• Title/Summary/Keyword: message

Search Result 4,951, Processing Time 0.033 seconds

On Message Length Efficiency of Two Security Schemes using Bloom Filter (블룸필터를 사용하는 두 보안기법에 대한 메시지 길이의 효율성에 대하여)

  • Maeng, Young-Jae;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.173-178
    • /
    • 2012
  • Recent two security schemes showed that a bloom filter can reduce a message length required for representing multiple MACs. The schemes, however, made message length comparison without considering security level. Since the MAC is intended for security, it is important to let multiple MACs and the bloom filter have the same level of security for making message length comparison. In this paper, we analyze the message length efficiency of bloom filter, compressed bloom filter and multiple MACs, letting them have the same security level.

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY

  • Chande, Manoj Kumar;Lee, Cheng-Chi
    • Bulletin of the Korean Mathematical Society
    • /
    • v.53 no.4
    • /
    • pp.1051-1069
    • /
    • 2016
  • Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with message recovery using self-certified public key. The security of the proposed scheme is based on the discrete logarithm problem (DLP) and one-way hash function (OWHF). Their scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, their scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer. In this paper, it is shown that in their signature scheme a malicious signer can cheat the system authority (SA), by obtaining a proxy signature key without the permission of the original signer. At the same time malicious original signer can also cheat the SA, he can also obtain a proxy signature key without the permission of the proxy signer. An improved signature scheme is being proposed, which involves the remedial measures to get rid of security flaws of the LZZ et al.'s. The security and performance analysis shows that the proposed signature scheme is maintaining higher level of security, with little bit of computational complexity.

An Emergency Message Broadcast Scheme for Vehicular Networks (차량 네트워크를 위한 긴급메시지 브로드캐스트 기법)

  • Park, Jeong-Hwa;Kang, Moon-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.3
    • /
    • pp.372-379
    • /
    • 2012
  • This paper presents a group based propagation method for multi-hop transmission, in order to deliver an emergency message to the reasonable size of vehicle troop. A group head is selected in considering of the position information of vehicles and radio transmission range. With benefits of the group based transmission, it is possible to minimize the unnecessary transmissions and the possibility of message collisions. We evaluate the performance of the proposed scheme compared with conventional schemes. Simulation results show that the message propagation performance is so stable regardless of vehicle's congestion degree.

Message Routing Algorithm on an Injured Hypercube (손상된 하이퍼큐브상의 메세지 라우팅 알고리즘)

  • Gong, Heon-Taek;U, Ji-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.2
    • /
    • pp.242-250
    • /
    • 1996
  • Communications on hypercube nodes are done by explicit message routing. So efficient message routing is very important for the performance of hypercube multicomputers. However, hypercube nodes can be faulty due to hardware and/o r software problems, which is called an injured hypercube. A reliable hypercube system should tolerate the problems. One of the methods to enhance reliability on injured hypercube is to use fault-tolerant message routing algorithms. In this paper, we propose a message routing algorithm with possible shortest distance using disjoint paths. To analyze the performance, the algorithm is simulated and evaluated.

  • PDF

A Standardized Design Method of Weapon Information Exchange for Interoperability with Several Kinds of Command and Control System (이기종 지휘통제체계 연동을 위한 무장정보 처리 표준화 설계 방안)

  • Shin, JinBeom;Bae, JungIl;Lee, DongGowan;Koh, Hye-Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.771-778
    • /
    • 2015
  • In this paper, we have proposed a design method for standardization of weapon information exchange between a weapon control computer of guided missile system and a high echelon command and control system. Because the weapon control computer based on diverse combat platforms is operated with several kinds of a high echelon system, it is necessary to provide a standardized design method for weapon information exchange between mutual system. In fact, it is possible to standardize a interface design specification of weapon information message because weapon information message is closely related to standard tactical data link message. It is essential that the interface design specification of weapon information is submitted to that of tactical data link information. It seems that this interface design specification is very useful in development process of the future weapon system.

Contention-based Reservation Protocol Using a Counter for Detecting a Source Conflict in WDM Single-hop Optical Network with Non-equivalent Distance

  • Sakuta, Makoto;Nishino, Yoshiyuki;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.365-373
    • /
    • 2001
  • We propose a new channel reservation protocol which can reduce message delay by using a counter for detection of d source conflict in a WDM single-hop network with non-equivalent propagation delay. A source convict occurs when a source node has the right to transmit more than or equal to two messages simultaneously, which are transmitted using different wavelengths. In such a case, the source node has to newly obtain the right to transmit the message. In the proposed protocol, by using a source conflict counter a source node can detect a source conflict before a wave-length assignment is performed. Therefore, the source node can start a procedure to newly obtain the right to transmit the message which cannot be transmitted due to a source conflict. We analyse the throughput performance by taking the effect of a source conflict into account, and show that the approximate analysis and the computer simulated results are close. Also, from computer simulated results, we show that our proposed protocol can reduce mean message delay dramatically without degrading throughput performance as the offered load becomes large.

  • PDF

Effects of Thinness Promoting Message from TV Media on College Women's Appearance Distortion

  • Mun, Mi-Ra;Kim, Yong-Sook
    • The International Journal of Costume Culture
    • /
    • v.13 no.1
    • /
    • pp.26-36
    • /
    • 2010
  • The purpose of this study was to identify effects of thinness promoting message from TV media on college women's appearance distortion. The subjects were 408 college women and survey was done from Aug 10 to 30. 2009. Most college women wanted their height to be taller and weight to be lighter than their actual height and weight, and preferred slimmer figures. Over half of college women enjoyed fashion related TV programs more than diet or plastic surgery related TV programs. College women were classified into 3 groups of TV heavy watcher, TV medium watcher, and TV light watcher according to TV watching time. TV heavy watchers wanted their figures to be slimmer and weight to be lighter than other groups, and were affected by thinness promoting message from TV media more. TV heavy watchers of thinness promoting message related programs showed a tendency of distorting their body more and tried to agree with those TV programs more. Especially, college women agreed with plastic surgery related TV programs more than fashion or diet related TV programs. TV media producers should keep in mind those side-effects and try to show more universal and diverse figures to TV watchers.

  • PDF

A Comparative Legal Study on the Electronic Transactions Act in Thailand (태국의 전자거래법에 대한 비교법적 고찰 - 전문 및 일반규정을 중심으로 -)

  • Shim, Chong-Seok;Oh, Hyon-Sok
    • International Commerce and Information Review
    • /
    • v.12 no.4
    • /
    • pp.405-427
    • /
    • 2010
  • This legal study is to compare the Electronic Transactions Act in Thailand(hereinafter 'ETA') with mainly other countries electronic transactions acts, such as UNCITRAL MLEC, UECIC, VETA, UCITA and Korea' Electronic Transactions Act The ETA is consisted of 6 chapters which included preamble and definitions. Each chapter's main point as follows. Preamble is related to the name, time of legal effect, scope and definitions. Chapter 1 is not only general principles of electronic transactions, required restriction in addition to specify the limit of application, documentation, evidential weight in reference to the data message, but also the conditions of offer and acceptance through data message, time and place of dispatch and receipt of data message, certification between origination and addressee. According to media-neutrality and the effectiveness security requirement of data message under the information system, legal certification is related to the exchange's declaration of intention, define about origination-addressee of data message. Chapter 2 is composed to provide expressly about the effectiveness security in electronic signature. Those contents are to compare the MLEC, UECIC and Electronic Transactions Act in Korea. Chapter 3 is related to legal definitions that present legal requirement about service relating electronic transaction which contents accept domestic law, the adequate requirement as eligibility, satisfied matter, self-reliance ratio of finance and other detail standard Chapter 4 is deal with the transaction which are public sector and those application requirements. And also this chapter are composed regulations about direct-indirect purpose of Thailand domestic electronic government.

  • PDF

Effects of a Short Message Service Intervention on Adherence to Maximal Sterile Barrier Precautions and Catheter-Related Blood Stream Infections (최대한의 멸균 차단법의 이행도와 중심정맥관 관련 혈류감염 발생에 대한 단문문자메시지 중재 효과)

  • Kang, Moon-Hee;Kim, Dong-Oak
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.18 no.2
    • /
    • pp.244-250
    • /
    • 2012
  • Purpose: The purpose of this study was to investigate the effect of a short message service intervention on adherence to maximal barrier precautions (MBP) and catheter-related blood stream infections. Method: The data were collected from March to September, 2008, at an 826-bed university-affiliated hospital in Daejeon. The study participants were 24 physicians who were inserting central catheters and 133 patients (control group 78 and intervention group 55) with central catheter insertions. The researcher sent the message (adherence to MBP and optimal recommendations) to each internal medicine doctor using the short message service (SMS) for cellular phones. Messages were sent monthly for 3 months. Data were analyzed by chi-square test and t-test using SPSS 12.0 windows program. Result: Adherence to maximal barrier precautions was significantly increased from 44.9% to 69.1% (p=.006) after the SMS intervention. But changes in the rate of CRBSI (catheter related blood stream infection) between the intervention group (1.89) and the control group (4.45) were not significant (p=.323). Conclusions: The results indicate that the SMS intervention is effective in increasing the adherence to maximal barrier precautions and the SMS intervention can be recommended for utilization in infection control nursing practice.