• Title/Summary/Keyword: Random ID

Search Result 86, Processing Time 0.026 seconds

A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity (사용자 익명성을 제공하는 스마트카드 기반 원격 인증 프로토콜)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.229-239
    • /
    • 2009
  • To solve user authentication problem, many remote user authentication schemes using password and smart card at the same time have been proposed. Due to the increasing of interest in personal privacy, there were some recent researches to provide user anonymity. In 2004, Das et al. firstly proposed an authentication scheme that guarantees user anonymity using a dynamic ID. In 2005, Chien et al. pointed out that Das et al.'s scheme has a vulnerability for guaranteing user anonymity and proposed an improved scheme. However their authentication scheme was found some weaknesses about insider attack, DoS attack, and restricted replay attack. In this paper, we propose an enhanced scheme which can remove vulnerabilities of Chien et al.'s scheme. The proposed authentication protocol prevented insider attack by using user's Nonce value and removed the restricted replay attack by replacing time stamp with random number. Furthermore, we improved computational efficiency by eliminating the exponentiation operation.

  • PDF

RFID Tag Number Estimation and Query Time Optimization Methods (RFID 태그 개수 추정 방법 및 질의 시간 최소화 방안)

  • Woo, Kyung-Moon;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.420-427
    • /
    • 2006
  • An RFID system is an important technology that could replace the traditional bar code system changing the paradigm of manufacturing, distribution, and service industry. An RFID reader can recognize several hundred tags in one second. Tag identification is done by tags' random transmission of their IDs in a frame which is assigned by the reader at each round. To minimize tag identification time, optimal frame size should be selected according to the number of tags. This paper presents new query optimization methods in RFID systems. Query optimization consists of tag number estimation problem and frame length determination problem. We propose a simple yet efficient tag estimation method and calculate optimal frame lengths that minimize overall query time. We conducted rigorous performance studies. Performance results show that the new tag number estimation technique is more accurate than previous methods. We also observe that a simple greedy method is as efficient as the optimal method in minimizing the query time.

In silico annotation of a hypothetical protein from Listeria monocytogenes EGD-e unfolds a toxin protein of the type II secretion system

  • Maisha Tasneem;Shipan Das Gupta;Monira Binte Momin;Kazi Modasser Hossain;Tasnim Binta Osman;Fazley Rabbi
    • Genomics & Informatics
    • /
    • v.21 no.1
    • /
    • pp.7.1-7.11
    • /
    • 2023
  • The gram-positive bacterium Listeria monocytogenes is an important foodborne intracellular pathogen that is widespread in the environment. The functions of hypothetical proteins (HP) from various pathogenic bacteria have been successfully annotated using a variety of bioinformatics strategies. In this study, a HP Imo0888 (NP_464414.1) from the Listeria monocytogenes EGD-e strain was annotated using several bioinformatics tools. Various techniques, including CELLO, PSORTb, and SOSUIGramN, identified the candidate protein as cytoplasmic. Domain and motif analysis revealed that the target protein is a PemK/MazF-like toxin protein of the type II toxin-antitoxin system (TAS) which was consistent with BLASTp analysis. Through secondary structure analysis, we found the random coil to be the most frequent. The Alpha Fold 2 Protein Structure Prediction Database was used to determine the three-dimensional (3D) structure of the HP using the template structure of a type II TAS PemK/MazF family toxin protein (DB ID_AFDB: A0A4B9HQB9) with 99.1% sequence identity. Various quality evaluation tools, such as PROCHECK, ERRAT, Verify 3D, and QMEAN were used to validate the 3D structure. Following the YASARA energy minimization method, the target protein's 3D structure became more stable. The active site of the developed 3D structure was determined by the CASTp server. Most pathogens that harbor TAS create a crucial risk to human health. Our aim to annotate the HP Imo088 found in Listeria could offer a chance to understand bacterial pathogenicity and identify a number of potential targets for drug development.

The Effect of Anonymity on Virtual Team Performance in Online Communities (온라인 커뮤니티 내 익명성이 가상 팀 성과에 미치는 영향)

  • Lee, Un-Kon;Lee, Aeri;Kim, Kyong Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.217-241
    • /
    • 2015
  • One of the challenges in online community management is what level of perceived anonymity can be granted to encourage active participation from members while discouraging unhealthy activities. Few studies developed a scheme of anonymity and investigated how different levels of anonymity influence community activities. This study develops a classification scheme of anonymity encompassing the following three different levels : (1) real name(no anonymity), (2) nickname (partial anonymity), and (3) random assignment of a temporal ID (complete anonymity). Then, it examines how different levels of anonymity influence trust and perceived risk, which in turn affect virtual team performance. A series of laboratory experiments were performed, manipulating the levels of anonymity, in the context of well-structured communities that allow prior interactions among community members. The data was collected from 364 laboratory participants and analyzed using ANOVA and PLS. The results indicate that the difference of anonymity between (2) and (3) had not be significant and the only (1) could not guarantee the anonymity. The impact of anonymity on trust and perceived risk could not be significant in this situation. These findings could contribute to make more beneficial member identification strategies in online community practice.

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

Lived experience of mothers who have child with cerebral palsy (뇌성마비아 어머니의 경험)

  • Lee Hwa Za;Kim Yee Soon;Lee Gee Won;Gwan Soo Za;Kang In Soon;An Hea Gyung
    • Child Health Nursing Research
    • /
    • v.2 no.1
    • /
    • pp.93-111
    • /
    • 1996
  • The purpose of the study is to identify the lived experience of mothers who have children with cerebral palsy in order to understand their agony. Moreover, the result of study was to find some nursing intervention for disabled children and their mothers. For this purpose, ten mothers who are willing to cooperate with this research were selected at random from those who have children with the cerebral palsy, currently using the municipal facilities for the handicapped with cerebral malfunction. Data collection was done from October 4, 1994 th December 31, 1994. The data were collected by asking the mothers mentioned above with some unstructured open-ended questions, recorded on the tapes with permission by the interviewee in order to prevent missing of the interviewed contents. These collected data have been substantiated and properly analyzed on the basis of phenomenological approach initiated by Colaizzi's method. The results and validity are proved to be credible by means of the individual checking of the interviewed mothers. The results of this study are as follows : 1. When the mother is first informed of the diagnosis of cerebral palsy on her child, she usually misses the crucial timing needed for proper treatment of the child's disorder because she is notified through the doctor's indifference and his apparently inactive, matter-of-fact attitude. At first she suspects the doctor's diagnosis and tries to attribute it to the unknown cause from a certain genetic problem and then she quickly wants to deny the whole situation that her child is really suffering from the cerebral palsy. The reality is too much for her to accept as it is and she would not believe her child is abnormal. Therefore, she even attempts depend on the power of God for its solution. 2. The mother, who goes thorough this kind of uncommon experiences, is totally devoted to the treatment and care of the child and completely ignores her own life and happiness. At the same time, she feels sorry for her other normal children she believes having not enough care and concern. Also, she feels sorry for the sick child when the child's brothers or sisters show special concern for the patient out of sympathy. It is sorry and not satisfied for her that the child is growing with abnormality and neighbor other around have inappropriate attitudes. Likewise, she is discontent with her husband's lack of concern about the child's treatment. She believes that the health care system in this society isn't fulfilling its due purpose. In the state of her utmost distress and anxiety, she always feels the need of competent consultants, and is angry about that her child is treated as an abnormal being, she is trying to hide the child from other people and to make him or her disappear, if possible. Although she doesn't have harmonious relation with her husband, she id happy when he shows his affection for the child and she feels relieved and thankful when the relatives don't mention about the child's condition Since the child's overall status of health is continuously in unstable conditions, requiring her all-time readiness for an emergency, she feels guilty of her child's illness toward the fEmily members as if it was her own fault to have borne such an abnormal child and she feels responsible for the child morally and financially if necessary Because her life is centered on taking care of the child, she cannot afford to enjoy her own life and happiness. She is a lonely mother, fatigued, with no proper relationship with other people around her. With this sense of guilt and responsibility as a mother of an unusual disease, she has no choice but to grieve her destiny from which she is not allowed to escape. 3. Nevertheless, the mother with the child suffering from the cerebral palsy does not easily give up the hope of getting her child cured and she believes that in the long run, though slower than hoped, her abnormal son or daughter will be eventually cured to become a normal sibling someday. This kind of hope is sustained by the mother's strong faith coming from observing the progress of other similar children getting better. Sometimes she is encouraged to have this faith by other mothers who share the same painful experiences, believing that her child will improve even more rapidly than others with the same palsy. Full of hope, she painstakingly waits for the child's healing. Moreover, she plans to have another child. she thinks that the patient child's brothers and sisters only can truly understand and look after the patients. However, when she notices that the progress of other children under the treatment does not look so hopeful, she is distressed by the thoughts that her child may never get well. Too, she is worried that the patient's brother or sister will be born as the same invalid with the cerebral disease. She is discouraged to have another baby as much as she is encouraged to. She is also troubled by the thought that in case she has another baby, she will have to be forced. to neglect the patient child, especially when she does have an extra hand or some reliable person to help her with taking care of the patient.

  • PDF