• Title/Summary/Keyword: Key

Search Result 33,613, Processing Time 0.058 seconds

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

A Group Key Management Architecture in Mobile Network Environments (이동네트워크 환경에서의 그룹키 관리구조)

  • 박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.89-100
    • /
    • 2002
  • In this paper, we propose a group key management architecture for the secure group communications in mobile netwowrks and authenticated key agreement protocol for this system. Most of existing group key management schemes un certificates based on the public key for the purpose of user authentication and key agreement in secure fashion however, we use the ICPK(Implicitly Certified Public key) to reduce the bandwidth for a certificate exchanging and to improve a computational efficiency. In this architecture, we use two-tier approach to deal with key management where the whole group is divided into two parts; the first is a cell groups consisted of mobile hosts and another is a control group consisted of cell group managers. This approach can provide flexibility of key management such that the affection for a membership change is locally restricted to the cell group which is an autonomous area of the CGM(Cell Group Manager).

KI-HABS: Key Information Guided Hierarchical Abstractive Summarization

  • Zhang, Mengli;Zhou, Gang;Yu, Wanting;Liu, Wenfen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4275-4291
    • /
    • 2021
  • With the unprecedented growth of textual information on the Internet, an efficient automatic summarization system has become an urgent need. Recently, the neural network models based on the encoder-decoder with an attention mechanism have demonstrated powerful capabilities in the sentence summarization task. However, for paragraphs or longer document summarization, these models fail to mine the core information in the input text, which leads to information loss and repetitions. In this paper, we propose an abstractive document summarization method by applying guidance signals of key sentences to the encoder based on the hierarchical encoder-decoder architecture, denoted as KI-HABS. Specifically, we first train an extractor to extract key sentences in the input document by the hierarchical bidirectional GRU. Then, we encode the key sentences to the key information representation in the sentence level. Finally, we adopt key information representation guided selective encoding strategies to filter source information, which establishes a connection between the key sentences and the document. We use the CNN/Daily Mail and Gigaword datasets to evaluate our model. The experimental results demonstrate that our method generates more informative and concise summaries, achieving better performance than the competitive models.

A Efficient Key Generation and Renewal for Broadcast Encryption (브로드캐스트 암호화에서의 효율적인 키 생성과 갱신 방법)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.149-156
    • /
    • 2004
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. Important thing is that only user who is permitted before only must be able to get digital information in broadcast encryption schemes. If broadcast message transfers, users who authority is get digital information to use private key given in the advance by oneself. Thus, user acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. Take advantage of two technique of proposal system. One is method that server creates key forecasting user without user's agreement, and another is method that server and user agree each other and create key Advantage of two proposal system because uses a secret key broadcast message decryption do can and renewal is available effectively using one information whatever key renewal later.

Bacterial Fruit Rot of Apricot Caused by Burkholderia cepacia in China

  • Fang, Yuan;Li, Bin;Wang, Fang;Liu, Baoping;Wu, Zhiyi;Su, Ting;Qiu, Wen;Xie, Guanlin
    • The Plant Pathology Journal
    • /
    • v.25 no.4
    • /
    • pp.429-432
    • /
    • 2009
  • An unreported disease of apricot was observed in orchards in Zhejiang province, China. Symptoms started as water soaked lesions on the fruit surface. Later, water-soaked areas developed and spread to the entire fruit, resulting in soft rot of the whole fruit. The causal organism isolated from symptomatic fruits was identified as Burkholderia cepacia based on its biochemical and physiological characteristics and confirmed by the cellular fatty acid composition and Biolog data as well as 16S rRNA gene sequence analysis. The bacterial isolates caused similar symptoms when inoculated onto fruits of apricot. In addition, European plum, Japanese plum, nectarine and kiwifruit were susceptible to the B. cepacia pathogen. However, the B. cepacia pathogen failed to cause any visible symptoms when it was inoculated onto 16 other fruits. This is the first report of a bacterial disease of apricot caused by B. cepacia in China.

A Study of the Cognition and the Requirement on the Key Competency of Dental Technology (치과기공분야에서의 직업기초능력수준과 요구도에 관한 연구)

  • Hwang, Jae Sun
    • Journal of Technologic Dentistry
    • /
    • v.34 no.4
    • /
    • pp.457-469
    • /
    • 2012
  • Purpose: The purpose of this study is analyzing how much students of dental technology possess core competencies and cognition between dental technicians and students. Methods: The subjects of this study were dental technicians, dental technology students and a self-administered structured questionnaire survey wax conducted for 428 selected people. Collected data were analyzed using SPSS Win 20.0 statistics program and analysis techniques include the frequency, t-test, One-way ANOVA. Results: The results of the survey are as follows. The cognition of key competency according to the gender in the students showed differences in interpersonal ability, information ability and the requirement of key competency according to the gender in the students showed differences in speaking ability, listening ability, problem solving ability. The cognition of key competency according to the grade in the students showed difference in speaking ability, listening ability and the requirement of key competency according to the grade in the students showed difference in comprehension of organization ability. The speaking ability is the lowest in the cognition of key competency according to the gender, grade, experience of clinical training in the students and the skill ability is the highest in the requirement of key competency according to the gender, experience of clinical training in the students. The cognition of key competency according to the career in the dental technicians showed difference in problem solving ability, self-regulation and self-development ability, skill ability and the requirement of key competency according to the career in the dental technicians showed difference in writing ability. The cognition of key competency according to the educational background in the dental technicians showed difference in comprehension of organization ability. The foreign language ability is the lowest in the cognition of key competency according to the career, job in the dental technicians and the skill ability is the highest and the math ability is th lowest in the requirement of key competency according to the career, place of employment in the dental technician. Conclusion: This study can be used as basic data for dental technology that are available not only to field-oriented disciplines but also to overall higher education fields which aim to strengthen key competency.

Cloning of Chicken Microsomal Glutathione S-transferase 1 Gene (MGST1) and Identification of Its Different Splice Variants

  • Wang, X.-T.;Zhang, H.;Zhao, C.-J.;Li, J.-Y.;Xu, G.-Y.;Lian, L.-S.;Wu, C.-X.;Deng, Xuemei
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.22 no.2
    • /
    • pp.155-161
    • /
    • 2009
  • Mammal microsomal glutathione transferase 1 (MGST1) can conjugate many toxic or carcinogenic substances and depress oxidative stress. In this study, Chicken MGST1 and its variants were cloned for the first time and were composed of 956 or 944 nucleotides. The 12 nt deletion in the exon 2 did not alter the GT-AG rule and the ORFs for the two MGST1 variants were the same, which both comprised 465 nucletides and encoded a peptide with 155 amino acids. It was found that the two different splice variants identified using RT-PCR expressed in all three organs investigated of Dwarf Brown Chicken, namely liver, spleen and shell gland. Moreover, the expression level of MGST1 mRNA in the liver of Dwarf Brown chickens was the highest (p<0.01), and there were no significant differences between the spleen and the shell gland. These results provide a base for studying the biological function of Chicken MGST1.

Hydrogen Passivation for the Enhancement of Poly-Si Performance Crystallized By Double-Frequency YAG Laser

  • Li, Juan;Chong, Luo;Ying, Yao;He, Li;Meng, Zhiguo;Chunya, Wu;Xiong, Shaozhen;Kwok, Hoi-Sing
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.1608-1611
    • /
    • 2009
  • Here the hydrogen passivation treatment has been adopted to enhance the performance of poly-Si crystallized by YAG laser annealing (LA poly-Si). We have investigated the effects of passivation time, passivation power and passivation temperature on the hall mobility of the LA poly-Si and analyzed the mechanism of the hydrogen passivation preliminary. It has been found that the quality of the poly-Si annealed by YAG laser could be improved after proper hydrogen plasma treatment.

  • PDF

(A New Key Recovery Protocol of Wireless Authentication Key Establishment for the M-Commerce) (M-Commerce상에서 키 복구를 지원하는 무선 인증 및 키 설립 프로토콜)

  • 이용호;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.371-376
    • /
    • 2003
  • As Mobile Internet gets more popular, the switchover of E-Commerce to M-Commerce gets faster and many service providers offer diverse M-Commerce service by using mobile technology. Also, as M-Commerce makes rapid progress, the security protocol gets more widely recognized for its significance. In particular, WAKE(Wireless Authentication and Key Establishment) protocol carried out wirelessly is of great importance, since the user and service provider must get through to carry out the M-Commerce. Key recovery method is a part of the key management in order to provide an emergency recovery of key whenever necessary, like when the user lost the key or the cryptosystem was illegally used. The ASPeCT project first tried to support the key recovery function in WAKE Protocol Since then, a variety of WAKE Key Recovery protocols have been proposed. In this thesis, problems of WAKE Key Recovery protocols proposed so far are analyzed and new WAKE Key Recovery protocol is suggested to solve those problems.

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.