• Title/Summary/Keyword: Group signature

Search Result 137, Processing Time 0.025 seconds

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.

A Secure Bluetooth Piconet using Non-Anonymous Group Keys (비익명성 그룹키를 이용한 안전한 블루투스 피코넷)

  • 서대희;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.222-232
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth has weaknesses in its suuity features when its in security services are applied to Home networks. The purpose of this study is to propose a safe Bluetooth scenario with an upgraded suity feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet what is created by using ECDSA and group key in the ACL(Asynchronous Connection-less Link) connection through a safe Bluetooth inquiry process.

Design of a Mobile DAA Model through Java Test Module for the DAA Protocol (DAA 자바 실험모듈 구현을 통한 모바일 DAA 모델 설계)

  • Yang, Seok-Hwan;Lee, Ki-Yeal;Chung, Mok-Dong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.773-777
    • /
    • 2008
  • Today's mobile devices have characteristic of random mobility in the heterogeneous networks. Thus they should have various kinds of security requirements. To satisfy these requirements, there are many researches on security and authentication for mobile devices. TCG(Trusted Computing Group) designed TPM(Trusted Platform Module) for providing privacy and authentication to users. Also TCG suggest a protocol, called DAA(Direct Anonymous Attestation) which uses zero knowledge proof theory. In this paper, we will implement DAA protocol using Java and show the efficiency and the problems in the DAA protocol. Finally, we will suggest an efficient mobile DAA model through Java test module for the DAA protocol.

Identification of Attack Group using Malware and Packer Detection (악성코드 및 패커 탐지를 이용한 공격 그룹 판별)

  • Moon, Heaeun;Sung, Joonyoung;Lee, Hyunsik;Jang, Gyeongik;Kwak, Kiyong;Woo, Sangtae
    • Journal of KIISE
    • /
    • v.45 no.2
    • /
    • pp.106-112
    • /
    • 2018
  • Recently, the number of cyber attacks using malicious code has increased. Various types of malicious code detection techniques have been researched for several years as the damage has increased. In recent years, profiling techniques have been used to identify attack groups. This paper focuses on the identification of attack groups using a detection technique that does not involve malicious code detection. The attacker is identified by using a string or a code signature of the malicious code. In addition, the detection rate is increased by adding a technique to confirm the packing file. We use Yara as a detection technique. We have research about RAT (remote access tool) that is mainly used in attack groups. Further, this paper develops a ruleset using malicious code and packer main feature signatures for RAT which is mainly used by the attack groups. It is possible to detect the attacker by detecting RAT based on the newly created ruleset.

An Intercell Interference Reduction Technique for OFDM-based Cellular Systems Using Virtual Multiple Antenna (OFDM 기반 셀룰러 시스템에서 가상 다중안테나를 이용한 셀간 간섭 감쇄 기법)

  • Lee Kyu-In;Ko Hyun-Soo;Ahn Jae-Young;Cho Yong-Soo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.3 s.345
    • /
    • pp.32-38
    • /
    • 2006
  • In this paper, an intercell interference (ICI) reduction technique is proposed for OFDM-based cellular systems using the concept of virtual multiple antenna where multiple antenna techniques are performed on a set of subcarriers, not on the actual antenna array. The proposed technique is especially effective for user terminals with a single antenna at cell boundary in fully-loaded OFDM cellular systems with a frequency reuse factor equal to 1. Proposed ICI reduction techniques developed for SISO and MISO environments are shown to be robust to symbol timing offsets and efficient for various cell environments by adjusting group size depending on the number of adjacent cells. Also, the concept of a virtual signature randomizer (VSR) is introduced to improve channel separability in the virtual MIMO approach. It is shown by simulation that the proposed techniques are effective in reducing ICI and inter-sector interference compared with the conventional methods.

Proteomic studies of putative molecular signatures for biological effects by Korean Red Ginseng

  • Lee, Yong Yook;Seo, Hwi Won;Kyung, Jong-Su;Hyun, Sun Hee;Han, Byung Cheol;Park, Songhee;So, Seung Ho;Lee, Seung Ho;Yi, Eugene C.
    • Journal of Ginseng Research
    • /
    • v.43 no.4
    • /
    • pp.666-675
    • /
    • 2019
  • Background: Korean Red Ginseng (KRG) has been widely used as an herbal medicine to normalize and strengthen body functions. Although many researchers have focused on the biological effects of KRG, more studies on the action mechanism of red ginseng are still needed. Previously, we investigated the proteomic changes of the rat spleen while searching for molecular signatures and the action mechanism of KRG. The proteomic analysis revealed that differentially expressed proteins (DEPs) were involved in the increased immune response and phagocytosis. The aim of this study was to evaluate the biological activities of KRG, especially the immune-enhancing response of KRG. Methods: Rats were divided into 4 groups: 0 (control group), 500, 1000, and 2000 mg/kg administration of KRG powder for 6 weeks, respectively. Isobaric tags for relative and absolute quantitation was performed with Q-Exactive LC-MS/MS to compare associated proteins between the groups. The putative DEPs were identified by a current UniProt rat protein database search and by the Gene Ontology annotations. Results: The DEPs appear to increase the innate and acquired immunity as well as immune cell movement. These results suggest that KRG can stimulate immune responses. This analysis refined our targets of interest to include the potential functions of KRG. Furthermore, we validated the potential molecular targets of the functions, representatively LCN2, CRAMP, and HLA-DQB1, by Western blotting. Conclusion: These results may provide molecular signature candidates to elucidate the mechanisms of the immune response by KRG. Here, we demonstrate a strategy of tissue proteomics for the discovery of the molecular function of KRG.

Shear bond strength of ceramic and resin brackets used with visible light-cured adhesives (도재 및 레진 브라켓에 대한 광중합 접착제의 전단 접착 강도)

  • Hwang, Yu-Sun;Row, Joon;Hwaang, Chung-Ju
    • The korean journal of orthodontics
    • /
    • v.26 no.2 s.55
    • /
    • pp.233-244
    • /
    • 1996
  • The purpose of this study was to compare the shear bond strength obtained from ceramic and plastic brackets bonded with various light-cured adhesives and to evaluate their debonded failure sites. Plastic brackets, Transcend 6000, Signature and Starflre TMB brackets were bonded with Orthobond, Light Bond and Transbond on one hundred forty extracted human premolar teeth as manufacturer's descriptions. After thermocycling the brackets were debonded with an Instron universal testing machine and the debonded bracket base surfaces were inspected under stereoscope to evaluate the failure sites. Also the shear bond strength and failure patterns with different curing time and with two different source of light were compared. The results were as follows. 1. There were no statistically significant differences among the mean shear bond strength of Orthobond, Light Bond and Transbond in a same bracket group except Plastic bracket group(p<0.05). 2. The mean shear bond strength of each adhesive with different bracket groups showed statistically significant differences. Stafire TMB showed the highest shear bond strenght among the brackets in this study, but there was no statistically singnificant difference with Transcend 6000 while there was statistically significant difference with Signature.(p<0.05) 3. The various bonding failure patterns were occurred among different bracket groups but most of failure sites were bracket base -adhesive interfaces. 4. There were no statistically significant differences in shear bond strength between the groups with curing time of 10 second and 20 second, and between the groups with two different sources of light as long as sufficient light intensity(above $400mWcm^2$) were provided(p<0.05). According to the result, it should be considered in clinical use of ceramic bracket with light-cured adhesives that the shear strengths of ceramic brackets were influenced by the retention from of bracket base as well as the composition of bracket and there was no difference in the shear bond strenght among various light-cured adhesives used in this study.

  • PDF

A Study on the Group Routing Algorithm in DHT-based Peer-to-Peer System (DHT 기반 P2P 시스템을 위한 그룹 라우팅 알고리즘에 관한 연구)

  • Park, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.111-120
    • /
    • 2012
  • As the P2P System is a distributed system that shares resources of nodes that participate in the system, all the nodes serve as a role of server and client. Currently, although systematic, structured P2P systems such as Chord, Pastry, and Tapestry were suggested based on the distributed hash table, these systems are limited to $log_2N$ for performance efficiency. For this enhanced performance efficiency limited, the article herein suggests group routing algorithm. The suggested algorithm is a node-to-group routing algorithm which divides circular address space into groups and uses a concept of pointer representing each group, which is an algorithm where routing is performed based on pointer. To evaluate algorithm performance, a comparative analysis was conducted on average hops, routing table size, and delayed transmission for chord and routing, a signature algorithm in P2P systems. Therefore, enhanced performance is verified for comparative items from the simulation results.

What's the Best Technique on Menu Analysis? (메뉴 분석 방법론의 비교 연구)

  • 이해영;양일선;도현욱;신서영
    • Journal of Nutrition and Health
    • /
    • v.36 no.3
    • /
    • pp.319-326
    • /
    • 2003
  • The purposes of this study were to : (a) analyze the menus of food service operations using the menu analysis techniques of Kasavana & Smith, Miller, Merricks & Jones, Pavesic and Uman, (b) closely examine the characteristics of the five analysis techniques. Calculations for the menu analysis were done by computer using the MS 2000 Excel spreadsheet program. Menu mix% and unit contribution margin were used as variables by Kasavana & Smith, sales volume and food cost% by Miller, sales volume and cash contribution by Merrick & Jones, weighted contribution margin and food cost% by Pavesic, and total cash contribution and unit contribution margin by Uman. In each case, a four-cell matrix was created, and menu items were located in each according they achieved high or low scores with respect to two variables. Items that scored favorably on both variables were rated in the top category (e.g., star, prime, signature, group A, winner) and those that scored below average on both were rated in the lowest category (e.g., dog, problem, loser, group D, loser). While the 3 methods of Kasavana & Smith, Miller, Merrick & Jones focus on customers' viewpoints, the others consider the managers' viewpoints. Therefore, it is more likely to be desirable for decision-making on menus if the menu analysis technique chosen is suited to its purpose.

An Improved One Round Authenticated Group Key Agreement (개선된 원 라운드 인증 그룹 키 합의 프로토콜)

  • Kim, Ho-Hee;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.3-10
    • /
    • 2013
  • Several identity-based and authenticated key agreement protocols have been proposed. It remains at issue to design secure identity based and authenticated key agreement protocols. In this paper, we propose a one round authenticated group key agreement protocol which uses one more key pair as well as the public key and private key of typical IBE(Identity-Based Encryption) system. The proposed protocol modified Shi et al.'s protocol and He et al.'s protocol. The public and private keys and the signature process of our protocol are simpler than them of their protocols. Our protocol is secure and more efficient than their protocols in communication and computation costs.