• Title/Summary/Keyword: Sender

Search Result 467, Processing Time 0.022 seconds

Sender Authentication Mechanism based on SW Security Card with PGP for Secure E-mail (SW 형태의 보안카드와 PGP 기반 안전한 E-mail 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.3
    • /
    • pp.57-66
    • /
    • 2007
  • E-mail system is considered as a most important communication media, which can be used to transmit personal information by internet. But e-mail attack also has been increased by spoofing e-mail sender address. Therefore, this work proposes sender verification faculty for spam mail protection at sender's MTA by using security card for protection forged sender and also for authenticating legal sender. Sender's mail MT A requests security card's code number to sender. Then sender input code number and generate session key after sender verification. Session key is used to encrypt sender's signature and secure message transmission. This work can provide efficient and secure e-mail sender authentication with sender verification and message encryption.

  • PDF

New TCP Reset Attack (새로운 TCP Reset 공격방법)

  • Kim, A-Young;Kim, Eun-Gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.605-607
    • /
    • 2012
  • In this paper, we propose another TCP Reset Attack. In the process of TCP's 3-way handshake, the receiver in the listen state receives segment including abnormal ACK number, then sends Reset to the sender (RFC 792). In this study, Attacker who monitors sender's packets sent in TCP initial connection sends segment including abnormal ACK number to the receiver before the sender sends normal ACK segment. The receiver received abnormal ACK number sends Reset to the sender. As a result, TCP connection is not established between the sender and the receiver.

  • PDF

A Correlation Analysis between Word-of Mouth Message Sender Credibility and WOM Effect (외식업소에 대한 구전 메시지 발신자 신뢰도와 구전효과의 상관성 분석)

  • Cha, Sung-Mi;Shin, Seo-Young
    • Journal of the Korean Society of Food Culture
    • /
    • v.21 no.5
    • /
    • pp.536-540
    • /
    • 2006
  • The purposes of this study were 1) to analyze the correlation between Word-of-Mouth(WOM) message sender credibility and WOM effect and 2) to analyze the differences of WOM message sender creadibility and WOM effect in off-line and on-line WOM communication. The messages were created as a form of scenario for this study. Respondents were asked to evaluate the message sender credibility and predict WOM behaviors after reading given scenario. The questionnaires were distributed to 200 customers and a total of 175 questionnaires were used for analysis(87.5%). The statistical analysis was conducted using SPSS Win(12.0) for descriptive analysis, paired t-test, factor analysis, correlation analysis. The positive off-line WOM message sender was considered as more credible(p<.001) than on-line WOM message sender. 'Message sender credibility' is correlated with 'attitude formation' in both channels, but 'reliable' factor of 'credibility' variable is not significantly correlated with 'attitude change'.

Post Sender Recognition using SIFT (SIFT를 이용한 우편영상의 송신자 인식)

  • Kim, Young-Won;Jang, Seung-Ick;Lee, Sung-Jun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.48-57
    • /
    • 2010
  • Previous post sender recognition study was focused on recognizing the address of receiver. Relatively, there was lack of study to recognize the information of sender's address. Post sender recognition study is necessary for the service and application using sender information such as returning. This paper did the experiment and suggested how to recognize post sender using SIFT. Although SIFT shows great recognition rate, SIFT had problems with time and mis-recognition. One is increased time to match keypoints in proportion as the number of registered model. The other is mis-recognition of many similar keypoints even though they are all different models due to the nature of post sender. To solve the problem, this paper suggested SIFT adding distance function and did the experiment to compare time and function. In addition, it is suggested how to register and classify models automatically without the manual process of registering models.

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.

An Intelligent New Dynamic Load Redistribution Mechanism in Distributed Environments

  • Lee, Seong-Hoon
    • International Journal of Contents
    • /
    • v.3 no.1
    • /
    • pp.34-38
    • /
    • 2007
  • Load redistribution is a critical resource in computer system. In sender-initiated load redistribution algorithms, the sender continues to send unnecessary request messages for load transfer until a receiver is found while the system load is heavy. These unnecessary request messages result in inefficient communications, low CPU utilization, and low system throughput in distributed systems. To solve these problems, we propose a genetic algorithm based approach for improved sender-initiated load redistribution in distributed systems. Compared with the conventional sender-initiated algorithms, the proposed algorithm decreases the response time and task processing time.

GA-based Adaptive Load Balancing Method in Distributed Systems

  • Lee, Seong-Hoon;Lee, Sang-Gu
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.1
    • /
    • pp.59-64
    • /
    • 2002
  • In the sender-initiated load balancing algorithms, the sender continues to send an unnecessary request message fur load transfer until a receiver is found while the system load is heavy. Meanwhile, in the receiver-initiated load balancing algorithms, the receiver continues to send an unnecessary request message for load acquisition until a sender is found while the system load is light. These unnecessary request messages result in inefficient communications, low CPU utilization, and low system throughput in distributed systems. To solve these problems, in this paper, we propose a genetic algorithm based approach fur improved sender-initiated and receiver-initiated load balancing. The proposed algorithm is used for new adaptive load balancing approach. Compared with the conventional sender-initiated and receiver-initiated load balancing algorithms, the proposed algorithm decreases the response time and increases the acceptance rate.

A New Adaptive Load Sharing Mechanism in Homogeneous Distributed Systems Using Genetic Algorithm

  • Lee Seong-Hoon
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.39-44
    • /
    • 2006
  • Load sharing is a critical resource in computer system. In sender-initiated load sharing algorithms, the sender continues to send unnecessary request messages for load transfer until a receiver is found while the system load is heavy. Meanwhile, in the receiver initiated load sharing algorithms, the receiver continues to send an unnecessary request message for load acquisition until a sender is found while the system load is light. These unnecessary request messages result in inefficient communications, low CPU utilization, and low system throughput in distributed systems. To solve these problems, we propose a genetic algorithm based approach for improved sender-initiated and receiver-initiated load sharing in distributed systems. And we expand this algorithm to an adaptive load sharing algorithm. Compared with the conventional sender-initiated and receiver-initiated algorithms, the proposed algorithm decreases the response time and task processing time.

  • PDF

The Impact of Influential's Betweenness Centrality on the WOM Effect under the Online Social Networking Service Environment (온라인 소셜 네트워크 서비스 환경에서 유력자의 매개 중심성이 구전 효과에 미치는 영향)

  • Park, Ji Hye;Suh, Bomil
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.127-146
    • /
    • 2013
  • The online social networking services (SNS) have been growing as the means of communication. In this study, we investigated word-of-mouth (WOM) effect under the SNS environment and evaluated the impact of message sender's influence on the WOM effect. Especially, this study focused on the betweenness centrality calculated through the social network analysis (SNA) of SNS network information, and proposed it as the measure of WOM message sender's influence, SNA may provide more accurate and objective measures than subjective self-reporting survey method. Fifty-one Facebook users responded to each of their four Facebook friends, who had been selected based on their betweenness centrality, Statistical analyses were performed using the responses and the betweenness centralities of the Facebook friends. The results showed that the direction (positive vs, negative) of a WOM message in SNS had an impact on the attitude of the message receiver toward the product. Moreover, the betweenness centrality of the message sender as well as his/her opinion leadership had a moderating effect on the WOM effect. Opinion leadership is a measure that has been frequently used for indicating the influence of WOM message sender in the previous studies. Considering the result that the betweenness centrality of the message sender was Significantly correlated to his/her opinion leadership, the betweenness centrality can be used for indicating the influence of WOM message sender.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.