• 제목/요약/키워드: message

검색결과 4,951건 처리시간 0.031초

블룸필터를 사용하는 두 보안기법에 대한 메시지 길이의 효율성에 대하여 (On Message Length Efficiency of Two Security Schemes using Bloom Filter)

  • 맹영재;강전일;양대헌;이경희
    • 정보처리학회논문지C
    • /
    • 제19C권3호
    • /
    • pp.173-178
    • /
    • 2012
  • 블룸필터를 이용하면 다수의 MAC을 표현하기 위해 요구되는 메시지의 길이를 줄일 수 있다고 주장하는 두 논문이 최근에 발표되었다. 하지만 이 기법들은 보안성을 고려하지 않고 메시지의 길이만 비교한 것으로 분석되었다. MAC은 보안을 목적으로 하는 코드이기 때문에 다수의 MAC과 이들을 표현한 블룸필터가 동등한 보안수준을 가지도록 하고 메시지의 길이를 비교해야 한다. 이 논문에서는 블룸필터와 압축블룸필터, 그리고 다수의 MAC이 동등한 보안수준을 가질 때의 메시지 길이를 분석하여 보인다.

재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용 (Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System)

  • 김영수;조선구
    • 한국정보통신학회논문지
    • /
    • 제17권10호
    • /
    • pp.2301-2308
    • /
    • 2013
  • 재활심리분석시스템으로서 웹이 보편적으로 사용되면서 스팸메시지가 급격히 증가하고 있다. 이의 억제를 위한 메시지통제시스템은 기술적이고 경제적 대안으로 필터시스템과 과금 시스템을 사용하고 있으나 차단오류와 과금저항으로 인한 메시지의 수신과 가용성을 제한한다. 이의 해결을 위해서 불법적인 메시지는 억제하지만 송 수신자에게 유익하고 합법적인 메시지가 폐기되고 상실되는 것을 방지할 수 있는 메시지통제시스템의 우회 모델을 제안하고 이를 사용하여 메시지의 유용성과 가용성을 높여줄 수 있는 웹기반의 메시지통제시스템을 구현하여 모델의 실용성을 검증하였다.

CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY

  • Chande, Manoj Kumar;Lee, Cheng-Chi
    • 대한수학회보
    • /
    • 제53권4호
    • /
    • pp.1051-1069
    • /
    • 2016
  • Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with message recovery using self-certified public key. The security of the proposed scheme is based on the discrete logarithm problem (DLP) and one-way hash function (OWHF). Their scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, their scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer. In this paper, it is shown that in their signature scheme a malicious signer can cheat the system authority (SA), by obtaining a proxy signature key without the permission of the original signer. At the same time malicious original signer can also cheat the SA, he can also obtain a proxy signature key without the permission of the proxy signer. An improved signature scheme is being proposed, which involves the remedial measures to get rid of security flaws of the LZZ et al.'s. The security and performance analysis shows that the proposed signature scheme is maintaining higher level of security, with little bit of computational complexity.

차량 네트워크를 위한 긴급메시지 브로드캐스트 기법 (An Emergency Message Broadcast Scheme for Vehicular Networks)

  • 박정화;강문수
    • 한국멀티미디어학회논문지
    • /
    • 제15권3호
    • /
    • pp.372-379
    • /
    • 2012
  • 본 논문에서는 차량 네트워크를 위한 긴급메시지 브로드캐스트 방안으로 긴급이벤트가 발생되는 즉시 긴급메시지를 최대한 신속하고 정확하게 전파하기 위하여 필요한 브로드캐스트 기법에 대해서 연구하였다. 제안하는 프로토콜은 차량간 그룹을 형성하여 일정거리에 위치한 모든 차량들에게 긴급메시지를 전달하는 브로드캐스트 형태의 프로토콜로써 차량 안전관련 상황이 발생하였을 때, 이 사실을 일정거리 안에 있는 후위 차량들에게 효과적으로 전달하기 위한 긴급메시지 전달 방법이다. 이는 차량간 그룹을 이용하여 긴급 메시지를 후위로 전파하는 방식으로써 형성된 그룹 안에서 선정된 대표차량에 의해서만 재전송을 수행하기 때문에 불필요한 전송을 최소화할 수 있으며 긴급메시지의 충돌 가능성 또한 낮출 수 있게 된다. 시뮬레이션 결과 제안한 방식을 이용하여 긴급메시지를 전파했을 경우 기존의 차량간 프로토콜에 비해 비교적 훨씬 적은 양의 패킷으로 빠른 시간 안에 효과적으로 긴급메시지를 전파할 수 있었다.

손상된 하이퍼큐브상의 메세지 라우팅 알고리즘 (Message Routing Algorithm on an Injured Hypercube)

  • 공헌택;우지운
    • 한국정보처리학회논문지
    • /
    • 제3권2호
    • /
    • pp.242-250
    • /
    • 1996
  • 하이퍼큐브 노드들의 커뮤니케이션은 메세지 라우팅에 의하여 이루어진다. 그러 므로 효율적인 메세지 라우팅은 하이퍼큐브 병렬컴퓨터의 성능에 매우 중요한 요소가 된다. 그러나 하이퍼큐브 노드들은 하드웨어 혹은 소프트웨상의 문제로 인하여 부분적 으로 결함이 발생할 수 있는데, 이를 손상된 하이퍼큐브라 한다. 신뢰성이 높은 하이 퍼큐브 시스템은 이러한 문제점을 극복 해야만 한다. 손상된 하이퍼큐브상에서 신뢰성을 향상시키기 위한 방법 중의 하나는 오류 회복기능을 갖는 메세지 라우팅 알고리즘을 사용하는 것이다. 본 연구에서는 독립된 경로를 이용하여 가능한 최단거리를 갖는 메세지 라우팅 알고리즘을 제안하며, 이 알고리즘의 성능을 분석하기 위하여 시뮬레 이션을 통해 평가한다.

  • PDF

이기종 지휘통제체계 연동을 위한 무장정보 처리 표준화 설계 방안 (A Standardized Design Method of Weapon Information Exchange for Interoperability with Several Kinds of Command and Control System)

  • 신진범;배정일;이동관;고혜승
    • 한국군사과학기술학회지
    • /
    • 제18권6호
    • /
    • pp.771-778
    • /
    • 2015
  • In this paper, we have proposed a design method for standardization of weapon information exchange between a weapon control computer of guided missile system and a high echelon command and control system. Because the weapon control computer based on diverse combat platforms is operated with several kinds of a high echelon system, it is necessary to provide a standardized design method for weapon information exchange between mutual system. In fact, it is possible to standardize a interface design specification of weapon information message because weapon information message is closely related to standard tactical data link message. It is essential that the interface design specification of weapon information is submitted to that of tactical data link information. It seems that this interface design specification is very useful in development process of the future weapon system.

Contention-based Reservation Protocol Using a Counter for Detecting a Source Conflict in WDM Single-hop Optical Network with Non-equivalent Distance

  • Sakuta, Makoto;Nishino, Yoshiyuki;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • 제3권4호
    • /
    • pp.365-373
    • /
    • 2001
  • We propose a new channel reservation protocol which can reduce message delay by using a counter for detection of d source conflict in a WDM single-hop network with non-equivalent propagation delay. A source convict occurs when a source node has the right to transmit more than or equal to two messages simultaneously, which are transmitted using different wavelengths. In such a case, the source node has to newly obtain the right to transmit the message. In the proposed protocol, by using a source conflict counter a source node can detect a source conflict before a wave-length assignment is performed. Therefore, the source node can start a procedure to newly obtain the right to transmit the message which cannot be transmitted due to a source conflict. We analyse the throughput performance by taking the effect of a source conflict into account, and show that the approximate analysis and the computer simulated results are close. Also, from computer simulated results, we show that our proposed protocol can reduce mean message delay dramatically without degrading throughput performance as the offered load becomes large.

  • PDF

Effects of Thinness Promoting Message from TV Media on College Women's Appearance Distortion

  • Mun, Mi-Ra;Kim, Yong-Sook
    • The International Journal of Costume Culture
    • /
    • 제13권1호
    • /
    • pp.26-36
    • /
    • 2010
  • The purpose of this study was to identify effects of thinness promoting message from TV media on college women's appearance distortion. The subjects were 408 college women and survey was done from Aug 10 to 30. 2009. Most college women wanted their height to be taller and weight to be lighter than their actual height and weight, and preferred slimmer figures. Over half of college women enjoyed fashion related TV programs more than diet or plastic surgery related TV programs. College women were classified into 3 groups of TV heavy watcher, TV medium watcher, and TV light watcher according to TV watching time. TV heavy watchers wanted their figures to be slimmer and weight to be lighter than other groups, and were affected by thinness promoting message from TV media more. TV heavy watchers of thinness promoting message related programs showed a tendency of distorting their body more and tried to agree with those TV programs more. Especially, college women agreed with plastic surgery related TV programs more than fashion or diet related TV programs. TV media producers should keep in mind those side-effects and try to show more universal and diverse figures to TV watchers.

  • PDF

태국의 전자거래법에 대한 비교법적 고찰 - 전문 및 일반규정을 중심으로 - (A Comparative Legal Study on the Electronic Transactions Act in Thailand)

  • 심종석;오현석
    • 통상정보연구
    • /
    • 제12권4호
    • /
    • pp.405-427
    • /
    • 2010
  • This legal study is to compare the Electronic Transactions Act in Thailand(hereinafter 'ETA') with mainly other countries electronic transactions acts, such as UNCITRAL MLEC, UECIC, VETA, UCITA and Korea' Electronic Transactions Act The ETA is consisted of 6 chapters which included preamble and definitions. Each chapter's main point as follows. Preamble is related to the name, time of legal effect, scope and definitions. Chapter 1 is not only general principles of electronic transactions, required restriction in addition to specify the limit of application, documentation, evidential weight in reference to the data message, but also the conditions of offer and acceptance through data message, time and place of dispatch and receipt of data message, certification between origination and addressee. According to media-neutrality and the effectiveness security requirement of data message under the information system, legal certification is related to the exchange's declaration of intention, define about origination-addressee of data message. Chapter 2 is composed to provide expressly about the effectiveness security in electronic signature. Those contents are to compare the MLEC, UECIC and Electronic Transactions Act in Korea. Chapter 3 is related to legal definitions that present legal requirement about service relating electronic transaction which contents accept domestic law, the adequate requirement as eligibility, satisfied matter, self-reliance ratio of finance and other detail standard Chapter 4 is deal with the transaction which are public sector and those application requirements. And also this chapter are composed regulations about direct-indirect purpose of Thailand domestic electronic government.

  • PDF

최대한의 멸균 차단법의 이행도와 중심정맥관 관련 혈류감염 발생에 대한 단문문자메시지 중재 효과 (Effects of a Short Message Service Intervention on Adherence to Maximal Sterile Barrier Precautions and Catheter-Related Blood Stream Infections)

  • 강문희;김동옥
    • 간호행정학회지
    • /
    • 제18권2호
    • /
    • pp.244-250
    • /
    • 2012
  • Purpose: The purpose of this study was to investigate the effect of a short message service intervention on adherence to maximal barrier precautions (MBP) and catheter-related blood stream infections. Method: The data were collected from March to September, 2008, at an 826-bed university-affiliated hospital in Daejeon. The study participants were 24 physicians who were inserting central catheters and 133 patients (control group 78 and intervention group 55) with central catheter insertions. The researcher sent the message (adherence to MBP and optimal recommendations) to each internal medicine doctor using the short message service (SMS) for cellular phones. Messages were sent monthly for 3 months. Data were analyzed by chi-square test and t-test using SPSS 12.0 windows program. Result: Adherence to maximal barrier precautions was significantly increased from 44.9% to 69.1% (p=.006) after the SMS intervention. But changes in the rate of CRBSI (catheter related blood stream infection) between the intervention group (1.89) and the control group (4.45) were not significant (p=.323). Conclusions: The results indicate that the SMS intervention is effective in increasing the adherence to maximal barrier precautions and the SMS intervention can be recommended for utilization in infection control nursing practice.