• Title/Summary/Keyword: proof of security

Search Result 184, Processing Time 0.025 seconds

A Fair Certified Electronic Mail Protocol that Enhances Guarantee of Reception (수신 보장성이 향상된 공평한 배달 증명 전자 메일 프로토콜)

  • 박용수;조유근
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.86-94
    • /
    • 2003
  • Certified e-mail system guarantees that recipient will get mail content if and only if mall originator receives a receipt. Unlike previous schemes, Optimistic protocols recently published generate a receipt when it meets the condition that the mail content can be accessed by recliner at any time. So originator cannot assure the delivery of e-mail although he can get a receipt. In this paper, we show some flaws in optimistic protocols and propose improved schemes using delivery deadline. Modified protocols guarantee proof-of-receipt and eliminate the problem mentioned above. Furthermore, proposed modification technique can be applicable to most optimistic protocols and is efficient in the sense that modified schemes do not increase the number of messages.

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

  • Zhu, Hongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.811-829
    • /
    • 2015
  • One-way authenticated key agreement protocols, aiming at solving the problems to establish secure communications over public insecure networks, can achieve one-way authentication of communicating entities for giving a specific user strong anonymity and confidentiality of transmitted data. Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation. Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals. About multi-server architecture, which allow the user to register at the registration center (RC) once and can access all the permitted services provided by the eligible servers. The combination of above-mentioned ideas can lead to a high-practical scheme in the universal client/server architecture. Based on these motivations, the paper firstly proposed a new one-way authenticated key agreement scheme based on multi-server architecture. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.

A DID-Based Transaction Model that Guarantees the Reliability of Used Car Data (중고자동차 데이터의 신뢰성을 보장하는 DID기반 거래 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.103-110
    • /
    • 2022
  • Online transactions are more familiar in various fields due to the development of the ICT and the increase in trading platforms. In particular, the amount of transactions is increasing due to the increase in used transaction platforms and users, and reliability is very important due to the nature of used transactions. Among them, the used car market is very active because automobiles are operated over a long period of time. However, used car transactions are a representative market to which information asymmetry is applied. In this paper presents a DID-based transaction model that guarantees reliability to solve problems with false advertisements and false sales in used car transactions. In the used car transaction model, sellers only register data issued by the issuing agency to prevent false sales at the time of initial sales registration. It is authenticated with DID Auth in the issuance process, it is safe from attacks such as sniping and middleman attacks. In the presented transaction model, integrity is verified with VP's Proof item to increase reliability and solve information asymmetry. Also, through direct transactions between buyers and sellers, there is no third-party intervention, which has the effect of reducing fees.

A Study for International Standardization of China Arbitration System (중국중재제도의 국제표준화에 대한 연구)

  • Kim, Suk-Chul
    • Journal of Arbitration Studies
    • /
    • v.18 no.3
    • /
    • pp.117-138
    • /
    • 2008
  • This study lies on building the International Standardization of China Arbitration System for improving a relationship of mutual trust and the safety trade between China and other worldwide countries, especially, South Korea as their one of the biggest trading partners through the comparative analysis of China and UNCITRAL Arbitration Law. In this analysis, the differences from China and UNCITRAL in arbitration law are like belows ; lack of arbitrator's international mind, the limitation of private property right, prohibition of Ad. hoc arbitration, arbitrator's biased nationalism, localism, and their short specialties. a deficiency of the objectiveness for arbitrator's election, a judgement rejection of claimants by using nonattendance and walkout, impossibility of prior and temporary property custody for execution of arbitration award. etc. For the improvement of the International Standardization of China Arbitration, this paper propose as follows: 1) Extension of private property right, reorganization of tax system, realization of open competition, exclusion of 'Sinocentrism', globalization of arbitration system 2) The abolition of old fashioned bureaucracy with approval for ad.hoc arbitration 3) An education for arbitrator's internationalization, specialty, and to promote legal knowledge 4) A settlement of the third country arbitrators' selection for reflecting interested party's decision by the court in a selection system of arbitration committee. 5) Institutionalization of arbitration judgment that prevent for claimant's avoidance by using a withdrawal and an intentional absent 6) A permission of the right of claimant's court custody directly before the begging of arbitration request for the prevention for destruction of evidence and property concealment 7) Grant of the arbitration tribunal's interim measures of protection for private property preservation to the third party, proof security, prevention from the loss that selling the corruptible goods 8) Improvement of arbitration's efficiency from the exclusion of the obstacles that are forgery, concealed evidence, and arbitrator's bribe taking Lastly, I hope that this study will serve to promote friendly economic relationship between China and South Korea and strive for international equilibrium through the achievement of China Arbitration's International Standardization. I will finish this paper with a firm belief that this will lead to more advanced studies.

  • PDF

A STUDY ON DEVELOPING A DESIGN OF SUPERSONIC HUMIDIFIER FOR HOME USE. - With a focus on 3 domestic companys Household electric appliances - (가정용 초음파 가습기 디자인개발에 관한 연구 - 국내가전 3사를 중심으로 -)

  • 오성진
    • Archives of design research
    • /
    • v.6 no.1
    • /
    • pp.23-46
    • /
    • 1993
  • The development of technology in modern industrial world which grows and changes every day is shortening the cycle of life span of products, so there is a flood of products around us. It is enough to say that this phenomenon leads to further emphasis on the aspect of design for human being. It is not a new fact that to design for the rational function and the modeling from to make a combination and to satisfy consumers' desire is a short cut to gain competitive superiority in developing new products for MIS security. Therefore the design which plays a leading role in the activity of creating more convenient, more aesthetic, and more econemical products is called 'NEW CORPORATE WEAPON'. The amount of effort made for developing products is different in each company, but recently the plan to develope new products and its process arouse more interest. This thesis purports to improve objective understanding about the development of design by investigating products development research and the process of analysis and designing as a case study on developing a domestic supersonic humidifier. This thesis consists of five chapters in all. In chapter one as a preface, the purpose the method and the scope of the study is described. Chapter two contains my effort to grasp the background of study on the design and the basic structure of supersonic humidifier. Chapter three is an examination into the present conditions of supersonic humidifier used in domestic and foreign area, and the shape of design. In chapter four, a guide for the development of design is established. The idea sketch based on a fundamental shape and the drawing are added to this. In chapter five on the basis of the result of analysis in the preceding research I describe the development of design of products on the premise that marketing gives proof for them but the products oriented by manufacturer are not included in this case. In this thesis, I try to recognize the process of the develpment of design and the importance of the plan for design in developing products by examining an investigative and analytic study on the design of products.

  • PDF

An Empirical Study on the Competition Factor Electronic Logistics Information and International Logistics Management (국제물류관리와 전자적물류정보의 경쟁요인에 관한 실증연구)

  • Kwak, Hyun
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.257-283
    • /
    • 2007
  • As Global industrial structure is diversified, multinational corporations accomplished fast internationalization to introduction of new management policy by development of an IT technology. Enterprise' business environment is changing transcending border. To overcome raging waves of change accident and to be secured enterprise's future, the logistics is recognized the third profit source joining in curtailment of sale enlargement, production cost. To seek cost saving or reform in logistics class that is last area of pursuit of profits within ancient city life in the fast lane from these viewpoint, importance of study that integrates and manages international logistics bases supply neck walk is emphasized. Specially, to meet on in terms of competitive power security regarding curtailment of logistics cost is available through link between logistics bases, various consumer's request, merchandise and service logistics management that supply fixed quantity as is reliable in right place at good season was embossed by point game plan of business management, and SCM efficiency anger of mortification international logistics activity importance of study that see at that dominate competitive advantage point bring. This study analyzes interrelation and presents model for integration of international logistics bases supply network with supply network habit at factor and supply chain, and supply network activity in integration of supply chain process and production. Also, it establishes following method of study to achieve study purpose for actual proof analysis for integration sequence of international logistics bases supply network. Specially, immersion of network and supply network, very high interrelation appeared by thing which is with international logistics base supply network integration. The integration of international logistics base supply network means that the enterprises which give trust and sincerity deal with market environment change positively and can decide proceeding of various cooperative work. Also, it means the possibility by necessity of cooperative relation and interdependence to continuous immersion and normative immersion, for the maintain of long business relations.

  • PDF

A Study on the Characteristics of Underwater Explosion for the Development of a Non-Explosive Test System (무폭약 시험 장치 개발을 위한 수중폭발 특성에 대한 연구)

  • Lee, Hansol;Park, Kyudong;Na, Yangsub;Lee, Seunggyu;Pack, Kyunghoon;Chung, Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.57 no.6
    • /
    • pp.322-330
    • /
    • 2020
  • This study deals with underwater explosion (UNDEX) characteristics of various non-explosive underwater shock sources for the development of non-explosive underwater shock testing devices. UNDEX can neutralize ships' structure and the equipment onboard causing serious damage to combat and survivability. The shock proof performance of naval ships has been for a long time studied through simulations, but full-scale Live Fire Test and Evaluation (LFT&E) using real explosives have been limited due to the high risk and cost. For this reason, many researches have been tried to develop full scale ship shock tests without using actual explosives. In this study, experiments were conducted to find the characteristics of the underwater shock waves from actual explosive and non-explosive shock sources such as the airbag inflators and Vaporizing Foil Actuator (VFA). In order to derive the empirical equation for the maximum pressure value of the underwater shock wave generated by the non-explosive impact source, repeated experiments were conducted according to the number and distance. In addition, a Shock Response Spectrum (SRS) technique, which is a frequency-based function, was used to compare the response of floating bodies generated by underwater shock waves from each explosion source. In order to compare the magnitude of the underwater shock waves generated by each explosion source, Keel Shock Factor (KSF), which is a measure for estimating the amount of shock experienced by a naval ship from an underwater explosionan, was used.

Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

  • Xu, Guangwei;Lai, Miaolin;Feng, Xiangyang;Huang, Qiubo;Luo, Xin;Li, Li;Li, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.558-579
    • /
    • 2021
  • The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers' challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

Design and Implementation of a Manage System for CORBA-based Distrbuted Multimedia Services (CORBA 기반의 분산 멀티미디어 서비스를 위한 관리시스템의 설계와 구현)

  • Gong, Ji-Yeong;Hong, Won-Gi;Kim, Dong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.564-573
    • /
    • 1999
  • Recently, as the development and use of distributed multimedia services are growing explosively in every aspects of our lives, administrators of multimedia services are very concerned with providing users with reliable and efficient services. However, the management of distributed multimedia services is a very complex and troublesome work such that a flexible but powerful management system is necessary. This paper proposes a management system for managing CORBA-based distributed multimedia services. We have developed an architecture for the management system and defined a set of management services needed to monitor and control distributed multimedia services. The architecture consists of several objects, which perform configuration management, fault management, security management and event management. A generic distributed multimedia service (DMS) MIB has been defined for the management of various multimedia services and applications. In addition, as a proof of concept, we have developed a Web-based management system for a CORBA-based distributed multimedia system called MAESTRO. The prototype management system uses OrbixWeb to interface with the management server which is implemented as a set of CORBA objects. Though our management system has been developed for distributed multimedia services, it can easily manage other CORBA-based services and applications.

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.117-126
    • /
    • 2007
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBs. Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these Paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF