RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Enhancing the Security of Credit Card Transaction based on Visual DSC

        ( Kuo-jui Wei ),( Jung-san Lee ),( Shin-jen Chen ) 한국인터넷정보학회 2015 KSII Transactions on Internet and Information Syst Vol.9 No.3

        People have transferred their business model from traditional commerce to e-commerce in recent decades. Both shopping and payment can be completed through the Internet and bring convenience to consumers and business opportunities to industry. These trade techniques are mostly set up based on the Secure Sockets Layer (SSL). SSL provides the security for transaction information and is easy to set up, which makes it is widely accepted by individuals. Although attackers cannot obtain the real content even when the transferred information is intercepted, still there is risk for online trade. For example, it is impossible to prevent credit card information from being stolen by virtual merchant. Therefore, we propose a new mechanism to solve such security problem. We make use of the disposable dynamic security code (DSC) to replace traditional card security code. So even attackers get DSC for that round of transaction, they cannot use it for the next time. Besides, we apply visual secret sharing techniques to transfer the DSC, so that interceptors cannot retrieve the real DSC even for one round of trade. This way, we can improve security of credit card transaction and reliability of online business. The experiments results validate the applicability and efficiency of the proposed mechanism.

      • KCI등재

        Investigations of Silty Soil Slopes under Unsaturated Conditions Based on Strength Reduction Finite Element and Limit Analysis

        An-Jui Li,Joram Wachira Mburu,Chao Wei Chen,Kuo-Hsin Yang 대한토목학회 2022 KSCE JOURNAL OF CIVIL ENGINEERING Vol.26 No.3

        Matric suction plays a key role in slope stability by conferring an apparent cohesion component to the unsaturated portion of the soil. This paper adopts the total cohesion method to investigate the contribution of apparent cohesion on the stability of silty slopes under hydrostatic conditions. Phase2 and Optum G2 numerical programs, based on strength reduction finite element analysis and finite element limit analysis methods, respectively, are used for numerical analysis. Generally, Phase2 and Optum G2 results are in good agreement with each other. Optum G2 yields slightly higher factor of safety results than Phase2, particularly for steep slopes β ≥ 30°. The results are presented in form of stability charts which are validated with a case from a previous study. Notably, the contribution of apparent cohesion to unsaturated shear strength is most pronounced when varying the water table. An examination of the slope failure mechanism reveals that the toe failure mechanism is the dominant failure mechanism. The depth of the failure surface is most sensitive to changes in the slope angle, cohesion and water table position. The influence of the air-entry value on the depth of the failure surface is contingent upon the location of the water table.

      • SCIESCOPUSKCI등재

        Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

        Lee, Jung-San,Wei, Kuo-Jui,Chen, Ying-Chin,Sun, Yun-Hsiang Korean Society for Internet Information 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12

        Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

      • KCI등재

        Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

        ( Jung-san Lee ),( Kuo-jui Wei ),( Ying-chin Chen ),( Yun-hsiang Sun ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12

        Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.`s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auc-tioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

      • KCI등재

        Effects of nitrogen and carbon doping on properties and photocatalytic activity of TiO2-In2O3 composite

        Chung-Hsin Wu,Chao-Yin Kuo,Jui-Tai Wu,Pui-Kwan Andy Hong,Chih-Hao Lai,Wei-Yang Chung 한국화학공학회 2015 Korean Journal of Chemical Engineering Vol.32 No.5

        TiO2-In2O3 (Ti-In) was synthesized by the sol-gel method and the composite was further doped with nitrogen and carbon to create Ti-In-N and Ti-In-C, respectively. The dye C.I. Reactive Red 2 (RR2) was used a model compound to be subjected to various composites and measured for removal by photocatalytic degradation and adsorption. Ti-In-N possessed a larger mean diameter than Ti-In-C, while the latter possessed a greater anatase content and surface area than the former. After N or C doping, the spectra of corresponding Ti-In-N and Ti-In-C showed absorption edges at longer wavelengths than the parent Ti-In. Ti-N-O and Ti-O-C bonds were found in Ti-In-N and Ti-In-C composites, respectively. Ti-In-N was more effective for RR2 photodegradation than Ti-In-C, and the Ti-In-C removed more RR2 by adsorption than Ti-In-N.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼