• Title/Summary/Keyword: Information Verification

Search Result 3,478, Processing Time 0.052 seconds

A Secure and Efficient Way of Node Membership Verification in Wireless Sensor Networks

  • Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1100-1101
    • /
    • 2007
  • This paper proposes an efficient mechanism of node membership verification within the groups of sensors in a wireless sensor network (WSN). We utilize one-way accumulator to check the memberships of the legitimate nodes in a secure way. Our scheme also supports the addition and deletion of nodes in the groups in the network. Our analysis shows that, our scheme could be well-suited for the resource constrained sensors in a sensor network and it provides a lightweight mechanism for secure node membership verification in WSN.

  • PDF

Physical Design Flow & Verification of DVB Compliant Satellite Receiver Chip (디지털 비디오 방송 컴플라이언트 위성 수신 칩의 Physical 설계 및 검증)

  • 신수경;최영식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.345-348
    • /
    • 2001
  • The paper describes the physical design flow & verification of Digital Video Broadcasting(DVB) compliant satellite receiver chip. It includes problems and issues of earth design flow, verification process for physical layout.

  • PDF

Individual verification method by PPG measurement (PPG 측정에 의한 개인 인증 방법)

  • Kim, Sheen-Ja;Lee, Young-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2057-2061
    • /
    • 2008
  • Individual heartbeat has specific character by a condition of heart, structure, age, and so forth. On this paper, We propose that individual verification method using specific character of heartbeat. This character are obtained by measure PPG(Photo Plethysmogram) using LD and PD.

Verification of Bytecode by Generating Verification Condition for Intermediate Language (중간언어의 VC 생성을 통한 바이트코드 검증)

  • Hu, Hye-Rim;Kim, Je-Min;Park, Joon-Seok;Yoo, Weon-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.269-272
    • /
    • 2011
  • 프로그램 신뢰성을 높이기 위한 방법 중 하나로 쓰이는 것이 명세 된 언어의 검증이다. 명세 된 언어를 검증하기 위해 소스 프로그램을 논리식으로 바꾸어 검증하는 방법을 사용한다. 소스 프로그램 뿐만 아니라 바이트코드 역시 프로그램 신뢰성을 높이기 위해서 검증이 필요하다. 본 논문에서는 바이트 코드의 검증을 위해 바이트코드의 정보를 가지고 있는 중간언어의 verification condition을 생성하는 방법을 보인다.

Seamless CVE Environment Using TeakLite Core for DVD Servo (DVD Servo용 IC개발에 적용한 TeakLite core 기반의 Seamless CVE 환경)

  • 서승범;안영준;배점한
    • Proceedings of the IEEK Conference
    • /
    • 2000.11b
    • /
    • pp.204-207
    • /
    • 2000
  • Verification is one of the most critical and time-consuming tasks in today's design process. This paper describes the basic idea of Co-verification and the environment setup for the design of DVD Servo with TeakLite DSP core by using Seamless CVE, Hardware/software Co-verification too1.

  • PDF

Efficient Contents Verification Scheme for Contents-Centric-Networking (콘텐츠 중심 네트워킹을 위한 콘텐츠 인증 기술)

  • Kim, DaeYoub;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.234-241
    • /
    • 2014
  • xTo improve network inefficiency caused by network congestion around a content-source, content-centric networking (CCN) allows network nodes transmitting contents to temporarily cache received contents and then send back the cached contents if the nodes receive relevant request messages without forwarding the request messages to content-sources. However, because nodes receiving requested contents through CCN cannot recognize real senders of the received contents, the receivers need to verify each received contents before using them. But such a verification procedure can cause long service/operation delay. Hence, in this paper, we review the problem of contents verification, propose an improved verification procedure and evaluate its performance.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

Performance Verification Process for Introduction of Open Source Software -centered on introduction of Linux into the NEIS-

  • Kim Doo-Yeon;Kim Jong-Bae;Rhew Sung-Yul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.59-68
    • /
    • 2006
  • Recently, introduction of Open Source Software into informatization of the government and public sector has been actively examined, however, Open Source Software is being rarely adopted due to the lack of verified and reliable data with regard to the criteria, process, performance and stability for introduction of Open Source Software. In this paper, the process, method and plan for performance verification for introduction of Open Source Software into mission critical systems of the government and public sector are suggested in order to solve the aforesaid problem Specially, a test system to judge whether or not to adopt Open Source Software in school affairs system of the NEIS(National Education Information System) of the Korean government was set up, and the method and process of performance verification by stage in addition to feasibility study were applied to the test system for verification. Based on the result of performance evaluation in the test system, the application of Linux to school affairs system of the NEIS is being successfully practiced. It is expected that this study will be a guideline to technical review process and performance verification method as necessary to introduce Open Source Software into the mission critical systems of government and public agencies.

  • PDF

Distributed OCSP Certificate Verification Model for Reducing Response Time (응답시간 단축을 위한 분산 OCSP 인증서 검증 모델)

  • Choi Seung kwon;Jang Yoon sik;Ji Hong il;Shin Seung soo;Cho Yong hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4A
    • /
    • pp.304-311
    • /
    • 2005
  • OCSP has specific characters which can suspend, close, and correct in real time. But, as more clients use the OCSP server verification, more updated information is needed, which can lead to jamming in the OCSP server. To apply this technique of Distributed OCSP server so as to reduce the certificate verification OCSP from jamming. Also, the Distributed OCSP server will solve the problems of the intensive central structure. Simulation results show that the average reply time of certificate verification request and server load are reduced in the case using distributed OCSP. In addition to this advantage, resource distribution and fault tolerance are acquired because of multiple OCSP.

Automatic Speech Database Verification Method Based on Confidence Measure

  • Kang Jeomja;Jung Hoyoung;Kim Sanghun
    • MALSORI
    • /
    • no.51
    • /
    • pp.71-84
    • /
    • 2004
  • In this paper, we propose the automatic speech database verification method(or called automatic verification) based on confidence measure for a large speech database. This method verifies the consistency between given transcription and speech using the confidence measure. The automatic verification process consists of two stages : the word-level likelihood computation stage and multi-level likelihood ratio computation stage. In the word-level likelihood computation stage, we calculate the word-level likelihood using the viterbi decoding algorithm and make the segment information. In the multi-level likelihood ratio computation stage, we calculate the word-level and the phone-level likelihood ratio based on confidence measure with anti-phone model. By automatic verification, we have achieved about 61% error reduction. And also we can reduce the verification time from 1 month in manual to 1-2 days in automatic.

  • PDF