Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.9 No.10 (39건)
No
1

Efficient Mining Maximal Constant Row Bicluster in Function-resource Matrix for IMA Safety Analysis

Miao Wang, Zhiyong Xiong, Liang Xu, Lihua Zhang, Qingfan Gu, Guoqing Wang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.1-20

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Integrated Modular Avionics (IMA) uses task synthesis, function fusion and resource integration to achieve the goal of low cost, high efficiency, high efficacy, high performance and high reliability. However, safety issue is caused in the system integration process. In this paper, firstly, we use data mining technology to describe resource-layer safety model, function-layer safety model and task-layer safety model; secondly, we proposed an efficient bicluster mining algorithm: LowCluster, to effectively mine all the maximal constant row biclusters with low usage rate in real-valued function-resource matrix for IMA safety analysis. In LowCluster algorithm, a sample weighted graph is constructed firstly, it includes all resource collections between both samples which meet the definition of low usage rate; then, all the maximal constant row biclusters with low usage rate are mined using sample-growth and depth-first method in the sample weighted graph. In order to improve the mining efficiency, LowCluster algorithm uses pruning strategy to ensure the mining of maximal bicluster without candidate maintenance. The experimental results show that LowCluster algorithm is more efficient than traditional constant row biclustering algorithm, and using our proposed LowCluster algorithm can find the error reason when executing more functions, which will help to improve system safety analysis.

2

LDPC Encoder and Decoder Architecture for Coding 3-bit Message Vector

Gade Sribala, D.V.N. Sukanya, K.Gouthami, Tai-hoon Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.21-30

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Low Density Parity Check codes are FEC codes and consequently data rate is more. They are linear error correcting codes for transmitting a message over a noisy transmission channel. LDPC codes are finding increasing use in applications requiring reliable and highly efficient information transfer over noisy channels. These codes are capable of performing near to Shannon limit performance, Low Decoding Complexity. The main advantage of the parity check matrix is the decoder can correct all single-bit errors. In this Paper LDPC encoder and decoder architecture for coding 3-bit message vector will be analyzed and also designed using VHDL.

3

Joint Encryption and Error Correction Technical Research Applied an Efficient Turbo Code

Jianbin Yao, Jianhua Liu, Yang Yang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.31-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to improve safety and reliability of secure communication system, we propose a joint encryption error correction coding scheme. In this scheme, a conflict-free interleaver parallel decoding method of Turbo codes is used, which is known simply as” efficient Turbo codes”, and it is combined with chaotic encryption together. This scheme makes the information encryption and efficient Turbo coding step be completed at the same time, and explain the encryption/decryption process through the efficient parallel decoding method, and verify the feasibility of the scheme through the application of Turbo code in image transmission as an example. The Matlab simulation results show that, the scheme performance is more excellent and effective in security and reliability than the existing joint encryption and error correction coding scheme. Our proposed scheme may provide an excellent encoding candidate scheme for secure communication system.

4

Application of Multi-attribute Cloud Decision Method in Congestion Control

Zhao Yu-hong, Wu Ai-Yan, Zheng Xue-feng, Tu Xu-yan

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.47-58

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the process of congestion control decision, there are two main problems. One is how to solve the uncertainty of attributes. The other is how to solve the operation between qualitative and quantitative. So, the paper uses cloud model, and proposes a fuzzy multi-attribute cloud decision method. By simulation experiment, it can effectively solve the uncertainty of attributes evaluated, especially coexistence of randomness and fuzzyness, and the operation between linguistic evaluation value and evaluation data. It can easily be used to solve the multi-attribute decision-making or evaluation problem with uncertainty in various fields.

5

Security of Personal Bio Data in Mobile Health Applications for the Elderly

Jong Tak Kim, Un Gu Kang, Young Ho Lee, Byung Mun Lee

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.59-70

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Mobile devices used for heath can be used anywhere including homes or offices, thanks to their mobility and portability. Moreover since they are used for monitoring bio-information as well as medical services in hospital, there is an increasing possibility of the leakage of personal bio data, which in turn increases the possibility of spoofing that data. Therefore, it is critical to establish countermeasures for privacy protection. More specifically, there is an increasing need for secure transmission of personal bio data between mobile health applications and health servers which archive personal bio data. Thus in this study, the authors implemented a system which transmits personal bio data (e.g. blood pressure, blood pressures and weight, etc.) to the server safely without saving it in the mobile devices using MD5 and Spritz. To verify the security of the implemented system, the authors spoofed data and succeeded in detecting all spoofed data.

6

Robust Fault Diagnosis Algorithm of Nonlinear System based on Group Algebra Theory

Zhao Jing-yun, Han Xiao, Fu Zhen-duo, Liao Yue-feng

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.71-82

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Dealt with the Lipschitz nonlinear system with unknown input disturbances, the robust fault diagnosis observer algorithm is proposed. In order to improve the limitations of the traditional methods on assumption that the norm of unknown input disturbances is bounded, the disturbances constraint condition that satisfies the system stability is derived via the group algebra theory. It is verified that a class of systems under the norm bounded constraint condition is unstable. The robustness performance index is defined to ensure the robustness of the fault diagnosis observer designed. The fault diagnosis observer constructed is robust asymptotic convergence observer under the constraint of robustness performance index derived using the Gronwall lemma. In the decision-making, adaptive threshold is designed. Finally, the simulations are performed on missile attitude control system. Simulation results show that the effectiveness of the algorithm proposed.

7

Fingerprint Spoof Detection Using Quality Features

Arunalatha G, M. Ezhilarasan

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.83-94

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Biometrics refers to automated recognition of individuals based on their biological and behavioral characteristics. Biometric systems are widely used for security. They are used in forensic and commercial applications. Among all biometric techniques, fingerprint recognition is the most widely used for personal identification systems due to its permanence and uniqueness. But biometric systems are vulnerable to certain type of attacks. Spoofing refers to the fraudulent action by an unauthorized person into biometric systems using fake input that reproduces one of the authorized person’s biometric input. Spoof detection provides extra level of authentication to biometrics. It is used to prevent forgeries. The fingerprint spoof detection is performed by measuring the following quality features of fingerprint. They are Spatial Coherence, Clustering Factor, Gabor Features, Uniformity of Frequency field, Ridge frequency, Direction map and Contrast map. This approach is based on fingerprint image quality. This technique is software based as it requires no external hardware. This approach is inexpensive.

8

Extended three-particle GHZ state decoy is introduced in controlled quantum secure direct communication to improve eavesdropping detection probability and prevent correlation-elicitation (CE) attack. Each particle of extended three-particle GHZ state decoy is inserted into sending particles to detect eavesdroppers, which reaches 63% eavesdropping detection probability. And decoy particles prevent the receiver from obtaining the correct correlation between particle 1 and particle 2 before the sender coding on them, so that he can not get any secret information without the controller's permission. In the security analysis, the maximum amount of information that a qubit contains is obtained by introducing the entropy theory method, and two decoy strategies are compared quantitatively. If the eavesdroppers intend to eavesdrop on secret information, the per qubit detection rate of using only two particles of extended three-particle GHZ state as decoy is 58%;while the presented protocol using three particles of extended three-particle GHZ state as decoy reaches per qubit 63%.

9

An Adaptive Gray Scale Watermarking Method in Wavelet Domain

Jialing Han, Xiaohui Zhao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.103-114

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the past a few years, many watermarking approaches have been proposed for solving the copyright protection problems. This paper presents a new gray scale watermarking method in wavelet domain based on the compression of the watermark and the pretreatment of the original image. Through the compression of watermark, it can greatly reduce the embedding capacity of the watermark, which can embed more watermark bits in the host image. Through the preprocessing of the original image based on human visual system’s characteristic, it can ensure the imperceptibility. The use of threshold T can adaptively determine the quantity of embedded blocks, and control the capacity of embedded secret information. The experimental results show that our method has an excellent transparency and robustness.

10

Due to a recent increase of usage of Internet and users of smart devices, there has been an increasing trend of wireless networks that can be conveniently used. However, wireless network is exposed to a weaker security than wire network. Because of such a security-related issue, users are exposed to the crime and also financial damage as well. In addition, there is an issue that using the AP of wireless network makes it feasible for a party to break into an internal network. This study is intended to suggest a system for prevention of harmful invasion with access from wireless LAN Access Point. In order to verify the function of invasion prevention system, tools used in the penetration testing were utilized preparing for a scenario that made an attempt of attack on wireless network.

11

Embedding Binary Image Watermark in DC Components of All Phase Discrete Cosine Biorthogonal Transform

Fanfan Yang, Chengyou Wang, Wei Huang, Xiao Zhou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.125-136

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Watermarking technique provides the possibility for copyright protection. Discrete cosine transform (DCT) is the most popular tool used in watermarking algorithm. But the watermarking algorithm based on DCT is not the most ideal choice in terms of the complexity and robustness. All phase discrete cosine biorthogonal transform (APDCBT) owns the characteristics of high frequency attenuation and good applications in image coding, image denoising and other fields of digital image processing, which provides an efficient method for watermarking. In this paper, a new watermarking algorithm based on APDCBT is proposed. Besides, the binary image watermark is scrambled by Arnold transform to enhance its privacy and robustness greatly in our algorithm. The watermark information is embedded in direct-current (DC) components considering DC components have much larger perceptual capacity. Compared with the DCT algorithm, the proposed algorithm has stronger robustness in embedding and extracting the watermark. Experimental results show that our algorithm can satisfy the imperceptibility and robustness very well. Furthermore, our algorithm is tested against four kinds of attacks: JPEG compression, Gaussian noise, salt & pepper noise and rotation.

12

Research on Detection Algorithm of WEB Crawler

Hongyan Zhao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.137-146

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the research of Web crawler, the most important things are structure design and solution of the key technologies. Based on the work of other people, we described the structure design of a distribute Web crawler, which including the organization of hardware and module partition of software. In this paper, one PC is utilized as the main node, and other PCs as the common nodes which are connected in LAN. The software architecture included main node design and common node design. Then, we analyzed solutions of the major techniques of the distributed Web crawler, such as how the nodes of the crawler cooperate with each other, how the task is distributed, how to keep the important Web fresh. We have proposed some practicable arithmetic to solve the problems mentioned above. Besides, we implemented a robust, distensible, customized, distributed Web crawler, and anatomized it. At last, we gave the results of two experiments, including common test and a site download test.

13

An Approach to Generate 2-Dimensional AVK to Enhance Security of Shared Information

Manash Pratim Dutta, Subhasish Banerjee, C. T. Bhunia

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.147-154

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As the sharing of information through the communication channels increases, the indispensability of maintaining confidentiality of those shared information also increases proportionally. Providing reasonable security over the insecure channel is a challenging research. Due to the advancement of computational efficiency, confidentiality of the information cannot be assured with the help of a static key. Keeping this in mind, many researchers have proposed several time variant key generation techniques, out of which Automatic Variable Key (AVK) is a novel approach. In conventional AVK and in different variations of AVK; the key varies every time as new data is exchanged between sender and receiver while the key size remains constant throughout the data communication. Therefore, to increase the randomness among the successive keys that is the key for ensuring the greater security, we have proposed a 2-dimensional AVK in which the auto generated keys not only vary in bits sequence (i.e. session by session) but also in size.

14

To confirm the fuzzy rules satisfying given approaching error of variable universe adaptive fuzzy controller, this paper designs a universal approaching error boundary of adaptive fuzzy controller. With explicating the structure of variable universe adaptive fuzzy controller, the approaching error boundary of Single-Input and Single-Output or Multi-Input and Multi-Output fuzzy control system should be ascertained respectively for physical condition. The model simulation results indicate the better performance of the new method in comparison with the traditional controller with more accuracy and practicability.

15

The User Action Event Generator Design for Leading Malicious Behaviors from Malware in Sandbox

Jung-Uk Joo, Incheol Shin, Tong-Wook Hwang, Minsoo Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.165-176

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The number of malwares has been consistently growing for several years and the working platform of them was diversified. To analyze these malwares, an analyst uses automated investigation tools as sandbox. However, current malwares apply the various techniques to avoid the detection of the sandbox. Especially, it is hard to be analyzed when the malicious behavior is triggered by user events. In this paper, we propose methods to enter malicious behavior routine in the sample malware codes, which is happened during the virtual execution in the sandbox in order to perform the analysis of malware. We design the methods as the user action event generator using fuzzing. The malicious behaviors triggered by the generator are exported to the sandbox report as API list. We show the result of the event generator.

16

An Optimized k-means Algorithm for Selecting Initial Clustering Centers

Jianhui Song, Xuefei Li, Yanju Liu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.177-186

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Selecting the initial clustering centers randomly will cause an instability final result, and make it easy to fall into local minimum. To improve the shortcoming of the existing kmeans clustering center selection algorithm, an optimized k-means algorithm for selecting initial clustering centers is proposed in this paper. When the number of the sample’s maximum density parameter value is not unique, the distance between the plurality samples with maximum density parameter values is calculated and compared with the average distance of the whole sample sets. The k optimized initial clustering centers are selected by combing the algorithm proposed in this paper with maximum distance means. The algorithm proposed in this paper is tested through the UCI dataset. The experimental results show the superiority of the proposed algorithm.

17

Constraint Sequential Fault Diagnosis using An Inertial Velocity Differential Evolution Algorithm

Xiaohong Qiu, Yuting Hu, Bo Li

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.187-200

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The optimal test sequence design for fault diagnosis is a challenge NP-complete problem. An improved Differential Evolution algorithm with additional inertial weighting item (inertial velocity) is proposed to solve the Optimal Test sequence Problem (OTP) in complicated electronic system. The proposed algorithm called Inertial Velocity Differential Evolution (IVDE) is constructed based on an adaptive differential evolution algorithm. IVDE combined with a new individual fitness function optimizes the test sequence sets with the index of fault isolation rate satisfied in top-down to generate diagnostic decision tree to decrease the test cost and the number of tests used. The simulation results show that IVDE algorithm can cut down the test cost under the satisfied fault isolation rate requirement. Compared with the other algorithm such as PSO (particle swarm optimizer)and GA(genetic algorithm), IVDE can get better solution of the OTP.

18

Requirement of Security for IoT Application based on Gateway System

Jung Tae Kim

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.201-208

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. The security consideration should satisfy a concise set of cryptographic and security mechanisms, single security policy framework, and configuration parameters policy-dependent. This may require consideration of system perspectives, taking into account the entire system and device lifecycle, ease-of-use and ease-of-deployment. Finally, we analyzed requirement of IoT security gateway system to improve vulnerability of sensor node.

19

Platformization is an important evolutionary trend of the high-tech service innovation network. From the perspective of structural holes theory, this paper studies the platformization evolution mechanism of high-tech service innovation network and the formation of different kinds of platform enterprises in this process with a simulation analysis. Results indicate that, based on the scale-free property of the high- tech service innovation network and the evolution of structural holes and so on, network evolves into platform with an approach of “appearance and differentiation of node enterprises→ modularization→ module embedded→ formation of system platform”; the node with rich structural holes has more advantages to become the platform enterprise, and the node bridging large amount of structural hole is more likely to be the system platform enterprise.

20

Measurement for the Rehabilitation Efficacy of Aerobic Exercise of Male Elderly Patients with GPA based on Large-Scale Internet Data

Long Xiaodong, Tao Ganchen, Luo Hong, Wang Yuefeng, Chen Yuanping

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.221-230

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the rapid development of medical informatization, the application of the Internet platform is popular in the health care industry. In this paper, we investigate the complementary rehabilitative effect of aerobics exercise of elderly chronic abacterial prostatitis (CAP), by using large-scale internet data. The objective grading scale (NIH-CPSI) of chronic prostatitis symptoms is adopted to grade the two groups of patients before treatment, 30d and 90d of treatment, and at the same time measure the maximum flow rate(MFR)as well as the THF-α and IL-1 levels in seminal plasma. Result shows that When treatment of 30d and 90d, the two groups NIH-CPSI grades, seminal plasma THF- and IL-1 levels are significantly lower than those before treatment, the observation group is significantly lower than the control group in the corresponding period, and the difference is with statistical significance(P<0.01);When treatment of 30d and 90d, the two groups’ MFR are significantly higher than those before treatment, the observation group is significantly higher than the control group in the corresponding period, and the differences is statistically significant(P<0.01). So that, taking aerobic exercise in addition to the conventional therapy can improve the curative effect and promote rehabilitation for the elderly CAP patients significantly.

21

Evaluating Software Metrics as Predictors of Software Vulnerabilities

Mamdouh Alenezi, Ibrahim Abunadi

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.231-240

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Web application security is an important problem in today’s Internet. A major cause of this is that many developers are not equipped with the right skills to develop secure code. Because of limited time and resources, web engineers need help in recognizing vulnerable components. A useful approach to predict vulnerable code would allow them to prioritize security-auditing efforts. In this work, we compare the performance of different classification techniques in predicting vulnerable PHP files and propose an application of these classification rules. We performed empirical case studies on three large open source web-projects. Software metrics are investigated whether they are discriminative and predictive of vulnerable code, and can guide actions for improvement of code and development team and can prioritize validation and verification efforts. The results indicate that the metrics are discriminative and predictive of vulnerabilities.

22

Rebuild the Basement Tectonic Framework of the Western South China Sea

Changsong Lin, Lihong Zhao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.241-254

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The west margin fault zone of the South China Sea is a tensional basement fault in the extended segment of the Indosinian Subplate toward the sea. It originally formed in the Mesozoic, and reactivated and developed further in the Cenozoic. It is not appropriate to regard this fault as a regional tectonic line between the Indosinian Subplate and the South China Sea Subplate because it does not exhibit the basic features of a regional boundary fault. A zone of gravity and magnetic anomalies in the southwest subbasin of the South China Sea extends westwards to the Zhongjian Island-Guangya Reef arcuate fault zone, and is the real regional tectonic line between the Indosinian Subplate and South China Sea Subplate. The formation of this basement tectonic framework might be closely associated with tectonic evolution of the ancient arc-trench system from the Proterozoic to the Mesozoic. The major faults are the south margin fault zone of the Qiongdongnan-Shenhu-Dongsha massif, the Red River fault zone, and the Zhongjian Island-Guangya Reef arcuate fault zone, which construct the basement tectonic framework of the South China Subplate, the Indosinian Subplate, and the South China Sea Subplate, and control the development and evolution of basement tectonics.

23

The composition of the relationships between Scientists and Employers are formal relationship and informal relationship. The asset nature of these two relationships determines the governance structure of the organization. Based on the theory of the transaction cost and institutionalism, Author develops repeated game models and argues that the governance structure of Little Science should be the combination of non-integration and non-relational contract. Author shows that the governance structure of China’s Little Science is improperly built, which should be rebuilt by de-administrative.

24

A Comparative Study of the Proposed National Cyber-terror Prevention Act

Dea-woo Park, Jin Shin

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.267-274

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Cybercrimes and cyber-terror attacks disturb national order, and can result in cyber warfare that ruins people’s happiness, and destroys national security and people’s safety. Cyber-terror attacks have occurred in the 7.7 DDoS attack, the 3.4 DDoS attack, the attack that paralyzed the NH Computer Network, the Jungang Ilbo Incident, The APT attack against KBS, MBC, YTN, the Shinhan Bank, and the NH Bank to stop computer operation. In 2013, the website of Cheongwadae was attacked through the 6.25 cyber-terror attack. In January, 2014, confidential personal information of approximately 85 million customers of 3 credit card companies of the Lotte Card, KB Kookmin Card and the NH Card was stolen. There is a need for real-time response system that can respond in real-time cyber-hacking attacks. However, acts and regulations are insufficient, the budget and the policies and institutions of national cyber security is needed to support the organization. In this study, we analyze and compare the two Cyber-terro Prevention Act was proposed to the National Assembly. And, triggered alarm in the control tower and cyber need for cyber security against cyber crisis.

25

With the rapid development of e-commerce, customer demand for diversity and timeliness has also increased, in fact, B2C e-commerce business lead higher requirement for logistics service. At the same time, the aviation logistics has become a new growth point of China's logistics transportation development, airport logistics construction and development has become an important force to promote regional economy .In this paper, we make empirical analysis about the logistics performance evaluation of Zhengzhou airport, China. The result shows that reliability, economy, time, service flexibility and information are five key factors that will influence the logistics performance. On this basis, we put forward relevant policy suggestions.

26

Research on the Influence of E-commerce Platform to Agricultural Logistics : An Empirical Analysis based on Agricultural Product Marketing

Yuqiu Cai, Yuqi Lang, Shulan Zheng, Yongqiang Zhang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.287-296

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Along with the rapid development of information technology, the traditional agricultural products sales model is facing a huge challenge. Agricultural products E-commerce platform, which carries three layers service functions, one is its most basic functions, which provides an information exchange, online payment, logistics transportation and sales activity; second is intermediate function, it can provide financial analysis, market research and business plan; the final advanced features, it strongly promoted the related subsidiary industry and service industry. In this paper, we make empirical analysis about the factors that influence the agricultural logistics economy, the result shows that agricultural prices, logistics time, product quality, service level, credibility, spending habits, profits and operating capital are the key factors that will affect the agricultural product marketing.

27

An Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks

Jaecheol Ha

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.297-312

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Anonymous user authentication is an essential security mechanism for roaming services in global mobility networks (GLOMONET). Recently, Zhao et al. propose a two-factor anonymous authentication scheme to achieve mutual authentication and session key establishment between the mobile user (MU) and a foreign agent (FA). This paper shows that their scheme has some security vulnerabilities and operational inefficiencies: (1) The scheme fails to protect against a strong replay attack, (2) it is impractical because it requires the predistribution of system parameters, and (3) it is inefficient because of unnecessary encryption/decryption operations. To remedy these weaknesses, this paper proposes a novel anonymous authentication scheme using a smart card. The proposed scheme provides security requirements such as user anonymity, perfect forward secrecy, correct password change, authentication when the MU is located in the home network (HN), and no predistribution of system parameters. In addition, the proposed scheme is secure against various attacks such as impersonation attack, replay attack, off-line password attack, insider attack, stolen-verifier attack, and local password attack. A performance analysis and a comparison with existing schemes show that the proposed scheme is more suitable for low-power and resource-limited mobile environments.

28

According to the fussy of evaluating index and the uncertainty of evaluating information in flight area, systems thinking tool of complex science management theory - explore graph, is used to construct the fight area risk evaluation index system. And a fight area risk early-warning model based on information entropy attribute reduction and multi-layer BP neural network is proposed. First rough set and information entropy are combined, based on information entropy attribute reduction algorithm, the reduced index information are got. Then based on the multi-layer BP network, the data collected from the flight area was intelligent reasoned and analyzed and evaluated. An example analysis by MATLAB shows that the method is feasible, and it provides support for venture investment project risk management evaluation method.

29

With the popularization of internet, agricultural e-commerce has become a new business model. Electronic commerce increases the flow rate of both sides of the transaction, improves the transparency of the market, and reduces the negative effect caused by asymmetric information. In this paper, we make an empirical analysis of online marketing strategy for agricultural supply chain, especially in economic terms. The result shows that product quality, variety, freshness, safety and price are important factors that affect customer satisfaction. And the distribution speed, convenience, customer service which related to the logistics service will also influence customer satisfaction. At the same time, we find that there are some shortcomings of the e-commerce supply chain in procurement, logistics, warehousing, and information management. In order to solve these problems, we put forward some improvement measures.

30

Quantum Secure Direct Communication Using Checking Sequence Coded

Zhao Guoan, Su Geng, Ning Fan, Gao Zehua

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.10 2015.10 pp.333-340

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The checking sequence of the schemes of quantum secure direct communication based on a secret transmitting order of particles is only checked for security, which is limited quantum resource and is not made the best. The checking sequence is only checked for security by analyzing quantum secure direct communication proposed before. The novel protocol codes the checking sequence which is added the certain meaning in addition to security checks, named the protocol of the sub-step secret transmitting order of particles using the checking sequence coded. Through analysis by synthesis the novel protocol has higher security and reliability.

 
1 2
페이지 저장