The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The underlying variability in the ReRAM device operation, while undesired in many applications, can be advantageous for hardware security primitives. ReRAM devices also come with the advantage of having non-linear multi-state operation. By comparison with previous reported ReRAM PUFs, which utilized spatial variations in the devices' binary ON/OFF states, we proposed to use sneak path currents and...
Research problem: Although organizations have been exerting a significant effort to leverage policies and procedures to improve information security, their impact and effectiveness is under scrutiny as employees' compliance with information security procedures remains problematic. Research questions: (1) What is the role of information security climate (ISC) in cultivating individual's compliance...
As a study seeking for technical improvement measures by analyzing problems in the aspect of human security among physical security area, it focused on the problems of the existing human security, vitalization of electronic security and improvement measures applying IT. In order to research the efficient human management measures and satisfaction with consumers' demands by combining IT with work performance...
As the cash transport is increased due to the increased demands for ATM(Automatic Teller Machine) service, there have been several incidents of extorting cash transport vehicles since 2003. These incidents happened because guidelines for escort security work were not obeyed. Therefore, it would be necessary to have technical researches for protecting cash transport vehicles.
The smart phone markets rapidly grow in the whole world as well as Korea and at the same time, security threat also tends to increase. These various studies on security threat of smart phones have been arranged but the studies on prediction models are insufficient. This paper tries to modeling to predict security threat of smart phones by using Markov Chain which is very much used in prediction studies.
As near field communication technologies develop rapidly and the supply ratio of smart phones gets higher, the scope to utilize NFC(Near Field Communication) is gradually increasing. It tries to propose the service to inform you parking location and traffic line with the mobile parking management system which combines these NFC technologies with IPS(Indoor Positioning System) for parking congestion...
As the society has been computerized and automated, the crime for the ATM device is increased due to the wide distribution of ATM device, even the banking is easy. The theft is shown over 90%, the very high proportion among the Financial accident and crime. With the locational characteristics of external ATM equipment that is always exposed to the crime, its accident even the theft to steal the ATM...
Financial institutions are adopting more ATMs (Automatic Teller Machine) which have multi-functions in order to provide more convenient bank service for increasing customer demand. The security firm carries the professional money transport service by employing professional guard personnel to transport cash, marketable securities and jewelries and products. However, since it is a service to handle...
Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and investment companies. This...
The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramatically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. The being so malicious code pattern extract for malicious code properties of anti-virus company. Visualization...
This paper proposes user authentication methods and encryption techniques that support reliable u-City user authentication services, based on biometric technology, (the use of face, vein, fingerprint, and iris recognition). Even in an advanced wire/wireless network environment, there remain the possibilities that personal confidential information may be exposed. Therefore, this paper proposes a method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.