• Title/Summary/Keyword: compromise

Search Result 862, Processing Time 0.037 seconds

Human Memorable Password based Efficient and Secure Identification

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.4
    • /
    • pp.213-216
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBI(password Based Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBI is also excellent in the aspect of the performance.

A Study on the Methodology of The Parameter Design of Multiple Characteristics (다특성치 파라미터 설계에 관한 방법론 연구(사례 연구 중심으로))

  • 조용욱;박명규
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.50
    • /
    • pp.171-181
    • /
    • 1999
  • Taguchi's robust design methodology has focus only a single characteristic or response, but the quality of most products is seldom defined by a characteristics, and is rather the composite of a family of characteristics which are often interrelated and nearly always measured in a variety of units. The multiple characteristics problem is how to compromise the conflicts among the selected levels of the design parameters for each individual characteristic. In this paper, Methodology using SN ratio optimized by univariate technique is proposed and a parameter design procedure to achive the optimal compromise among several different response variables is developed. One new case studies are solved by the proposed method and the results are compared with ones by the sum of SN ratios, the expected weighted loss, the desirability function, and EXTOPSIS model.

  • PDF

Compromise-Resistant Pairwise Key Establishments for Mobile Ad hoc Networks

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.375-378
    • /
    • 2006
  • This letter presents a pairwise key establishment scheme that is robust against the compromise of nodes in mobile ad hoc networks. Each node establishes local keys with its neighbor nodes that are at most three hops away at network boot-up time. When any two nodes establish a pairwise key, they receive the secret information from the nodes on the route between them, and construct the pairwise key using the secret information. Here, the local keys are utilized by the nodes on the route to send the secret information securely. The simulation results have proven that the proposed scheme provides better security than the key pre-distribution-based scheme.

  • PDF

Efficient Password-based Key Exchange Protocol for Two users Registered in a Server (동일 서버를 사용하는 두 사용자간 효율적인 패스워드 기반의 키 교환 프로토콜)

  • Shin Seong-chul;Lee Sung-woon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.127-133
    • /
    • 2005
  • This paper presents a password-based key exchange protocol to guarantee secure communications for two users registered in a sever. In this protocol, the server is only responsible for the legality of the users but does not how the session key agreed between them. The protocol can resist the various attacks including server compromise attack and provide the perfect forward secrecy. The proposed protocol is efficient in terms of computation cost because of not employing the sewer's public key.

A Periodical Key Refreshment Scheme for Compromise-prone Sensor Nodes (오염에 취약한 센서노드들을 위한 주기적인 키갱신 방안)

  • Wang, Gi-Cheol;Kim, Ki-Young;Park, Won-Ju;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.11
    • /
    • pp.67-77
    • /
    • 2007
  • In sensor networks, it is very important to refresh communication keys of sensors in a periodic or on-demand manner. To perform a dynamic key management efficiently, sensor networks usually employ cluster architecture and each CH (Cluster Head) is responsible for key management within its cluster. In cluster-based sensor networks, CHs are likely to be targets of capture attacks, and capture of CHs threatens the survival of network significantly. In this paper, we propose a periodical key refreshment scheme which counteracts against capture of CHs. First, the proposed scheme reduces the threat caused by compromise of CHs by forcing each CH to manage a small number of sensors and changing CH role nodes periodically. Second, the proposed scheme flings attackers into confusion by involving other nodes in a key establishment between BS (Base Station) and a CH. Our numerical analyses showed that the proposed scheme is more secure than other schemes and robust against compromise of CHs.

Comparison of Penetrating and Blunt Traumatic Diaphragmatic Injuries

  • Lee, Sang Su;Hyun, Sung Youl;Yang, Hyuk Jun;Lim, Yong Su;Cho, Jin Seong;Woo, Jae Hyug
    • Journal of Trauma and Injury
    • /
    • v.32 no.4
    • /
    • pp.210-219
    • /
    • 2019
  • Purpose: Traumatic diaphragmatic injury (TDI) is no longer considered to be a rare condition in Korea. This study investigated differences in the prevalence of accompanying injuries and the prognosis in patients with traumatic diaphragmatic damage according to the mechanism of injury. Methods: We retrospectively reviewed the medical records of patients with TDI who were seen at a regional emergency medical center from January 2000 to December 2018. Among severe trauma patients with traumatic diaphragmatic damage, adults older than 18 years of age with a known mechanism of injury were included in this study. Surgery performed within 6 hours after the injury was sustained was defined as emergency surgery. We assessed the survival rate and likelihood of respiratory compromise according to the mechanism of injury. Results: In total, 103 patients were analyzed. The patients were categorized according to whether they had experienced a penetrating injury or a blunt injury. Thirty-five patients had sustained a penetrating injury, and traffic accidents were the most common cause of blunt injuries. The location of the injury did not show a statistically significant difference between these groups. Severity of TDI was more common in the blunt injury group than in the penetrating injury group, and was also more likely in patients with respiratory compromise. However, sex, the extent of damage, and the initial Glasgow coma scale score had no significant relationship with severity. Conclusions: Based on the findings of this study, TDI should be recognized and managed proactively in patients with blunt injury and/or respiratory compromise. Early recognition and implementation of an appropriate management strategy would improve patients' prognosis. Multi-center, prospective studies are needed in the future.

Radiological and Clinical Results of Laminectomy and Posterior Stabilization for Severe Thoracolumbar Burst Fracture : Surgical Technique for One-Stage Operation

  • Kim, Myeong-Soo;Eun, Jong-Pil;Park, Jeong-Soo
    • Journal of Korean Neurosurgical Society
    • /
    • v.50 no.3
    • /
    • pp.224-230
    • /
    • 2011
  • Objective : This study aimed to show the possibility of neural canal enlargement and restoration of bony fragments through laminectomy and minimal facetectomy without pediculectomy or an anterior approach, and also to prove the adequacy of posterior stabilization of vertebral deformities after thoracolumbar bursting fracture. Methods : From January 2003 to June 2009, we experienced 45 patients with thoracolumbar burst fractures. All patients enrolled were presented with either a neural canal compromise of more than 40% with a Benzel-Larson Grade of VI, or more than 30% compromise with less than a Benzel-Larson Grade of V. Most important characteristic of our surgical procedure was repositioning retropulsed bone fragments using custom-designed instruments via laminectomy and minimal facetectomy without removing the fractured bone fragments. Beneath the dural sac, these custom-designed instruments could push the retropulsed bone fragments within the neural canal after the decompression and bone fragment repositioning. Results : The mean kyphotic deformities measured preoperatively and at follow-up within 12 months were 17.7 degrees (${\pm}6.4$ degrees) and 9.6 degrees (${\pm}5.2$ degrees), respectively. The mean midsagittal diameter improved from 8.8 mm (${\pm}2.8$ mm) before surgery to 14.2 mm (${\pm}1.6$ mm) at follow-up. The mean traumatic vertebral body height before surgery was 41.3% (${\pm}12.6%$). At follow-up assessment within 12 months, this score showed a statistically significant increase to 68.3% (${\pm}12.8%$). Neurological improvement occurred in all patients. Conclusion : Though controversy exists in the treatment of severe thoracolumbar burst fracture, we achieved effective radiological and clinical results in the cases of burst fractures causing severe canal compromise and spinal deformity by using this novel custom-designed instruments, via posterior approach alone.

Short Segment Screw Fixation without Fusion for Unstable Thoracolumbar and Lumbar Burst Fracture : A Prospective Study on Selective Consecutive Patients

  • Kim, Hee-Yul;Kim, Hyeun-Sung;Kim, Seok-Won;Ju, Chang-Il;Lee, Sung-Myung;Park, Hyun-Jong
    • Journal of Korean Neurosurgical Society
    • /
    • v.51 no.4
    • /
    • pp.203-207
    • /
    • 2012
  • Objective: The purpose of this prospective study was to evaluate the efficacy and safety of screw fixation without bone fusion for unstable thoracolumbar and lumbar burst fracture. Methods: Nine patients younger than 40 years underwent screw fixation without bone fusion, following postural reduction using a soft roll at the involved vertebra, in cases of burst fracture. Their motor power was intact in spite of severe canal compromise. The surgical procedure included postural reduction for 3 days and screw fixations at one level above, one level below and at the fractured level itself. The patients underwent removal of implants 12 months after the initial operation, due to possibility of implant failure. Imaging and clinical findings, including canal encroachment, vertebral height, clinical outcome, and complications were analyzed. Results: Prior to surgery, the mean pain score (visual analogue scale) was 8.2, which decreased to 2.2 at 12 months after screw fixation. None of the patients complained of worsening of pain during 6 months after implant removal. All patients were graded as having excellent or good outcomes at 6 months after implant removal. The proportion of canal compromise at the fractured level improved from 55% to 35% at 12 months after surgery. The mean preoperative vertebral height loss was 45.3%, which improved to 20.6% at 6 months after implant removal. There were no neurological deficits related to neural injury. The improved vertebral height and canal compromise were maintained at 6 months after implant removal. Conclusion: Short segment pedicle screw fixation, including fractured level itself, without bone fusion following postural reduction can be an effective and safe operative technique in the management of selected young patients suffering from unstable burst fracture.

Analysis of Compromise of Career of University Students (융복합 시대에 대학생의 진로타협 요인에 대한 연구)

  • Ahn, Jae Hee;Park, Sung Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.35-45
    • /
    • 2019
  • The purpose of this study analyzed by what factors university students were impacted in the compromise of career. 213 students who enrolled in 4-year universities were divided by demographic variables and psychological variables. The results showed followings. Firstly, the interests are the first factor and then social status and sex types followed regardless of variables. Secondly, at the based on the difference of groups science major student took the sex types as the first meanwhile, humanities and art & sports major students took the interests as the first. Lastly, there were statistical differences among groups at the sex types and social status with role orientation. This study can provide differentiated and individualized career development strategies regarding group types of career role orientation.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.