• Title/Summary/Keyword: strength of security

Search Result 288, Processing Time 0.027 seconds

Hydroacoustic Survey of Fish Distribution and Aggregation Characteristics in the Yongdam Reservoir, Korea (수중음향기법을 이용한 용담호의 어류 분포특성 연구)

  • Lee, Hyungbeen;Lee, Kyounghoon;Kim, Seonghun;Kim, In-Ok;Kang, Donhyug
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.47 no.6
    • /
    • pp.1055-1062
    • /
    • 2014
  • Hydroacoustic surveys were conducted for spatio-temporal distribution and size estimation of fish in the Yongdam reservoir, Korea, from April to July 2014. Acoustic data were collected along acoustic transects using a 120 kHz scientific echosounder. The received acoustic data were the in situ acoustic target strength (dB) and nautical area scattering coefficient ($m^2/mile^2$). Data on fish behavioral patterns and size were collected using a DIDSON acoustic camera at stationary stations. Fish were mainly distributed in the center channel and close to the outer Yongdam reservoir. Acoustic density of fish in the summer season were higher than in the spring season. The seasonal vertical distribution pattern of fish aggregations may be strongly related to the vertical temperature structure. The size distribution of fish obtained from an acoustic camera correlated well with the acoustic size of fish from an echosounder.

Analysis of Grover Attack Cost and Post-Quantum Security Strength Evaluation for Lightweight Cipher Sparkle (경량암호 Sparkle에 대한 Grover 공격 비용 분석 및 양자 후 보안 강도 평가)

  • Yang, Yu-Jin;Jang, Kyung-Bae;Song, Gyeong-Ju;Kim, Hyun-ji;Lim, Se-jin;Seo, Hwa-jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.183-186
    • /
    • 2022
  • 고성능 양자 컴퓨터가 개발될 것으로 기대됨에 따라 잠재적인 양자 컴퓨터의 공격으로부터 안전한 양자 후 보안 시스템을 구축하기 위한 연구들이 진행되고 있다. 대표적인 양자 알고리즘인 Grover 알고리즘이 대칭키 암호에 적용될 경우 보안 강도가 제곱근으로 감소되는 보안 훼손이 발생한다. NIST는 대칭키 암호에 대한 양자 후 보안 요구사항으로, 암호 알고리즘 공격에 요구되는 Grover 알고리즘 비용을 기준을 기준으로 양자 후 보안 강도를 추정하고 있다. 대칭키 암호를 공격하기 위한 Grover 알고리즘의 비용은 대상 암호화 알고리즘의 양자 회로 복잡도에 따라 결정된다. 본 논문에서는 NIST 경량암호 공모전 최종 후보에 오른 Sparkle 알고리즘의 양자 회로를 효율적으로 구현하고 Grover 알고리즘을 적용하기 위한 양자 비용에 대해 분석한다. 마지막으로, NIST 양자 후 보안 요구사항과 분석한 비용을 기반으로 경량암호 Sparkle에 대한 양자 후 보안 강도를 평가한다. 양자 회로 구현 및 비용 분석에는 양자 프로그래밍 툴인 ProjectQ가 사용되었다.

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

A Password-based Efficient Key Exchange Protocol (패스워드 기반의 효율적인 키 교환 프로토콜)

  • 이성운;김현성;유기영
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.347-352
    • /
    • 2004
  • In this paper, we propose a new key exchange protocol which authenticates each other and shares a session key between a user and a server over an insecure channel using only a small password. The security of the protocol is based on the difficulty of solving the discrete logarithm problem and the Diffie-Hellman problem and the cryptographic strength of hash function. The protocol is secure against the man-in-the-middle attack, the password guessing attack, the Denning-Sacco attack, and the stolen-verifier attack, and provide the perfect forward secrecy. Furthermore, it is more efficient than other well-known protocols in terms of protocol execution time because it could be executed in parallel and has a simple structure.

A Study on the Factors Affecting Work Performance among Systems Librarians in Academic Libraries (대학도서관 시스템 라이브러리언의 작업성과를 높이는 요인에 관한 연구)

  • Bang Jun-Phill
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.231-250
    • /
    • 1998
  • The purpose of this study was to investigate factors affecting work performance among systems librarians in Korean academic libraries. The factors were divided in three categories: Job characteristics, organizational characteristics, and individual characteristics. Data from questionnaire were analyzed using the SPSS for windows. Multiple regression analyses were performed on three sets of variables related to the hypotheses of the study. The result of the analysis Identified the folowing factors : Job characteristics which affect work performance among systems librarians in academic library are autonomy, task significance, skill variety, and feedback from supervision. Organizational characteristics which affect work performance are job security, capability of automation systems, coworkers. Individual characteristics which affect work performance are growth need strength, knowledge, and systems librarian experience.

  • PDF

Active Network Performance Improvement for Security Application (보안 응용을 위한 능동 네트워크 성능 향상 방안)

  • 채철주;이명선;김상국;임정목;이성현;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.416-419
    • /
    • 2004
  • Computer simulation has used to a area of military training in recent years. Computer simulation endow a military nan with field raining such as combat experience without operating combat strength or capabilities. To samely construct simulation environment against actual combat environment is to well construct ㏈ to operate war game model, associate among federates on network. we construct virtual combat environment enabling to efficiently manage network traffic among federates(or active nodes) on active network that construct virtual military training spare such as urgent combat field needed to rapidly transfer combat information including image and video.

  • PDF

Engineering Application of Direct Shear Box Test for Slope Stability Problem (사면 안정 문제에 대한 직접 전단 시험의 공학적 적용)

  • Ikejiri, Katsutoshi;Shibuya, Satoru;Jung, Min-Su;Chae, Jong-Gil
    • Journal of the Korean Geotechnical Society
    • /
    • v.24 no.12
    • /
    • pp.65-73
    • /
    • 2008
  • In the current practice for slope stability problem in Japan, the shear strength, $\tau$, mobilized along the failure surface is usually estimated based on an empirical approximation in which the cohesion, c, is assumed to be equal to the soil thickness above the supposed slip surface, d(m). This approximation is advantageous in that the result of stability analysis is not influenced by the designers in charge. However, since the methodology has little theoretical background, the cohesion may often be grossly overestimated, and conversely the angle of shear resistance, $\phi$, is significantly underestimated, when the soil thickness above the supposed slip surface is quite large. In this paper, a case record of natural slope failure that took place in Hyogo Prefecture in 2007, is described in detail for the case in which the shear strength along the collapsed surface was carefully examined in a series of direct shear box (DSB) tests by considering the effects of in-situ shear stress along the slip surface. It is demonstrated that the factor of safety agrees with that of in-situ conditions when the shear strength from this kind of DSB test was employed for the back-analysis of the slope failure.

The Critical Factors on Improvement of Medical institution Competitiveness (의료기관 경쟁력 향상에 영향을 미치는 핵심 요인)

  • Yeom, Jae-Kwang;Kang, Chang-Yeol
    • Korea Journal of Hospital Management
    • /
    • v.12 no.1
    • /
    • pp.1-30
    • /
    • 2007
  • The study carried out a survey with employees of hospitals located in Daejeon, Chungnam, and Chungbuk from Sep. 12 to Sep. 30, 2005 in order to derive primary elements that affect the improvement of hospital's competitiveness. The study investigated and analyzed the employees' recognition on the change of competitive environment caused by the change of medical environment. The study also analyzed the elements that affect the hospital's competitiveness and the competitive strategies of the hospitals. The conclusion of this study can be summarized as follows. 1. Summary 1) Most of the employees responded that there is a rival in the competitive environment and the competitive is intense. Especially when the employees are married, live in urban areas, have an education level of university graduate or are managers, they tend to think the competitive is very intense. Also, they said that the competitive is based upon the quality of medical service. They mentioned the element that has the biggest effect on the competitiveness is the element of medical consumer and they recognized that the medical services in university and general hospitals have more competitiveness than the one-department hospitals. 2) It was investigated that the medical technique service has the most effect on the hospital's competitiveness. Also, the external service of medical techniques also has a large effect on the hospital's competitiveness. 3) When they were asked for the factors that affect the patients' decision on selecting a hospital, most of them responded "capability and technique of the medical staffs." Also, they said that "sufficient explanation from doctors" and "special center and clinic" are the factors that have big effects on the patients' decision. 4) In the SWOT analysis, most of them responded that the strength is the hospital's characteristics and the weakness is insufficient and obsolete equipment. They said the opportunity is the demands for professional medical service and the risk is the intense competitive among the hospitals. 5) In the SWOT strategy, they emphasized the strategy that uses the opportunity and the strength and the strategy that uses the opportunity while overcoming the weakness. 6) As for the basic competition strategy, most of them thought of the strategy of professionalizing the medical service most importantly. Next, they focused on the strategy of distinct service and the strategy of lower prime cost. 2. Conclusion 1) Because service competition between hospitals is happening seriously, need competitiveness security through right awareness transfer and satisfaction upgrade about medical consumer. 2) For medical technique service upgrade that equip Hospital's competitiveness but affects most, must solidify the countermeasure because professionalizing the medical service and newest medical technique induction should be achieved first, and compose task force for the external service of medical techniques improvement. 3) To improve SWOT of hospital, opportunity and the strength strategy choice that rescue hospital's characteristics heightening professionalizing the medical service level is fancied. 4) As for the basic competition strategy, will have to try in phase triangular position of hospital which is trusted medical level upgrade and excellent manpower security and finance independence through upgrade. The study was only done with hospitals in Daejeon, Chungnam and Chungbuk. Also, it is a study from the side of suppliers of medical service so there are limitations. However, the significance of the study is to present the basic data for improvement of hospital's competitiveness by examining the importance of medical techniques and external service of medical techniques that are the main effects on the improvement of hospital's competitiveness.

  • PDF

The Construction Direction of the ROK NAVY for the Protection of Marine Sovereignty (국가의 해양주권 수호를 위한 한국해군의 전력건설 방향)

  • Shin, In-Kyun
    • Strategy21
    • /
    • s.30
    • /
    • pp.99-142
    • /
    • 2012
  • Withe increased North Korea's security threats, the South Korean navy has been faced with deteriorating security environment. While North Korea has increased asymmetric forces in the maritime and underwater with the development of nuclear weapons, and China and Japan have made a large investment in the buildup of naval forces, the power of the Pacific fleet of the US, a key ally is expected to be weakened. The biggest threat comes from China's intervention in case of full-scale war with North Korea, but low-density conflict issues are also serious problems. North Korea has violated the Armistice Agreement 2,660 times since the end of Korean War, among which the number of marine provocations reaches 1,430 times, and the tension over the NLL issue has been intensifying. With tension mounting between Korea and Japan over the Dokdo issue and conflict escalating with China over Ieo do Islet, the US Navy has confronted situation where it cannot fully concentrate on the security of the Korean peninsula, which leads to need for strengthening of South Korea's naval forces. Let's look at naval forces of neighboring countries. North Korea is threatening South Korean navy with its increased asymmetric forces, including submarines. China has achieved the remarkable development of naval forces since the promotion of 3-step plan to strengthen naval power from 1989, and it now retains highly modernized naval forces. Japan makes an investment in the construction of stat of the art warship every year. Since Japan's warship boasts of its advanced performance, Japan's Maritime Self Defense Force is evaluated the second most powerful behind the US Navy on the assumption that submarine power is not included in the naval forces. In this situation, naval power construction of South Korean navy should be done in phases, focusing on the followings; First, military strength to repel the energy warship quickly without any damage in case of battle with North Korea needs to be secured. Second, it is necessary to develop abilities to discourage the use of nuclear weapons of North Korea and attack its nuclear facilities in case of emergency. Third, construction of military power to suppress armed provocations from China and Japan is required. Based on the above naval power construction methods, the direction of power construction is suggested as follows. The sea fleet needs to build up its war potential to defeat the naval forces of North Korea quickly and participate in anti-submarine operations in response to North Korea's provocations. The task fleet should be composed of 3 task flotilla and retain the power to support the sea fleet and suppress the occurrence of maritime disputes with neighboring countries. In addition, it is necessary to expand submarine power, a high value power asset in preparation for establishment of submarine headquarters in 2015, develop anti-submarine helicopter and load SLAM-ER missile onto P-3C patrol aircraft. In case of maine corps, division class military force should be able to conduct landing operations. It takes more than 10 years to construct a new warship. Accordingly, it is necessary to establish plans for naval power construction carefully in consideration of reality and future. For the naval forces to safeguard maritime sovereignty and contribute to national security, the acquisition of a huge budget and buildup of military power is required. In this regard, enhancement of naval power can be achieved only through national, political and military understanding and agreement. It is necessary to let the nation know that modern naval forces with improved weapon system can serve as comprehensive armed forces to secure the command of the sea, perform defense of territory and territorial sky and attack the enemy's strategic facilities and budget inputted in the naval forces is the essential source for early end of the war and minimization of damage to the people. If the naval power construction is not realized, we can be faced with a national disgrace of usurpation of national sovereignty of 100 years ago. Accordingly, the strengthening of naval forces must be realized.

  • PDF

The Role of Tolerance to Promote the Improving the Quality of Training the Specialists in the Information Society

  • Oleksandr, Makarenko;Inna, Levenok;Valentyna, Shakhrai;Liudmyla, Koval;Tetiana, Tyulpa;Andrii, Shevchuk;Olena, Bida
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.63-70
    • /
    • 2022
  • The essence of the definition of "tolerance" is analyzed. Motivational, knowledge and behavioral criteria for tolerance of future teachers are highlighted. Indicators of the motivational criterion are the formation of value orientations, motivational orientation, and the development of empathy. Originality and productivity of thoughts and judgments, tact of dialogue, pedagogical ethics and tact are confirmed as indicators of the knowledge criterion. The behavioral criterion includes social activity as a life position, emotional and volitional endurance, and self-control of one's own position. The formation of tolerance is influenced by a number of factors: the social environment, the information society, existing stereotypes and ideas in society, the system of education and relationships between people, and the system of values. The main factors that contribute to the education of tolerance in future teachers are highlighted. Analyzing the structure of tolerance, it is necessary to distinguish the following functions of tolerance: - motivational (determines the composition and strength of motivation for social activity and behavior, promotes the development of life experience, because it allows the individual to accept other points of view and vision of the solution; - informational (understanding the situation, the personality of another person); - regulatory (tolerance has a close connection with the strong - willed qualities of a person: endurance, selfcontrol, self-regulation, which were formed in the process of Education); - adaptive (allows the individual to develop in the process of joint activity a positive, emotional, stable attitude to the activity itself, which the individual carries out, to the object and subject of joint relations). The implementation of pedagogical functions in the information society: educational, organizational, predictive, informational, communicative, controlling, etc. provides grounds to consider pedagogical tolerance as an integrative personal quality of a representative of any profession in the field of "person-person". The positions that should become conditions for the formation of tolerance of the future teacher in the information society are listed.