• 제목/요약/키워드: Conference Key

Search Result 3,737, Processing Time 0.037 seconds

Sensor Network Key Management Scheme for Detecting Malicious Node Based on Random Key Predistribution (악의적 노드 탐지를 위한 Random Key Predistribution 기반의 센서 네트워크 키 관리 기법)

  • Park, Han;Song, JooSeok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1245-1246
    • /
    • 2009
  • 센서 네트워크는 유비쿼터스 컴퓨팅에서 핵심적인 역할을 담당하는 기반 네트워크이다. 그 때문에 센서 네트워크로부터 제공되는 정보는 신뢰할 수 있어야 한다. 하지만 센서 자체의 여러 가지 한계로 인해 보안의 핵심 요소인 키 관리에는 많은 어려움이 존재한다. 이 논문에서는 Random Key Predistribution 기법에 기반하여 악의적인 노드를 탐지하지 못하는 기존의 한계점을 분석하고, 이를 해결하기 위한 새로운 키 관리 기법을 제안한다.

KEY BARRIERS AND THEIR STRATEGIC RESPONSES TO ACTIVATE KNOWLEDGE SHARING IN CONSTRUCTION ORGANIZATIONS

  • Tae-Wan Kim ;Hyoun-Woo Joh
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.403-408
    • /
    • 2005
  • Being in a knowledge-based industry, many construction organizations are seeking to manage their own knowledge in an effective way. To manage knowledge, the organizations must motivate in-house people to share their knowledge. However, some barriers to knowledge sharing do exist and researches on these barriers considering construction organizations' characteristics seem rare. This study aims to identify key barriers to knowledge sharing considering the characteristics of construction organizations. Based on the identification, strategic responses to each key barrier are presented in two perspectives of technical and behavioral approach to activate knowledge sharing.

  • PDF

DISTRIBUTIONS OF RESIDUAL STRESSES IN DIFFUSION BONDING OF DISSIMILAR MATERIALS TIAL TO STEEL 40CR

  • Peng, He;Jicai, Feng;Yiyu, Qian;Jiecai, Han
    • Proceedings of the KWS Conference
    • /
    • 2002.10a
    • /
    • pp.785-790
    • /
    • 2002
  • Distributions of residual stress in diffusion bonding of dissimilar materials intermetallics TiAl to steel 40Cr were simulated by FEM calculation. Results showed that destructive residual stresses presented in the minute area adjacent to bond-line of the base material with smaller coefficient of thermal expansion. Reducing bonding temperature and diminishing bonding time are in favor of the mollification of interface tresses.

  • PDF

A Renewal Mechanism of Group Key on Digital Mobile Communication Employing the Fiat-shamir Method (Fiat-Shamir 방식을 적용한 디지털 모바일 통신 그룹키 갱신 메카니즘)

  • Tak, Dong-Kil;Chung, Il-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.571-578
    • /
    • 2006
  • To renew the group key securing on the mobile communication needs that it can be not oかy re-shared by all members of the group with the exception of members excluded but also prevented from making a fraudulent use of a terminal's registered key because of a leakage of information from the loss of terminal. In this paper, we propose an efficient renewal mechanism of group key in order for all members of the group to be able to get digital information and to perform the renewal of group key in a small-scale conference employing the Fiat-Shamir method. It can guarantee the security of terminals, since a terminal generates security information needed for key renewal, and then renews the group key for mutual communication.

A Secure Multicast Key Distribution Protocol (안전한 멀티캐스트 키분배 프로토콜)

  • 조현호;박영호;이경현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.152-156
    • /
    • 2001
  • In this paper we propose a secure multicast key distribution protocol using OFT(One-way Function Trees). The proposed protocol is a hybrid scheme of DKMP(Distributed Key Management Protocol) that guarantees all group member's participation for generating a group key, and CKMP(Centralized Key Management Protocol) that makes it easy to manage group key and design a protocol. Since the proposed protocol also computes group key using only hash function and bitwise-XOR, computational overhead ran be reduced. Hence it is suitably and efficiently adaptive to dynamic multicast environment that membership change event frequently occurs.

  • PDF