• Title/Summary/Keyword: 디지털서명

Search Result 234, Processing Time 0.025 seconds

A Proposal of 3D Printing Service Platform for Construction Industry through case analysis (사례 분석을 통한 건설 3D 프린팅 서비스 플랫폼 제안)

  • Kim, Jongsung;Kim, Sun-Kyum;Seo, Myoung-Bae;Kim, Tae-Hoon;Ju, Ki-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.53-61
    • /
    • 2017
  • Recently, there has been an increase in the number of web-based three-dimensional (3D) printing-related service platforms, which allow consumers to collect 3D modeling data, make requests for production, and receive goods through a distribution service using the service platform. The application of 3D printing technology has been expanded to the construction field, yet no guidelines for the related service platform or operation examples can be found. Therefore, the functions of 10 web-based 3D printing service platforms actively used in other industries were investigated and analyzed in this study, and the analysis results were used as a guideline to develop a 3D printing service platform for the construction industry. In addition, the design, construction and distribution services to be equipped with the construction 3D printing service integration platform were presented by creating the driving scenario of the platform. As 3D printing technology develops, the overall construction and architectural paradigms for design, construction and distribution will change. To prepare for such changes and to pioneer the digital construction market in the future, the role of the 3D printing service platform is expected to increase continually.

Importance and Management of the Laboratory Notebooks in the Research Record (연구기록물 중 연구노트의 중요성과 관리 제도화)

  • Kim, Sang-Jnu
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.45-74
    • /
    • 2008
  • The purpose of this study was to promote the understanding of laboratory notebook's record characteristics through getting a line on the importance of the notebooks which have record, information, communication, and proof functions. To improve the research ethics and cultures, this study was examined and investigated by literature references and survey results. This study analyzed the status of the notebooks in part of laboratory information system of the R&D institutes, paper notebooks for laboratory records management, and the introduction of ELN for digital record. For the notebook's institutionalization, more review is needed to the possibility of involvement in the conflict, evidential requisite and signature by inspector, the limitation of autonomous policy for the notebook's operation, the difficulty of preservation for 30 years, the introduction of ELN and utilization for the notebooks. To improve management and institutionalization for the notebooks, it is needed to the notebook's record for knowledge management and evidential values, support and budget for the notebook's management department, researcher's recognition conversion for the notebooks related to the intellectual property and technology transference, the record method train for the notebooks from the university classes, and the introduction of ELN related to the laboratory information management system or project management system.

$AB^2$ Semi-systolic Architecture over GF$GF(2^m)$ ($GF(2^m)$상에서 $AB^2$ 연산을 위한 세미시스톨릭 구조)

  • 이형목;전준철;유기영;김현성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.45-52
    • /
    • 2002
  • In this contributions, we propose a new MSB(most significant bit) algorithm based on AOP(All One Polynomial) and two parallel semi-systolic architectures to computes $AB^2$over finite field $GF(2^m)$. The proposed architectures are based on standard basis and use the property of irreducible AOP(All One Polynomial) which is all coefficients of 1. The proposed parallel semi-systolic architecture(PSM) has the critical path of $D_{AND2^+}D_{XOR2}$ per cell and the latency of m+1. The modified parallel semi-systolic architecture(WPSM) has the critical path of $D_{XOR2}$ per cell and has the same latency with PSM. The proposed two architectures, PSM and MPSM, have a low latency and a small hardware complexity compared to the previous architectures. They can be used as a basic architecture for exponentiation, division, and inversion. Since the proposed architectures have regularity, modularity and concurrency, they are suitable for VLSI implementation. They can be used as a basic architecture for algorithms, such as the Diffie-Hellman key exchange scheme, the Digital Signature Algorithm(DSA), and the ElGamal encryption scheme which are needed exponentiation operation. The application of the algorithms can be used cryptosystem implementation based on elliptic curve.

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.