30 research outputs found

    Economic Impact Analysis of Trial Sea Farm Project in Jeju

    No full text

    The Hedging Performance and Effectiveness in Lean Hog Futures Market

    No full text

    An Analysis on Determinants of Tourist Demand for Jeju Marine Tourism

    No full text

    제주 해양관광산업의 경제적 파급효과 분석

    No full text

    디지털 컨텐츠 거래에서의 사용자 익명성 보장기법

    No full text

    A Study on Determinant of Tourist Expenditures for Jeju Marine Tourism

    No full text

    Analysis of Bank Efficiency Using DEA after Incorporating into Holding Company

    No full text

    Design of unlinkable transaction protocol for preserving customer privacy

    No full text
    학위논문(석사) - 한국정보통신대학교 : 공학부, 2005, [ 54 p. ]Privacy is becoming a serious challenge in computerized environments, especially the Web where many companies constantly attempt to violate the privacy of users. Privacy infringements when companies gather customer information are more likely to occur if the customer lacks control over this process. In general, most of privacy-preserving systems use pseudonyms or employ the Trusted Third Party (TTP) that hides all user information from web servers. However, users may want or need to identify themselves over the net but still retain their activities and profile in private. On the contrary, it is necessary for internet companies to know the user preference for their marketing activities and auditing. It is obviously conflicting between the user privacy protecting and the company``s requirements. In this thesis, we presented the system protocol that provides the customer``s privacy and satisfies business requirements for the digital content transactions. In our approach, the customer reveals his/her. identity information(such as bank account or credit card number) in exchange for a digital content while protecting the privacy. Moreover, the Internet company is also able to obtain customer``s buying pattern or preferences but the customer``s privacy is sufficiently protected by unlinkability between customer identity and profile information. The proposed system is designed with Chaum``s RSA blind signature scheme[13] and operated on the open network as well as anonymity networks.한국정보통신대학교 : 공학부
    corecore