• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.027 seconds

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Implementing a Virtual Shopping Mall for the Cheapest Price using MOM(Message-Oriented Middleware) based on XML (XML 기반의 MOM(Message-Oriented Middleware)을 이용한 최저 가격 보장을 위한 가상 쇼핑몰 구현)

  • 임종선;주경수
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.1
    • /
    • pp.61-70
    • /
    • 2002
  • There are a lot of shopping malls in Internet and most of consumers want to buy good goods in cheap price through the shopping malls. To support them, many sites for price comparison are constructed. But man or woman search many shopping malls and insert their price informations into database that the price comparison sites own. To overcome this disadvantage, virtual shopping malls are builded. These virtual shopping malls are connected and cooperated a lot of affiliated existing shopping malls for the cheapest price information. But, these virtual shopping mall are connected to those existing shopping malls in synchronous. So If they are connected to many existing shopping malls, we have to wait long time because of searching for many existing shopping malls. In this paper, we designed and implemented a virtual shopping mall that connect to many existing shopping malls in asynchronous. For a asynchronous communication between this virtual shopping mall and many existing shopping malls, we used JMS (Java Message Service) that is a standard Java API for MOM (Message-Oriented Middleware).

  • PDF

Performance of LDPC with Message-Passing Channel Detector for Perpendicular Magnetic Recording Channel (수직자기기록 채널에서 LDPC를 이용한 메시지 전달 방식의 채널 검출 성능비교)

  • Park, Dong-Hyuk;Lee, Jae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4C
    • /
    • pp.299-304
    • /
    • 2008
  • For perpendicular magnetic recording channels, it is hard to expect improving the performance by using the PRML or NPML. Hence, we exploit LDPC code to improve the performance. In this paper, we examine a single message-passing detector/decoder matched to the combination of a perpendicular magnetic recording channel detector and an LDPC code decoder. We examine the performance of channel iteration with joint LDPC code on perpendicular magnetic recording channel, and simplify the complexity of the message-passing detector algorithm.

The Design of the HL7 V2.4 Message Interface Engine (HL7 V2.4 메시지 인터페이스 엔진 설계)

  • Lee, Sang-Min;Song, Jin-Tae;Kim, Il-Kon;Cho, Hune;Kwak, Yun-Sik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.781-783
    • /
    • 2003
  • 의료 정보의 표준 데이터 교환 환경을 구축하기 의해서 의료정보분야의 전송표준인 HL(Health Level)7[1]을 이용하는 방법이 있다. 방대한 HL7 V2.4 메시지를 의료 관련 어플리케이션이나 시스템에서 사용하고자 한다면, 메시지 처리만 전담하는 인터페이스 엔진이 필요하다. 이 논문에서는 인터페이스 엔진을 만들기 위해, HL7에서 정의한 메시지 구조를 바탕으로 HL7 V2.4 메시지를 모델링 하였고, 인터페이스 엔진의 세 가지 기능(Message Validation, Message Building, Message Transmission)을 제안한다.

  • PDF

Quantum signature scheme with message recovery (메시지 복구형 양자 서명 기법)

  • 이화연;양형진;이동훈;이상진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.39-46
    • /
    • 2003
  • We propose a quantum signature scheme with message recovery implemented by a symmetrical quantum key cryptosystem and Creenberger-Horne-Zeilinger(CHZ) triplet states. The suggested scheme relies on the availability of an arbitrator and can be divided into two schemes . one is using a public board and the other is not. The two schemes give us the confidentiality of a message and the higher efficiency in transmission. We propose a quantum signature scheme with message recovery using Greenberger-Home-Zeilinger(GHZ) triplet states.

Efficient Message Scattering and Gathering Based on Processing Node Status (프로세서 노드 상황을 고려하는 효율적인 메시지 스캐터 및 개더 알고리즘)

  • Park, Jongsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.637-640
    • /
    • 2022
  • To maximize performance in a high-performance multicore processor system. it is essential to enable effective data communication between processing cores. Data communication between processor nodes can be broadly classified into collective and point-to-point communications. Collective communication comprises scattering and gathering. This paper presents a efficient message scattering and gathering based on processing node status. In the proposed algorithms, the transmission order is changed according to the data size of the pre-existing communication, to reduce the waiting time required until the collective communications begin. From the simulation, the performances of the proposed message scattering and gathering algorithms were improved by approximately 71.41% and 69.84%.

Importance-Based Security Level Verification in Web Services (웹 서비스에서 중요도 기반 보안수준 검증)

  • Hung, Pham Phuoc;Nasridinov, Aziz;Byun, Jeongyong
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1279-1280
    • /
    • 2010
  • There are some cases when SOAP message, where WS-Security and WS-Policy elements are included, may consist of a sensitive and important data. In these cases, the message is highly recommended to be secured. The question exists of how to quickly identify that SOAP message satisfies security requirement and security level of a SOAP message. In this paper, we propose a technique called Bit-Stream which depends on the importance of SOAP elements to automatically identify the vulnerabilities and risks while offering advice for higher security.

A Study on the Influence of Green Advertisement on the Attitude of Consumers -Concerning the Message Effect- (그린광고가 소비자태도에 미치는 영향에 대한 연구 -메시지 효과에 관련하여-)

  • Cho, Kook-Haeng
    • Management & Information Systems Review
    • /
    • v.28 no.1
    • /
    • pp.99-124
    • /
    • 2009
  • This study has observed the influence of green advertisemen on the attitude of consumers in relation to its message effect. The analysis has been conducted in the perpective of awareness-emotion -behavior targeting housewives based on the message structure of the advertisement(conclusion omission type/ conclusion offer type). Results of the analysis are as follows : 1) Green advertisement was more effective for the attitude toward advertisement and products than non-green advertisement and in the case of high involvement the conclusion omission message was more effective than the conclusion offer message. 2) Green advertisement was more effective also for the emotion side than non-green advertisement and the conclusion omission message was found more effective than the conclusion offer message. 3) Green advertisement was found more effective for purchasing activities than non-green advertisement and the conclusion omission message was found more effective than the conclusion offer message in the case of high involvement. 4) In case of the conclusion offer type structure of green advertisement the awareness side influenced purchasing activities and in case of the conclusion omission type structure of green advertisement the emotion side influenced purchasing activities. Besides that in case of the conclusion offer type structure of non-green advertisement both the awareness and emotion sides were found to influence purchasing activities. No difference was found in the conclusion omission type structure of non-green advertisement.

  • PDF

Security of Image Information using Steganography and QR Code in IoT (IoT에서 스테가노그라피와 QR 코드를 이용한 영상 정보의 보안)

  • Im, Yong-Soon;Kang, Eun-Young;Park, Jae-Pyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.31-37
    • /
    • 2015
  • The security of the image information is very important in many areas of the IoT(Internet of Things), and study a number of ways to display the security (copyright, etc.). In this paper, information of image that is used by the IoT is converted to a DCT(Discrete Cosine Transform) and QC(Quantization Coefficient). And watermark (message) is to create a new encoded message(WMQR) through a QR Code. QC and WMQR applies LSB steganography techniques, can get the security (copyright, etc.) of image information. LSB steganographic techniques may be inserted according to a message (Watermark) to determine the location (Secret Key). The encoded image is sent to the recipient via the Internet. The reverse process can be obtained image and a QR code, a watermark (Message). A method for extracting a watermark from the security of the image information is coded using only the image and Secret Key, through the DCT and quantization process, so obtained by separating the watermark (Message) for the image. In this paper, we were able to improve the security of the method of image information, the image quality of the image by the simulations (PSNR), in turn, benefits were also normalized correlation (NC) and security.

Message Routing Method for Inter-Processor Communication of the ATM Switching System (ATM 교환기의 프로세서간통신을 위한 메시지 라우팅 방법)

  • Park, Hea-Sook;Moon, Sung-Jin;Park, Man-Sik;Song, Kwang-Suk;Lee, Hyeong-Ho
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.289-440
    • /
    • 1998
  • This paper describes an interconnection network structure which transports information among processors through a high speed ATM switch. To efficiently use the high speed ATM switch for the message-based multiprocessor, we implemented the cell router that performs multiplexing and demultiplexing of cells from/to processors. In this system, we use the expanded internal cell format including 3bytes for switch routing information. This interconnection network has 3 stage routing strategies: ATM switch routing using switch routing information, cell router routing using a virtual path identifier (VPI) and cell reassembly routing using a virtual channel indentifier (VCI). The interconnection network consists of the NxN folded switch and N cell routers with the M processor interface. Therefore, the maximum number of NxM processors can be interconnected for message communication. This interconnection network using the ATM switch makes a significant improvement in terms of message passing latency and scalability. Additionally, we evaluated the transmission overhead in this interconnection network using ATM switch.

  • PDF