp.9-14
    • /
    • 2013
  • In this paper, we first introduce a Koinonia technology. Then we present a wireless Digital Video Recorder (DVR) system based on the Koinonia technology. In addition we implement the wireless DVR system, which is composed of Wireless DVR-Slave (WDVR-S), Wireless DVR-Access Point (WDVR-AP), and Wireless DVR-Emergence Management System (WDVR-EMS). Also we present the acquired Korea Communication Commission (KCC) mark for the last products. The developed system will give a hint that the Koinonia technology can be adopted in wireless DVR systems to handle safety and security issues.

The Strategic Plan for Preparedness and Response to Bioterrorism in Korea (우리나라의 생물테러 대비 및 대응방안)

  • Hwang, Hyun-Soon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.41 no.4
    • /
    • pp.209-213
    • /
    • 2008
  • Following the Anthrax bioterrorism attacks in the US in 2001, the Korean government established comprehensive countermeasures against bioterrorism. These measures included the government assuming management of all infectious agents that cause diseases, including smallpox, anthrax, plaque, botulism, and the causative agents of viral hemorrhagic fevers (ebola fever, marburg fever, and lassa fever) for national security. In addition, the Korean government is reinforcing the ability to prepare and respond to bioterrorism. Some of the measures being implemented include revising the laws and guidelines that apply to the use of infectious agents, the construction and operation of dual surveillance systems for bioterrorism, stockpiling and managing products necessary to respond to an emergency (smallpox vaccine, antibiotics, etc.) and vigorously training emergency room staff and heath workers to ensure they can respond appropriately. In addition, the government's measures include improved public relations, building and maintaining international cooperation, and developing new vaccines and drugs for treatments of infectious agents used to create bioweapons.

Analysis of Policies in Activating the Infectious Disease Specialist Network (IDSN) for Bioterrorism Events (생물테러 대비 감염전문가 네트워크 운영 활성화 방안 연구)

  • Kim, Yang-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.41 no.4
    • /
    • pp.214-218
    • /
    • 2008
  • Bioterrorism events have worldwide impacts, not only in terms of security and public health policy, but also in other related sectors. Many countries, including Korea, have set up new administrative and operational structures and adapted their preparedness and response plans in order to deal with new kinds of threats. Korea has dual surveillance systems for the early detection of bioterrorism. The first is syndromic surveillance that typically monitors non-specific clinical information that may indicate possible bioterrorism-associated diseases before specific diagnoses are made. The other is infectious disease specialist network that diagnoses and responds to specific illnesses caused by intentional release of biologic agents. Infectious disease physicians, clinical microbiologists, and infection control professionals play critical and complementary roles in these networks. Infectious disease specialists should develop practical and realistic response plans for their institutions in partnership with local and state health departments, in preparation for a real or suspected bioterrorism attack.

Evaluation of ALOS PALSAR Interferometry in the West Coast of Korea;Preliminary Results

  • Choi, Jung-Hyun;Lee, Chang-Wook;Won, Joong-Sun
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.25-28
    • /
    • 2007
  • Precise digital elevation model (DEM) is an important issue in coastal area where DEMs in a time series are especially required. Although LIDAR system is useful in coastal regions, it is not yet popular in Korea mainly because of its high surveying cost and national security reasons. Recently, precise coastal DEM have been made using radar interferometry, waterline method. One of these methods, Spaceborne imaging radar interferometry has been widely used to measure the topography and deformation of the Earth. We acquired ALOS PALSAR FBD mode (Fine Beam Dual) data for evaluating the quality of interferograms and their coherency. The purpose of this study is construction of DEM using the ALOS PALSAR data using radar interferometry and analysis of surface characteristics by coherence and magnitude map over the Ganghwado and Siwha tidal flats and near coastal lands.

  • PDF

A Current Differential Relaying Algorithm for Power Transformers Using an Advanced Compensation Algorithm of CTs (잔류자속에 무관한 전류보상 알고리즘을 적용한 변압기 보호용 전류차동 계전방식)

  • Kang, Y.C.;Lim, U.J.;Yun, J.S.;Jin, E.S.;Won, S.H.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.314-316
    • /
    • 2003
  • To prevent maloperation during magnetic inrush and over-excitation, a current differential relay for power transformers uses harmonic current based restraining or blocking scheme; it also uses dual slope characteristics to prevent maloperation for an external fault with CT saturation. This paper proposes a current differential relaying algorithm for power transformers with an advanced compensation algorithm for the secondary current of CTs. The comparative study was conducted with and without the compensating algorithm. The algorithm can reduce the operating time of the relay in the case of an internal fault and improve security for external faults.

  • PDF

Combination-mode BLE Device Profile for Connection & Non-connection Methods

  • Jiang, Guangqiu;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.897-899
    • /
    • 2016
  • In recent years, BLE technology has received extensive attention and has been applied to all aspects of life. The existing BLE device has two methods, one is the connection method, and the other is a non-connection method. The representative profile of the connection method is the proximity file. The most typical example of Non-connection method BLE device is a beacon. However, they are both independent and have their own shortcomings. Connection method device can provide service for only one user, others can't use. Security performance of Non-connection method BLE device is poor and the device can't be controlled by the user. In this paper, a combination-mode BLE device profile design scheme is presented, which combines with the previous two methods, and solves the defaults. And We define a dual purpose advertising package that can be used in a normal environment as well as in a disaster environment. Finally, a unidirectional Control idea is proposed. Through performance evaluation, we found that the device has strong stability and low power consumption.

OSS (Open Source Software) Usage Considerations and Verification Method (OSS 활용 고려사항과 검증 방법)

  • Park, J.H.;Park, Y.S;Kim, H.K.;Kim, Y.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.142-153
    • /
    • 2019
  • In this paper, we focus on the process of using open source software (OSS) and factors that should be considered when using project-based OSS. We also elaborate on how to avoid using OSS licenses in an OSS-based technology development process, why dual OSS licenses and security threats should be avoided, and the method of notification after use. In addition, the OSS license verification method and environment are described in the course of project development. In the verification method, the OSS license used for technology development in the course of project execution is validated in advance by the person who decides whether or not to use the OSS, and then additional verification using the tool after technology development. It is expected that this paper will be helpful for establishing the OSS usage consideration and the license verification procedure, and environment in the future.

A School Guide System Using NFC Tag (NFC를 이용한 학교안내 시스템)

  • Lee, Dong-ho;Jung, Won-young;Sim, Yu-jin;Hwang, Soyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.124-126
    • /
    • 2014
  • The NFC technology is contactless communication technology that one of the RFID/USN technology. NFC is available dual function that read and write without specified reader, and it is received attention because of high security and low price. This paper proposes design of a school guide system using NFC tag. First School visitants such as delivery man or the other person are confused about the location of building, so this system will be helpful in this situation.

  • PDF

격자 기반 양자내성암호 Crystals-Kyber/Dilithium 안전성 분석 동향

  • Sokjoon Lee
    • Review of KIISC
    • /
    • v.33 no.1
    • /
    • pp.31-39
    • /
    • 2023
  • 1994년 피터 쇼어에 의해, 대규모 큐비트 연산이 가능한 양자 컴퓨터가 개발된다면 RSA와 같은 현재 공개키 암호 알고리즘이 공격을 당할 수 있음을 이론적으로 가능하게 해주는 쇼어 알고리즘이 소개된 이후, 공개키암호시스템의 붕괴에 대한 가능성은 점점 현실로 다가오고 있다. 물론, 공개키암호시스템은 향후 10~20년은 여전히 안전할 가능성이 높지만, NIST는 최악의 상황에 대비하여 2017년부터 양자내성암호(Post-Quantum Cryptography)에 대한 표준화 작업을 수행하고 있으며, 2022년 4종의 표준화 대상 알고리즘을 선정한 바 있다. 이 중에서도 NIST는 Crystals-Kyber(PKE/KEM)와 Crystals-Dilithium(DSA)를 기본 알고리즘으로 언급하며 우수한 성능과 강한 보안성으로 대부분의 응용에서 잘 동작할 것이라고 예측한 바 있다. 이들 알고리즘은 3라운드의 경쟁 알고리즘 대비 보안 강도가 다소 약한 측면에 있었음에도 우수한 성능, 다양한 환경에서의 적용 가능성 등에 따라 선정된 것으로 보인다. 그럼에도 최근 일부 연구에서는 하이브리드 Dual 공격을 제안함으로써 최초 주장하는 보안 강도와 비교하여 안전성이 더 약화될 가능성이 제기된 바 있다. 본 논문에서는 이들 알고리즘에 대한 안전성 분석 방법을 살펴보고, 최근 논문에서 제기된 새로운 안전성 분석 방법과 그에 따르는 보안 강도를 분석한다.