• Title/Summary/Keyword: ID4

Search Result 764, Processing Time 0.028 seconds

On the Security of ID-Based Cryptosystem against Power Analysis Attacks (전력 분석 공격과 ID기반 암호 시스템의 안전성)

  • 양연형;박동진;이필중
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.135-140
    • /
    • 2004
  • The ID-based cryptosystem and Power Analysis Attack are attracting many researchers and have been developed aggressively to date. Especially, DPA (Differential Power Analysis) attack has been considered to be the most powerful attack against low power devices, such as smart cards. However, these two leading topics are researched independently and have little hewn relations with each other. In this paper, we investigate the effect of power analysis attack against ID based cryptosystem. As a result, we insist that ID-based cryptosystem is secure against DPA and we only need to defend against SPA (Simple Power Analysis).

A Study on Channel 4's Station Identification: focused on 'Modular Typography'

  • John, Adjah;Hong, Mi-Hee
    • Cartoon and Animation Studies
    • /
    • s.42
    • /
    • pp.241-262
    • /
    • 2016
  • British TV Channel 4 is one of the famous TV Channel in the world. Its station ID has also played a leading role in the developments of Motion Graphics including station IDs. This station ID's main visual design concept is its name and an iconic logo '4' at the same time. The first channel 4 station ID was designed by using modular typography to construct the iconic '4'. Modular typography is a technique of creating letters with similar elements. Channel 4's station ID was constructed from coloured polygons. The polygons split and converge at the same point in 3D space. Modularity in Channel 4's station ID is evidenced by the similar units of polygons. After the first station ID, Channel 4 was re-branded. Eventhough the station IDs which followed did not use coloured and geometrical polygons, modularity is seen in most of the station IDs especially between 2004 - 2011. In these station IDs, the iconic '4' is formed from similar natural and environmental objects like rocks, buildings, lights etc. In this analysis paper, there is a visual narrative on the history of Channel 4, the concept of modular typography in the original station ID and the application of modular typography in other Channel 4's station IDs.

Abbreviated ID Conflict Management Method for Efficient Data Forwarding on Dynamic IoT Networks (동적 사물인터넷에서 효율적인 데이터 전달을 위한 축약 ID의 충돌 관리 기법)

  • Son, Sanghyun;Jung, Yeonsu;Jeon, Yongsu;Lee, Seungjin;Baek, Yunju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.200-201
    • /
    • 2016
  • Recently, according to era of Internet of Things was opened, various mobile devices connected to the internet using wireless communication. Many IoT devices have limited communication performance. Thus, these devices efficiently forward data using an abbreviated ID method. However, movement of devices causes abbreviated ID confliction, and These conflict degraded network performance. Therefore it is important management of ID conflict. In this paper, we proposed an abbreviated ID conflict management method to improve the efficiency of communication in the dynamic IoT network.

  • PDF

A Naming Technique of the MPEG-4 Object for the Quick Search of the Scene Graph (씬 그래프의 빠른 탐색을 위한 MPEG-4 객체 Naming 기법)

  • 김남영;이숙영;김상욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10d
    • /
    • pp.208-210
    • /
    • 2002
  • 재생기에서 MP4 파일을 재생하기 위해서는 Drawing 정보와 Routing 정보가 필요하다. 기존의 저작도구에서의 객체 Naming은 그 객체와는 상관없이 단순히 문자열과 숫자의 조합으로 되어 있고 실제 화면상에 기술되는 객체의 ID값을 부여하는 방법이었다. 객체 Naming을 구현하는 객체 ID 설정이 이러한 방법이었기 때문에 재생기에서 객체 정보를 구하려면 Scene 그래프를 반복해서 검색하는 load가 발생한다. 본 논문에서는 이러한 load를 줄이기 위해서 비트 연산을 이용한 각 객체의 ID를 부여함으로써 각 객체에 속하는 Attribute의 ID가 자신의 실제 객체의 ID를 추론할 수 있는 방법으로 객체에 대한 Naming을 구현하였다. 이러한 객체 Naming 기법으로 설정된 객체의 ID값은 비트 연산과 시프트 연산을 이용해서 객체 정보를 구할 수 있기 때문에 Scene 그래프 탐색 load를 줄일 수 있다.

  • PDF

ID 관리 기술 몇 시장 동향

  • Cho, Young-Seob;Kim, Soo-Hyung;Jin, Seung-Hun
    • Review of KIISC
    • /
    • v.21 no.4
    • /
    • pp.62-68
    • /
    • 2011
  • 인터넷의 활용이 커짐에 따라 사용자의 식별자와 개인정보를 안전하고 편리하게 관리하는 ID 관리 기술이 필수 기술이 되고 있다. 최근 개인정보의 유출 및 해킹 사고가 국내외적으로 빈번하게 발생함에 이를 방지하기 위한 ID 관리 기술에 대한 필요성이 더욱 커지고 있다. 본 고에서는 ID 관리 기술에 대한 연구 동향을 살펴보고 ID 관리 시장에 대한 국내외 동향에 대하여 기술한다. 또한 최근 스마트폰의 확산에 따라 이슈화되고 있는 모바일 ID 관리 기술에 대하여 기술한다.

Analysis of Stability Condition and Wideband Characteristics of 3D Isotropic Dispersion(ID)-FDTD Algorithm (3차원 ID-FDTD 알고리즘의 Stability Condition과 광대역 특성 분석)

  • Kim, Woo-Tae;Koh, Il-Suek;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.407-415
    • /
    • 2011
  • The stability condition and wideband characteristics of 3D ID-FDTD algorithm which has low dispersion error with isotropic dispersion are presented in this paper. 3D ID-FDTD method was proposed to improve the defect of the Yee FDTD such as the anisotropy and large dispersion error. The published paper calculated the stability condition of 3D ID-FDTD algorithm by using numerical method, however, it is thought that the examples were not sufficient to verify the stability condition. Thus, in this paper, various simulations are included in order to hold reliability under the conditions that the plane wave propagation is assumed with a single frequency and a wideband frequency. Also, the 3D ID-FDTD algorithm is compared to those that have the similar FDTD algorithm with ID-FDTD such as Forgy's method and non-standard FDTD method in a wideband. Finally, the radar cross section(RCS) for the large sphere with high dielectric constant is calculated.

ID-based Sensor Node Authentication for Multi-Layer Sensor Networks

  • Sung, Soonhwa;Ryou, Jaecheol
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.363-370
    • /
    • 2014
  • Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper describes how identification (ID)-based node authentication can be used to solve the key agreement problem in a three-layer interaction. The scheme uses a novel security mechanism that considers the characteristics, architecture, and vulnerability of the sensors, and provides an ID-based node authentication that does not require expensive certificates. The scheme describes the routing process using a simple ID suitable for low power and ID exposure, and proposes an ID-based node authentication. This method achieves low-cost communications with an efficient protocol. Results from this study demonstrates that it improves routing performance under different node densities, and reduces the computational cost of key encryption and decryption.

Comparative Studies on Serological Tests for Actinobacillus pleuropneumoniae Infection in Swine (돼지에서 Actinobacillus pleuropneumoniae의 혈청학적 진단법에 대한 비교연구)

  • 심항섭;우종태;조중현;전무형
    • Korean Journal of Veterinary Service
    • /
    • v.17 no.2
    • /
    • pp.95-113
    • /
    • 1994
  • To establish an effective diagnostic measure for detection of the antibodies against Actinobacillus pleuropneumoniae, the methods for tube agglutination test (TAT), plate agglutination test (PAT), micro-agglutination test(MAT) and agar-gel immunodiffusion test(ID) were improved and standarized, and the comparative studies were carried out. The results obtained through the experiments were summarized as follows. 1. The rabbit hyperimmune sera to reference serotypes 1 to 6 were cross-tested with TAT, PAT, MAT and ID. In the homologous systems, the range of antibody titers in TAT was 80 to 640, showing the cross-reaction in serotypes 3, 4, 5 and 6. The range of antibody titers in PAT was 4 to 64, showing the cross-reaction in serotypes 3, 4, 5 and 6. In ID, the range of antigen titers was 8 to 32, and cross-reaction was observed in serotype 5. 2. The optimal concentration of antigen in PAT and MAT were 100mg /ml and 1.25mg /ml respectively. The most sensitive reaction in MAT was observed in 52$^{\circ}C$ for 18hrs. 3. In ID, the most promising antigen and the buffer for agar-gel were EDTA-treated antigen and 0.05M tris buffer (pH 7.2), respectively. 4. By the tests for 200 swine sera, it was found that the frequency of positive reaction were 203 in TAT, 240 in PAT and 163 in ID. 5. When compared the titers of TAT with those of MAT for 200 swine sera, MAT showed the higher titer than TAT being increased by relative correlation. Int was found that the titer for positive readings were 20 in TAT and 40 in MAT. 6. when compared the results of ID with those of TAT for 200 swine sera, all sera with TAT titer under 10 were negative in ID. Of the sera with TAT titer 20 and 40, 55.1% nd 91.8% were positive in ID, respectively. All sera with TAT titer above 80 were positive in ID. In comparison of ID and MAT, all sera with MAT titer under 20 were negative in ID. Of the sera with MAT titer 40 and 80, 24.7% and 93.9% were positive in ID, respectively. All sera with MAT titer over 160 showed positive in ID. 7. In conclusion, the established MAT showed high sensitivity but low specificity, wherease ID revealed low sensitivity but high specificity.

  • PDF

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

A Study on the Implementation of SAW ID Reader Platform (SAW ID리더 플랫폼 구현에 관한 연구)

  • Yu, Ho-Jun;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.766-771
    • /
    • 2008
  • As the practical range of SAW Device extended into various fields including physical sensor, chemical sensor and ID Tag, the platform for various SAW Devices is required more than ever. While SAW ID or Sensors advanced remarkably, the development of platform which applies to SAW Sensor left much to be desired. Therefore this paper represents the SAW platform in order to use SAW ID such as ID Tag or Sensors more conveniently. The SAW platform consists of a RF module which can recognize SAW ID and a main module which has a hish performance processor in order to process the response signal of SAW ID. The main module which has a high performance processor is designed by GUI environmental type to ensure that users are able to use the platform more easily. In this paper, the SAW platform, which is based on ARM9 core processor, used Windows Embedded CE 6.0 OS which brings friendly interface to users. Also the developers can make less effort to design various applications with sensors.