The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research creates flexibility into the RSA and the split-private-key RSA cryptography. In the split-private-key RSA, the user can select, at his/her discretion, a password to derive the first of two private key portions. This paper provides an extension that further allows the user to change the password without resorting to a regeneration of the public/private key pair. Furthermore, validation...
This paper proposes an interactive Web 3D virtual experience environment based on O3D. A virtual experience hall was implemented with an educational goal of "saving the earth from global warming." The interactive Web 3D virtual experience hall is capable of providing flexible services without being confined to a specific platform. A storytelling approach was employed to maximize the interactive...
Advancement in technology is very well reflected and supported by changes in measurement and control instrumentation. To move to high-speed serial from Parallel bus architectures has become prevalent and among these Ethernet is the most preferred switched Serial bus, which is forward-looking and backward-compatible. Great stride have been made in promoting Ethernet use for industrial networks and...
Requirement engineering is a crucial activity, which can affect the entire life cycle of software development project. The main objective of requirement engineering is to collect requirements from different viewpoints such as business requirements, customer requirements, user requirements, constraints, security requirements etc. Information is also one of the important requirements of requirement...
Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and investment companies. This...
In this age of the accelerated globalization and the increased mobile population, various methods of wire/wireless communication technologies and their service are converged and integrated each other as Internet Technology has been developing. As a result, functions of the devices such as a computer, a digital device, a mobile device and a smart phone have been evolving. At present, there are different...
Currently the most popular secure protocol is SSL (Secure Sockets Layer), but it has some negative aspects: First, it imposes a heavier burden on handheld wireless devices, and when a certificate uses PKI (Public Key Infrastructure) e.g. RSA algorithms, it takes a long time to establish a secure connection between client and server. This paper proposes a lightweight protocol based on the SSL protocol,...
As a multi-core processor has been announced recently, many multimedia applications are being parallelized in order to reduce the execution time. Although the size of multimedia data to be protected is huge, it is difficult to efficiently speed up some cryptography algorithms due to data dependence. In this paper, we propose a general approach which parallelizes cryptographic algorithms having data...
Recently, A malware is increasing for leaking personal data, credit information, financial information, etc. The secondary damage is also rapidly increasing such as the illegal use of stolen name, financial fraud, etc. But when a system is infected by a malware of leaking information, the existing malware evidence collection modules do not provide evidences conveniently or sometimes cannot provide...
The development of Information and Communication gives a lot of convenience in our lives, but on the other hand, the new cyber threat like viruses, computer intrusions and so on also increases. Especially, malicious codes such as viruses over the internet are distributed in large quantities. Several studies using reverse engineering or virtual machine have been carried out to analyze malicious codes,...
The objective of this work is improving for Statistical Machine (SMT) by using Self - Organizing MAP (SOM). In general we have 2 processes for Training and Translating. Training process is use for preparing resource from a number of bilingual corpuses, which are used for translating process. But, we still have a lot of irrelevant resource of data. Major method for this research is highlighted on new...
As the applications of mobile and ubiquitous technologies have become more extensive, the communication security issues of those applications are emerging as the most important concern. Therefore, studies are active in relation with various techniques and system applications for individual security elements. In this paper, we proposed a new technique which uses the voice features in order to generate...
Recently, As a android phone offers more superior functions and interface than an existing traditional phone, the number of user has been increased rapidly. But, the number of vulnerable android phone in security has been rising due to customizing the system of android phone for the convenience of user, there are many cases of customizing the system. Simultaneously a number of android phones which...
There have been recent research activities on GPS-based FNET to prevent wide-area blackouts by monitoring frequency deviation. This study developed a system for monitoring regional frequencies in power grid modeling as an advanced research project for implementing intelligent wide-area protective relaying. The system was implemented by modeling an actual 345 kV transmission system using EMTP-RV and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.