• Title/Summary/Keyword: Multi-Signature

Search Result 122, Processing Time 0.03 seconds

A Study on Design Identity of Fashion House - Focused on Saint Laurent House - (패션 하우스의 디자인 정체성 연구 - 생 로랑 하우스를 중심으로 -)

  • Hwang, Hyerim;Park, Eun Kyung
    • Journal of the Korean Society of Costume
    • /
    • v.65 no.2
    • /
    • pp.105-124
    • /
    • 2015
  • This research was started to study how the design identity of an overseas fashion house was formed, changed and connected. For the purpose of the study, Saint Laurent House was selected as the subject of the study, because it began as a couture house and launched the $pr\hat{e}t-\grave{a}-porter$ for the first time among the designer brands, and also contributed to the development of modern women's fashion. Literature survey on related books and papers was performed to study the Saint Laurent House. Then, fashion collection photos of the house from 1962 SS to 2014 SS were collected to analyze and compare the features of the designs. The photos were collected from related books, fashion magazines and internet sites. The results are as follows: The features of Yves Saint Laurent's early designs were contemporarily sensational with their couture tradition. His representative designs including Le Smoking, Pea Coat, Loose Fit Blouse, Safari Look, Jumpsuit, Ethnic Look and Art Look became the signature looks of the Saint Laurent House. His designs expressed the liberation of sex, multi-cultural sensitivity and the fusion of art and fashion. His successor, chief designer Tom Ford designed with strong sensitivity of his own. He dealt with Yves Saint Laurent's design themes and signature looks in sensual as well as trendy and sophisticated way. Stefano Pilati showed the Parisienne chic and elegance. He re-made the legacies of Yves Saint Laurent with his own design style using new materials or cutting technique. Hedi Slimane reinterpreted the signature looks of the house with his rock' n roll mood for young, modern women while reflecting the spirit of Yves Saint Laurent's early stage. In conclusion, the design identity of Saint Laurent House is not just a fixed one. By the subsequent chief designers, the signature items and design spirit of Yves Saint Laurent have been succeeded, reintroduced or changed to be trendy and to reflect the designers' design sensitivity. All of these make and maintain the design identity of the fashion house.

Design of Digital Fingerprinting Scheme for Multi-purchase

  • Choi, Jae-Gwi;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.12
    • /
    • pp.1708-1718
    • /
    • 2004
  • In this paper, we are concerned with a digital fingerprinting scheme for multi-purchase where a buyer wants to buy more than a digital content. If we apply previous schemes to multi-purchase protocol, the number of execution of registration step and decryption key should be increased in proportion to that of digital contents to be purchased in order to keep unlinkability. More worse, most of fingerprinting schemes in the literature are based on either secure multi-party computation or general zero-knowledge proofs with very high computational complexity. These high complexities complicate materialization of fingerprinting protocol more and more. In this paper, we propose a multi-purchase fingerprinting scheme with lower computational complexity. In the proposed scheme, a buyer executes just one-time registration step regardless of the number of contents to be purchased. The number of decryption key is constant and independent of the number of contents to be purchased. We can also reduce the computational costs of buyers by introducing a concept of proxy-based fingerprinting protocol.

  • PDF

Extended Multi-level Proxy Signature based on Proxy Certificate (위임 인증서를 기반으로 한 다단계 대리서명 방식의 확장)

  • 이여진;김중태;정일용
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.116-119
    • /
    • 2003
  • 대리 서명은 디지털 서명 기술의 응용으로서 Mambo에 의하여 최초로 제안이 되었고, Araki에 의하여 다단계 대리 서명으로 확장되었다. 본 논문에서는 위임 인증서와 서명 검증자의 서명 생성 여부를 원 서명자가 추후 확인하는 프로토콜을 이용하여 부인 봉쇄 및 원 서명자의 보호가 이루어지는 효율적이고 안정적인 다단계 대리 서명 방식을 제안한다.

  • PDF

Mixed Uses of Materialized View and Signature View-Index Mechanism for Efficient Query Processing on CORBA (CORBA 기반에서 효율적인 질의 처리를 위한 실체뷰와 시그니쳐 뷰인덱스의 혼용)

  • Lee, Seung-Yong;Kim, Myung-Hee;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.61-68
    • /
    • 2004
  • Now, the representative researching trends of view managements for improving the query processing in multi-database system are focused on the materialized view mechanism and the signature view index mechanism. But when we compare with both mechanisms, the former mechanism's access time is faster than one of the latter's, and needs large space. The latter mechanism needs small space and the access time is slower than one of the former. These mechanisms are trade-off each other. Therefore, in case of query process using the view management, we are to improve the system performance and to reduce the access cost of disk input and output by suggesting a new mechanism mixing both the materialized view mechanism and the signature view index mechanism. We suggested that the structure of metadata and the algorithm about the new mired mechanism.

Mixed-Signal Circuit Testing Using Digital Input and Frequency Analysis (디지털입력과 주파수 성분 분석을 통한 혼성신호 회로 테스트 방법)

  • 노정진
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.4
    • /
    • pp.34-41
    • /
    • 2003
  • A new technique for detecting parametric faults in mixed signal circuits is proposed Pseudo-random sequence from linear feedback shift register(LFSR) is fed to circuit-under-test (CUT) as stimulus and wavelets are used to compact the transient response under this stimulus into a small number of signature. Wavelet based scheme decomposes the transient response into a number of signal in different frequency bands. Each decomposed signal is compacted into a signature using digital integrator. The digital pulses from LFSR, owing to its pseudo-randomness property, are almost uniform in frequency domain, which generates multi-frequency response when passed through CUT. The effectiveness of this technique is demonstrated in our experimental results.

Design and Implementation of a Copyright Protection System base on the Program on-line Registration System (프로그램 온라인 등록 시스템기반의 저작권 보호시스템 설계 및 구현)

  • Jang Jae-Hyeok;Lee Jong-Sup;Choi Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.275-283
    • /
    • 2006
  • Writers enroll their outcome to Program Deliberation & Mediation Committee and get the copyright preserved for the protection of IPR. The program registration is conducted through off-line and on-line methods, and especially on-line registration provides program registrants convenience along with the safety of property from external copyright invaders. However, it is a shortcoming that the integrity and confidentiality of the enrolled program cannot be guaranteed in case of internal factors such as system errors, administrator's illegal access and revision. This paper proposes the reliable system, ensuring programs and offering convenience of Digital signature management from the system errors and intruding factors by internal administrator, using the security of confidentiality, integrity and Multi-Signature Scheme for program.

  • PDF

Multi-Level based Application Traffic Classification Method (멀티 레벨 기반의 응용 트래픽 분석 방법)

  • Oh, Young-Suk;Park, Jun-Sang;Yoon, Sung-Ho;Park, Jin-Wan;Lee, Sang-Woo;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1170-1178
    • /
    • 2010
  • Recently as the number of users and application traffic is increasing on high speed network, the importance of application traffic classification is growing more and more for efficient network resource management. Although a number of methods and algorithms for traffic classification have been introduced, they have some limitations in terms of accuracy and completeness. In this paper we propose an application traffic classification based multi-level architecture which integrates several signature-based methods and behavior algorithm, and analyzes traffic using correlation among traffic flows. By strengthening the strength and making up for the weakness of individual methods we could construct a flexible and robust multi-level classification system. Also, by experiments with our campus network traffic we proved the performance and validity of the proposed mechanism.

Development of a Electronic Commerce System of Multi-Modal Information (다중모달을 이용한 전자상거래시스템 개발)

  • 장찬용;류갑상
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.729-732
    • /
    • 2001
  • Individual authentication system that take advantage of multimodal information is very efficient method that can take advantage of method of speech recognition, face recognition, electron signature etc. and protect important information from much dangers that exits on communication network whole as skill that construct security system. This paper deal product connected with hardware from internet space based on public key sign and electron signature description embodied system. Maintenance of public security is explaining that commercial transaction system implementation that is considered is possible as applying individual authentication.

  • PDF

A Design of Security Protocol for Mobile Agent Systems Applying the Identity-based Digital Signature Scheme (ID 기반의 디지털 서명 기술을 적용한 이동 에이전트 시스템의 보안 프로토콜 설계)

  • 김성열;한승조;배용근;정일용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.10A
    • /
    • pp.1706-1716
    • /
    • 2001
  • 이동에이전트 시스템은 기하급수적으로 증가하는 분산처리 환경과 이동컴퓨팅에 기여할 수 있다는 점으로 인해 주목받고 있는 기술이지만, 심각한 보안문제를 안고 있다. 본 논문에서는 ID 기반의 디지털 다중 서명 기술을 이용하여 이동 에이전트 시스템의 보안문제에 대한 효율적인 해결책을 제시하고자 한다. 이를 위하여 본 연구는 이동 에이전트 시스템이 가질 수 있는 보안 위협 요소를 분석하였다. 이러한 보안 위협은 적절한 보안 기술의 적용으로 해결될 수 있을 것으로 판단된다. 따라서 본 논문은 여러 사용자가 공동의 메시지를 전자적으로 서명하는 보안 기술인 디지털 다중 서명(Digital Multi-signature)기법과 ID에 기반한 키(key) 분배 기법을 이용하여 이동 에이전트 시스템의 보안 문제를 해결하기 위한 새로운 방법을 제안한다. 제안된 이동 에이전트 보안 프로토콜은 키 분배 및 관리의 단순화, 인증 절차의 단순화, 에이전트 실행 플랫폼의 인증과 송수신 부인 방지 기능을 제공, 생명성을 보장, 실행 결과 데이터의 기밀성, 무결성의 보장한다. 그리고 에이전트 실해의 전 단계를 매 시스템마다 검증함으로써 변경 또는 삭제시 곧바로 탐지한다.

  • PDF

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

  • Xie, Dong;Peng, HaiPeng;Li, Lixiang;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2427-2445
    • /
    • 2016
  • In contrast to traditional "store-and-forward" routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.