• Title/Summary/Keyword: internet electronic commerce

Search Result 598, Processing Time 0.028 seconds

Cryptanalysis and Remedy Scheme on Qiu et al.'s Enhanced Password Authentication Scheme for SIP (SIP를 위한 Qiu등의 개선된 패스워드 인증 기법에 대한 보안 분석 및 강화 기법)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • The session initiation protocol (SIP) is a signaling protocol, which is used to controlling communication session creation, manage and finish over Internet protocol. Based on it, we can implement various services like voice based electronic commerce or instant messaging. Recently, Qiu et al. proposed an enhanced password authentication scheme for SIP. However, this paper withdraws that Qiu et al.'s scheme is weak against the off-line password guessing attack and has denial of service problem. Addition to this, we propose an improved password authentication scheme as a remedy scheme of Qiu et al.'s scheme. For this, the proposed scheme does not use server's verifier and is based on elliptic curve cryptography. Security validation is provided based on a formal validation tool ProVerif. Security analysis shows that the improved authentication scheme is strong against various attacks over SIP.

Improvement of Security Cryptography Algorithm in Transport Layer (전달 계층의 보안 암호화 알고리즘 개선)

  • Choi Seung-Kwon;Kim Song-Young;Shin Dong-Hwa;Lee Byong-Rok;Cho Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.107-111
    • /
    • 2005
  • As Internet grows rapidly and next electronic commerce applications increase, the security is getting more important. Information security to provide secure and reliable information transfer is based on cryptography technique. The proposed ISEED(Improved SEED) algorithm based on block cryptography algorithm which belongs to secret-key algorithm. In terms of efficiency, the round key generation algorithm has been proposed to reduces the time required in encryption and decryption. The algorithm has been implemented as follow. 128-bit key is divided into two 64-bit group to rotate each of them 8-bit on the left side and right side, and then basic arithmetic operation and G function have been applied to 4-word outputs. In the process of converting encryption key which is required in decryption and encryption of key generation algorithm into sub key type, the conversion algorithm is analyzed. As a result, the time consumed to encryption and decryption is reduced by minimizing the number of plain text required differential analysis.

  • PDF

User Identification System Based on Iris Information Using a Mouse (홍채 정보 기반 마우스를 활용한 사용자 인증 시스템)

  • Kim Sin-Hong;Rho Kwang-Hyun;Moon Soon-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.143-150
    • /
    • 2006
  • Recently, the fields such as internet banking and electronic commerce are more and more growing due to the growth of practical use of personal computer and the progress of communication technology, So importance of information security has been increased. In fact, traditional identification systems are inherently insecure because the personal identification information can be forgotten, stolen or lost. In this paper, we propose an identification system that can decide whether the user is registered based on iris information using a mouse. The proposed system is mounted a CCD camera and an illumination device on general type mouse. Then it decides whether the user is registered after the acquired image are processed and analyzed. This system gives a PC user the advantage of low-cost and convenience without necessity preparing high-cost equipment for biometrics when using a identification system.

  • PDF

A Study of the Design Improvement Measure for the Globalization of Domestic Online Shopping Malls (국내 온라인 쇼핑몰의 글로벌화를 위한 디자인 개선방안 연구)

  • Choi, Yun-Hee;Jo, Seong-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.73-80
    • /
    • 2015
  • Starting the popularity of Korean dramas exported to China in 1996, the Korean wave started around the world market. Afterwards, as the Korean culture itself as well as dramas rapidly emerged as contents of the Korean market, the foreign direct sale consumers who want to buy Korean goods directly online are increasing at an alarming rate. This study each selected 4 domestic shopping malls and 4 foreign famous shopping malls which were conducting a global marketing currently and compared/researched them in the design aspect in order to apprehend if domestic online shopping malls were properly meeting the consumer environment of the foreign market. As a result, it was revealed that domestic online shopping malls conducting the global marketing could not fully understand the internet environment by countries and were going through a limit of the information delivery by SMS, and could not use the visual signs actively which were useful to the meaning delivery. Accordingly, this thesis suggested a plan to actively utilize the variable element considering various screens to the design, plan to efficiently design the text for solving the language problem by countries, and plan to design using the developing IT technology as a solution to those problems.

A Case Study on SCM Establishment: C Corporation (SCM(Supply Chain Management) 구현에 관한 사례연구 : C기업을 중심으로)

  • 이영민;주상호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.145-154
    • /
    • 2003
  • Business environment is changing rapidly because of the introduction of the newest Technologies development and the newest management skills. With the development of Information Technology (IT) and the rapid growth of Internet based business, there have been great improvements of business processes and total costs of many firms. Many firms realize that they have to change their organizational structure and managerial skills in order to carry on their corporate goals(growth and development) according to business paradigm shift. The purpose of this dissertation is to watch how consumer product manufacturer(C corporation) could build effective SCM strategies under Electronic Commerce paradigm shift and how it can reform its organizational structure in order to perform its business goat. C corporation has been doing a groat role in logistics and distribution for the last 50 years with logistics know-how in domestic market, however there were many problems such as lack of shared information, demand Paradox, order batch, stock shortage and duplicated processes among vendors and chain members. Most of problems were based on lack of shared information and old business processes.

  • PDF

An Empirical Analysis on Long Tail Patterns with Online Daily Deals (소셜 커머스 시장의 롱테일 현상에 대한 실증 연구)

  • Jeon, Seongmin
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.119-129
    • /
    • 2014
  • The renowned Pareto rule of 80/20 has been challenged in the electronic marketplace with the emergence of long tail economy. Mass customization on top of the Internet infrastructure is expected to explain these changes of product concentration. In this paper, we empirically analyzed the micro-transactional data of a Groupon-like daily deal web site to identify the changes of product and customer concentration. The results show the long tail pattern aligned with the previous research on the e-commerce literature on the long tail. We find that the notification setting on email or SMS about daily deal influences the patterns of sales concentration. The information through email and SMS is expected to enable consumers to know about daily bargains and purchase the coupons eventually. However, the email notification for niche products results in the decreased sales while the SMS notification for overall product promotes overall products.

Factors that Influence the Sharing Intention of Vehicle and Sharing Behavior in China (중국에서의 자동차 공유의도 요인과 공유 행동에 관한 연구)

  • Zhang, Ji-Yun;Lee, Sang-Joon;Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.195-203
    • /
    • 2017
  • Sharing economy which is sharing and borrowing goods, space, and services as a social and economic activity based on the Internet and smart phones is a new research topic in convergence area. The most representative areas of shared economy are space sharing and vehicle sharing. This paper aims to explore the factors affecting sharing intention of vehicle. We have identified the independent variables which include economic benefit, social benefit, social influence, psychological benefit and perceived risk. We also have done how these variables affect on sharing intention. Unlike Korea, in China vehicle sharing is legally allowed and has a large scale economy. To prove the hypothesis, we performed questionnaire investigation in China and analyzed with SPSS program. The result of hypothesis is the followings: The economic benefit, psychological benefit, social influence and perceived risk are affects sharing intention, and social benefit is not affect sharing intention and sharing intention is affect sharing behavior.

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

A Security Model of Mobile Agent Regarding Performance (성능을 고려한 이동 에이전트 보안 모델)

  • 유응구;이금석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.614-620
    • /
    • 2003
  • As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evolution. In information retrieval, network and distributed system management, and electronic commerce, mobile agent is more flexible than the traditional communication paradigm. Despite the performance benefits, mobile agent is not used widely in the market because it is very vulnerable to a variety of attacks. In many studies related the security vulnerability for a mobile agent, the high security causes the performance to degrade. In this paper, we propose and evaluate the efficient security model for mobile agent using TDGM(Trusted Domain & Guide Manager), which provides three kinds of services : the trusted domain management, the security service and the travel plan guide. The result clearly shows that this model provides high security and minimizes the performance degradation.

Text Mining and Visualization of Unstructured Data Using Big Data Analytical Tool R (빅데이터 분석 도구 R을 이용한 비정형 데이터 텍스트 마이닝과 시각화)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1199-1205
    • /
    • 2021
  • In the era of big data, not only structured data well organized in databases, but also the Internet, social network services, it is very important to effectively analyze unstructured big data such as web documents, e-mails, and social data generated in real time in mobile environment. Big data analysis is the process of creating new value by discovering meaningful new correlations, patterns, and trends in big data stored in data storage. We intend to summarize and visualize the analysis results through frequency analysis of unstructured article data using R language, a big data analysis tool. The data used in this study was analyzed for total 104 papers in the Mon-May 2021 among the journals of the Korea Institute of Information and Communication Engineering. In the final analysis results, the most frequently mentioned keyword was "Data", which ranked first 1,538 times. Therefore, based on the results of the analysis, the limitations of the study and theoretical implications are suggested.