• Title/Summary/Keyword: FORGE2009

Search Result 10, Processing Time 0.027 seconds

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes

  • Mashhadi, Samaneh
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.249-262
    • /
    • 2016
  • In 2004, Yang et al. proposed a threshold proxy signature scheme that efficiently reduced the computational complexity of previous schemes. In 2009, Hu and Zhang presented some security leakages of Yang's scheme and proposed an improvement to eliminate the security leakages that had been pointed out. In this paper, we will point out that both Yang and Hu's schemes still have some security weaknesses, which cannot resist warrant attacks where an adversary can forge valid proxy signatures by changing the warrant $m_w$. We also propose two secure improvements for these schemes.

FEM Analysis for Optimization of Hot Forging Process of Piston Crown (피스톤크라운의 열간단조공정 최적화를 위한 유한요소해석)

  • Min, K.Y.;Lim, S.J.;Choi, H.J.;Choi, S.O.;Park, Y.B.
    • Transactions of Materials Processing
    • /
    • v.18 no.6
    • /
    • pp.444-447
    • /
    • 2009
  • Piston crown to the hot forge a unified nature of the product has a shape with multi-level step forging process, so if you are not a mechanical professional, this process could lead to a significant loss to the material. Therefore, material technology in minor terms; continue to improve the collection rate that undamaged the product material. The piston crown and the manufacturing products such as marine diesel engines are being forged to reduce costs and to improve mechanical properties. Piston crown molding is a hot forging process that works in large volume forging products. Because of the size of the hard plastic material flow process for improving the design and actual field experience through advanced plastic technology, it is important to interpret the results. Also for many experimental plastic procedures, the accumulation of results is very important.

Microstructure Prediction Technology of Ni-Base Superalloy (단조용 니켈기지 초내열합금의 조직예측기술)

  • Yeom, J.T.;Kim, J.H.;Hong, J.K.;Park, N.K.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2009.10a
    • /
    • pp.89-92
    • /
    • 2009
  • As a class of materials, Ni-base superalloys are among the most difficult metal alloys to forge together with refractory metals and cobalt-base superalloys. The mechanical properties of Ni-base superalloys depend very much on grain size and the strengthening phases, $\gamma$' ($Ni_3$(Al,Ti)-type) and $\gamma$".($Ni_3$Nb-type). Especially, the control of grain size remains as a sole means for the control of mechanical properties. The grain size and distribution changes of the wrought superalloys during hot working and heat treatment are mainly controlled by the recrystallization and grain growth behaviors. In this presentation, prediction technology of grain size through the computer-aided process design, and numerical modeling for predicting the microstructure evolution of Ni-base superalloy during hot working were introduced. Also, some case studies were dealt with actual forming processes of Ni-base superalloys.

  • PDF

Automotive Rim Manufacturing using Flow Forming (유동성형을 이용한 자동차 림 가공)

  • Oh, J.H.;Kim, S.H.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2009.10a
    • /
    • pp.379-381
    • /
    • 2009
  • In designing full vehicle, crash safety, fuel efficiency, exhaust gas, and driving stability are very important factors. Especially, automotive wheel which supports total vehicle weight is a critical component in view of driving stability. Most of automotive wheel have been manufactured for beautiful appearance by using aluminum alloy in domestic industry. However, the amount of automotive steel wheel used are on an increasing trend according to developing the advanced high strength steel with good formability property recently. In this study, the circumferential deviation of rim with various thickness and yield strength was investigated. The formability evaluation of the rim was developed by using a finite element module furnished by Forge software.

  • PDF

FEM Analysis for Optimization of Hot Forging Process of Piston Crown (피스톤크라운의 열간단조공정 최적화를 위한 유한요소해석)

  • Min, K.Y.;Lim, S.J.;Choi, H.J.;Choi, S.O.;Park, Y.B.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2009.05a
    • /
    • pp.98-101
    • /
    • 2009
  • Piston crown to the hot forge a unified nature of the product has a shape with multi-level step forging process, so if you are not a mechanical process that can be a significant loss is material. Therefore, minor in terms of material technology; continue to improve the collection rate should be. The Piston crown and the manufacturing of products such as marine diesel engines, reducing costs and to improve mechanical properties of the method are being forged. Piston crown molding hot forging process the large volume forging products handling because of the size of the size of the hard plastic material flow process for improving the design and actual field experience through advanced plastic technology, and it is important to interpret the results and for many experimental plastic The accumulation of results is very important.

  • PDF

A Note on a Secure Routing Method for ad-hoc Networks (ad-hoc 네트워크에서의 안전한 라우팅 기법에 관한 연구)

  • Hwnag, Jung-Yeon;Kim, Kyung-Sin;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.2
    • /
    • pp.53-56
    • /
    • 2009
  • Kim et al. recently proposed an identity-based aggregate signature scheme to construct a secure routing protocol in ad-hoc networks. In this note, we unfortunately show that the identity-based aggregate signature scheme is universally forgeable, that is, anyone can forge the signature of any messages of its choice. This subsequently means that their secure routing protocol is not secure.

  • PDF

Characteristics of Pre-Heat Treated Steel for Application to Forging (선조질강 소재의 단조공정 측면에서의 특징)

  • Eom, J.G.;Li, Q.S.;Jang, S.M.;Abn, S.T.;Son, Y.H.;Hyun, S.W.;Kim, H.;Yoon, D.J.;Joun, M.S.
    • Transactions of Materials Processing
    • /
    • v.18 no.6
    • /
    • pp.453-457
    • /
    • 2009
  • In this paper, plastic deformation behaviors of ESW105 and SCM435 steels are revealed by simulations and experiments. ESW105 is the special pre-heat-treated steel characterized by high initial yield strength and negligible strain-hardening behavior. The flow stresses of the two steels for large stain are calculated from tensile tests. Axial and lateral compressions of cylindrical bars are tested and simulated and the deformed shapes are compared to characterize the plastic deformation behaviors of the two materials. A forward extrusion process of a cylindrical bar is also simulated to reveal the difference. It has been shown that there are pretty much difference in plastic flow between ESW105 and SCM435 which causes from the difference in strain-hardening capability, implying that the experience-oriented design rules for common commercial materials may lead to failure in process design when the new material of ESW105 is applied without consideration of its plastic deformation behavior.

Security Analysis of Two Certificateless Signature Schemes (두 인증서 없는 서명 기법들에 관한 안전성 분석)

  • Lee, Ju-Hee;Shim, Kyung-Ah;Lee, Hyang-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.17-22
    • /
    • 2009
  • Certificateless cryptography eliminates the need of certificacates in the public key crytosystems and solves the inherent key escrow problem in identity-based cryptosystems. This paper demonstrates that two certificateless signature schemes proposed by Guo et al. and Wang et al. respectively are insecure against key replacement attacks by a type I adversary. We show that the adversary who can replace a signer's public key can forge signatures under the replaced public key. We then make a suggestion to prevent the attacks.

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme (해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.