• Title/Summary/Keyword: Key Characteristics

Search Result 4,306, Processing Time 0.028 seconds

Implementation of Key Recovery Model based on XML for B2B (B2B를 위한 XML기반의 키 복구 구현)

  • 김주한;문기영;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.53-61
    • /
    • 2002
  • In this paper, we will introduce a design of key recovery based on XML can be used in B2B environment. XML Digital Signature and XML Encryption that are defied recently as standards by W3C(World Wide Web Consortium) are deployed to sign/verify or encrypt/decrypt documents for electronic commerce and keys to store/load at/from key recovery server. The result of signature or encryption is always an XML document and all messages used in this key recovery system are also XML documents. It enables to adapt transparently this key recovery system to legacy XML applications and electronic commerce platforms based on XML. And its method for key recovery is key escrow. One of the characteristics of this key recovery is that one enterprise can recover keys of some documents for electronic commerce from external key recovery system in other enterprises related with them and also recover keys from owns.

Comparison of key management systems across different industries (다양한 산업에서의 키 관리 시스템 비교 분석)

  • Woojoo Kwon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.55-61
    • /
    • 2024
  • As the digital environment becomes more complex and cyber attacks become more sophisticated, the importance of data protection is emerging. As various security threats such as data leakage, system intrusion, and authentication bypass increase, secure key management is emerging. Key Management System (KMS) manages the entire encryption key life cycle procedure and is used in various industries. There is a need for a key management system that considers requirements suitable for the environment of various industries including public and finance. The purpose of this paper is to derive the characteristics of the key management system for each industry by comparing and analyzing key management systems used in representative industries. As for the research method, information was collected through literature and technical document analysis and case analysis, and comparative analysis was conducted by industry sector. The results of this paper will be able to provide a practical guide when introducing or developing a key management system suitable for the industrial environment. The limitations are that the analyzed industrial field was insufficient and experimental verification was insufficient. Therefore, in future studies, we intend to conduct specific performance tests through experiments, including key management systems in various fields.

  • PDF

A Hybrid Key Management Scheme in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 하이브리드 키 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1413-1421
    • /
    • 2011
  • A next generation military communication system called Tactical Information Communication Network(TICN) is designed to advance into large capacity, high speed, and long distance wireless relay transmission. To support mobility in battlefield, the application of Ad-hoc networking technology to its wireless communication is being considered. In Ad-hoc network, the key management technique is very important to ensure the confidentiality, integrity, and authentication. In this paper, we propose a new hybrid key management scheme considering the hierarchical characteristics of the tactical ad-hoc such as TICN. For upper layer with sufficient energy and computation capability, we apply PKI based key management scheme. For lower layer with restricted resources, we propose a new key management scheme using the location-based authentication to ensure the energy efficiency.

Study on the Magnetic Characteristics of Anisotropic SmCo7-type Alloys Synthesized by High-energy Surfactant-assisted Ball Milling

  • Yu, N.J.;Zhang, P.Y.;Shi, Y.J.;Pan, M.X.;Zhang, S.Y.;Ge, H.L.;Lu, Y.C.
    • Journal of Magnetics
    • /
    • v.19 no.4
    • /
    • pp.340-344
    • /
    • 2014
  • An effective process was employed for synthesizing anisotropic magnetic $SmCo_7$-type alloy flakes with high coercivity, which is highly desirable for many applications. The highest coercivity of 16.3 kOe corresponds to a typical flake thickness of 200 nm for the 3-h ball-milled sample. The anisotropy field was calculated by measuring the parallel and perpendicular directions to the easy magnetization direction of the powders. The anisotropy field decreased with the increase of the ball milling time, thus indicating that the decrease of coercivity was mainly caused by the reduction of the anisotropy field. Microstructure analysis indicated that the morphology, grain size, and anisotropy field of these samples have a great influence on the magnetic properties.

A Survey of Termitomyces (Lyophyllaceae, Agaricales), Including a New Species, from a Subtropical Forest in Xishuangbanna, China

  • Ye, Lei;Karunarathna, Samantha C.;Li, Huli;Xu, Jianchu;Hyde, Kevin D.;Mortimer, Peter E.
    • Mycobiology
    • /
    • v.47 no.4
    • /
    • pp.391-400
    • /
    • 2019
  • A survey of mushrooms was conducted in Xishuangbanna, Yunnan Province, China, in the rainy season (May to October) of 2012, 2013, and 2014, during which 16 specimens of Termitomyces were collected. Preliminary macro- and micro-characteristics, together with ITS sequence data, showed that four of the specimens belonged to a new species (Termitomyces fragilis), while the other 12 belonged to T. aurantiacus, T. eurrhizus, T. globules, T. microcarpus, and T. bulborhizus. In this paper, T. fragilis is introduced as a species new to science based on morphological characterization and phylogenetic analyses. Macro- and micro- morphological descriptions, color photographs and line drawings of the new species, and a phylogenetic tree to show the placement of the new species are provided. T. fragilis is then compared with other closely related taxa in the genus Termitomyces.

A Study on Public Key Distribution System (공개키 분배방식에 관한 연구)

  • 권창영;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.12
    • /
    • pp.981-989
    • /
    • 1990
  • Thos paper summarized previously proposed several public key distribution systems and proposes a new public key distribution system to generate an common secret conference key for public key distribution systems three or more user. The now system is based on discrete exponentiation, that is all operations involve reduction modulo p for large prime p and we study some novel characteristics for computins multiplicative inverse in GF(p). We use one-way communication to distribute work keys, while the other uses two-way communication. The security of the new system is based on the difficulty of determining logarithms in a finite field GF(p) and stronger than Diffie-Hellman public key distribution system.

  • PDF

Investigation on moisture migration of unsaturated clay using cross-borehole electrical resistivity tomography technique

  • Lei, Jiang;Chen, Weizhong;Li, Fanfan;Yu, Hongdan;Ma, Yongshang;Tian, Yun
    • Geomechanics and Engineering
    • /
    • v.25 no.4
    • /
    • pp.295-302
    • /
    • 2021
  • Cross-borehole electrical resistivity tomography (ERT) is an effective groundwater detection tool in geophysical investigations. In this paper, an artificial water injection test was conducted on a small clay sample, where the high-resolution cross-borehole ERT was used to investigate the moisture migration law over time. The moisture migration path can be two-dimensionally imaged based on the relationship between resistivity and saturation. The hydraulic conductivity was estimated, and the magnitude ranged from 10-11 m/s to 10-9 m/s according to the comparison between the simulation flow and the saturation distribution inferred from ERT. The results indicate that cross-borehole ERT could help determine the resistivity distribution of small size clay samples. Finally, the cross-borehole ERT technique has been applied to investigate the self-sealing characteristics of clay.

Key-point detection of fruit for automatic harvesting of oriental melon (참외 자동 수확을 위한 과일 주요 지점 검출)

  • Seung-Woo Kang;Jung-Hoon Yun;Yong-Sik Jeong;Kyung-Chul Kim;Dae-Hyun Lee
    • Journal of Drive and Control
    • /
    • v.21 no.2
    • /
    • pp.65-71
    • /
    • 2024
  • In this study, we suggested a key-point detection method for robot harvesting of oriental melon. Our suggested method could be used to detect the detachment part and major composition of oriental melon. We defined four points (harvesting point, calyx, center, bottom) based on tomato with characteristics similar to those of oriental melon. The evaluation of estimated key-points was conducted by pixel error and PDK (percentage of detected key-point) index. Results showed that the average pixel error was 18.26 ± 16.62 for the x coordinate and 17.74 ± 18.07 for the y coordinate. Considering the resolution of raw images, these pixel errors were not expected to have a serious impact. The PDK score was found to be 89.5% PDK@0.5 on average. It was possible to estimate oriental melon specific key-point. As a result of this research, we believe that the proposed method can contribute to the application of harvesting robot system.

Classification of Keywords of the papers from the Journal of Korean Academy of Nursing Administration(2002-2006) (간호행정학회지 게재논문 주요어 분석(2002년${\sim}$2006년))

  • Seomun, Gyeong-Ae;Kim, In-A;Koh, Myung-Suk
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.13 no.1
    • /
    • pp.118-122
    • /
    • 2007
  • Purpose: This study was to understand the major subjects of the recent nursing research in Nursing administration from keywords. Method: Keywords of journals were extracted and the frequency of the appearance of each key words was sorted by a descending order. Results: A total of 327 key words were used. The most frequently used key words were 'Job satisfaction', 'Organizational commitment', 'Leadership'. Out of them, organizational culture, nursing performance, nursing classification, patient satisfaction, and ethics appeared most frequently in descending order. Conclusion: From the above it can be noted that many nursing administration concepts were handled in the papers. But there were not enough papers on the characteristics of the Nursing administration. It is suggested that in depth research be made on 'Nursing error', 'Nursing informatics', 'Web based learning'.

  • PDF

Efficient Signature Schemes from R-LWE

  • Wang, Ting;Yu, Jianping;Zhang, Peng;Zhang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3911-3924
    • /
    • 2016
  • Compared to the classical cryptography, lattice-based cryptography is more secure, flexible and simple, and it is believed to be secure against quantum computers. In this paper, an efficient signature scheme is proposed from the ring learning with errors (R-LWE), which avoids sampling from discrete Gaussians and has the characteristics of the much simpler description etc. Then, the scheme is implemented in C/C++ and makes a comparison with the RSA signature scheme in detail. Additionally, a linearly homomorphic signature scheme without trapdoor is proposed from the R-LWE assumption. The security of the above two schemes are reducible to the worst-case hardness of shortest vectors on ideal lattices. The security analyses indicate the proposed schemes are unforgeable under chosen message attack model, and the efficiency analyses also show that the above schemes are much more efficient than other correlative signature schemes.