2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
Authorized Tracking and Tracing for RFID
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.1 No.1 2007.07 pp.1-13
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Radio Frequency Identification (RFID) systems have become popular for identifying not only objects but also persons. For example, in supply chain applications, the company can constantly track the movements of goods. Also, for Body Area Network or Personal Area Work, the tag is usually used for identifying a person. However, the movements and current locations of goods and a person’s activity profiles are the sensitive information and should be kept secret. This paper develops the interaction protocols between readers and tags to address this privacy issue of protecting tagged objects from tracking and tracing by unauthorized readers.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.1 No.1 2007.07 pp.15-23
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
There major challenges for current Intrusion Detection Systems (IDS) which attempt to identify suspicious network traffic. Due to the high percentage of alerts generated by such systems, the level of false positives is among the significant problems. We present intelligent strategies for reduction of false positives and infrastructure protection using a novel approach using adaptive responses from firewall packet filters in what we call, network quarantine channels (NQC). This involves using an efficient and intelligent intrusion detection and response system using Virtual Private Networks, firewalls and packet filters. The firewall packet filters provide effective intelligent responses by to granting access to the normal packets and denying malicious traffic access to the network, after the identity of the connections are verified through the statistical analysis in the NQC. These effective strategies reduce false positives and increases detection capability of the IDS
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.1 No.1 2007.07 pp.25-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Complex network and internetwork attacks evade the detection of intrusion detection systems including insertions, evasions and distributed denial of service attacks. The presence of these complex attacks along with false positives in intrusion detection systems has resulted in inefficient detection and response to such packets in current network infrastructure systems. In this paper we analyse complex network and internetwork attacks and provide effective intelligent countermeasures ad strategies for containing their adverse impact on network and internetwork infrastructures..
Handwritten Signature Watermarking and Extraction Technique Inspired by Principle of Segregation
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.1 No.1 2007.07 pp.35-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a technique for embedding handwritten signature image data into color images and extracting embedded image data from color images. For the sake of security, two watermarked images will be transmitted in different times from the sender’s end to the receiver’s end, in due course, from two transmitted images, at the receiver’s end, original handwritten signature image data will be extracted; a new way of data hiding. From 1994 onward, the use and popularity of Internet in business particular has explored the area of Intellectual Property protection techniques. This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.
Protocols for Privacy-Preserving DBSCAN Clustering
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.1 No.1 2007.07 pp.45-56
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cooperative computation is one of the most important fields in computer science. In recent years, the development of networking increases the desirability of cooperative computation. But privacy concerns often prevent different parties from sharing their data. Secure multiparty computation techniques can dispel parties’ doubts about revealing privacy information in this situation. On the other hand, Data mining has been a popular research area for more than a decade. However, in many applications, the data are originally collected at different sites owned by different users. This paper considers the problem of privacy preserving DBSCAN clustering over vertically partitioned data based on some results of SMC. An efficient secure intersection protocol is first proposed. The security and complexity of the protocols are also analyzed. The results show that the protocols preserve the privacy of the data and the time complexity as well as the communication complexity is acceptable.
Autonomy, Heterogeneity, Trust, Security, and Privacy in Mobile P2P Environments
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.1 No.1 2007.07 pp.57-71
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve and exhibit various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the terminals. Finally, we relate privacy and security aspects in the environment to trust, autonomy and heterogeneity.
Database Design Scheme for Copyright Protection Using Multimedia Documents Authentication
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.1 No.1 2007.07 pp.73-82
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Many multimedia documents are produced and distributed widely for many applications. And those many multimedia documents are spread fast through the Internet. But there have been illegal behaviors that many unauthorized users transform multimedia and use illegally so, legal issues for copyrighted multimedia arise as a necessary consequence. In this paper, we propose a procedure for secure watermarking using authentication key when a multimedia document is used by authorized user in the Internet or distributed information systems. Before a client requests using a multimedia document from the application server, the user acquires authentication key from the authentication server. And then the application inserts a watermark into the multimedia document comparing the client's authentication key with that of authentication server. And the authentication key is inserted into the multimedia as a digital watermark. The proposed digital watermarking algorithm can be used for inserting authentication number like serial number of the multimedia. So, the owner of the multimedia document can get copyright based on authentication server. Using the digital watermark with authentication number of a multimedia document the owner of the document can assert copyright ownership.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.1 No.1 2007.07 pp.83-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the information exchange through network, the security risks always exist, that is eavesdropping, defacing, and spoofing by the attacker. PKI (Public Key Infrastructure) will prevent such attacks. But key management is very serious problem in PKI. The public key certificate is issued and distributed by certificate authority, but we think that the updating of expired certificate etc. are very costly for users. And secret key management is more serious problem. In order to solve above problems, we propose the scheme that stores protected secret key which is made by combination of biometrics and secret key in the smartcard in IDbased cryptography system. The user can restore the secret key from protected secret key by presenting his fingerprint to smartcard that has protected secret key and helper data. In our scheme, the template is not need for authentication. So, the problem of the template leakage won't arise. Lastly, we proposed the concrete operation scheme in which our scheme is used and how to make signature or authentication by applying our scheme. We show that the cost of the public key and secret key management will be reduced by using this operation scheme.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.