• Title/Summary/Keyword: Key Distribution Center

Search Result 261, Processing Time 0.032 seconds

A improved authentication protocol for the forward security (개선된 포워드 보안을 위한 인증 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.17-27
    • /
    • 2007
  • This paper proposes a key distribution and authentication protocol between user, service provider and key distribution center (KDC). This protocol is based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. In the proposed protocol, user and server update the session key under token-update operation, and user can process repeated efficient authentications by using updated session keys. And another merit is that KDC needs not to totally control the session key between user and server in proposed protocol. Even an attacker steals the parameters from the KDC, the attacker still can not calculate session key. According to the comparison and analysis with other protocols, our proposed protocol provides good efficiency and forward secure session key.

  • PDF

A Study on general logistic center of agriculture products for location selection model (농산물 종합물류센터조성을 위한 입지선정 평가요인 분석)

  • 김규창
    • Journal of Distribution Research
    • /
    • v.3 no.1
    • /
    • pp.145-158
    • /
    • 1998
  • The selection of proposed sites for the general logistic center of agriculture products would be made the most suitable place by considering the spread of population as real consumers, the prospect of the demand, the expansion of traffic system, the regional, hourly and carring traffic volume and the use of land based urban planning, etc. As the preconsideration, the possible occupant companies have to be selected on the category of business and the district. After posing questions and having interview, several selected regions would be compared and analysed for deciding the most suitable place. The model for the general logistic center of agricultural products must be selected taking key factors approach for choosing key factors at first and referring to many documentary records. And the more, cooperating with the specialists for location selection and making objective questions to concerned companies, the most suitable place is selected by marking high score for the moderate land cost, the low traffic jam, the connection with the back cities and the possible expansion as the general logistic center of agriculture products.

  • PDF

Using structural intensity approach to characterize vibro-acoustic behavior of the cylindrical shell structure

  • Wang, Yuran;Huang, Rong;Liu, Zishun
    • Coupled systems mechanics
    • /
    • v.7 no.3
    • /
    • pp.297-319
    • /
    • 2018
  • In this paper, the vibro-acoustic behaviors of vibrational cylindrical shells are investigated by using structural intensity approach. The reducing interior noise method for vibrating cylindrical shells is proposed by altering and redistributing the structural intensity through changing the damping property of the structure. The concept of proposed novel method is based on the properties of structural intensity distribution on cylindrical shells under different load and damping conditions, which can reflects power flow in the structures. In the study, the modal formulas of structural intensity are developed for the steady state vibration of cylindrical shell structures. The detailed formulas of structural intensity are derived by substituting modal quantities, in which the effect of main parameters such as weight coefficients and distribution functions on structure intensity are analyzed and discussed. Numerical simulations are first carried out based on the structural intensity analytical solutions of modal formulas. Through simulating the coupling vibration and acoustical radiation problems of cylindrical shell, the relationship between vibro-acoustic and structural intensity distribution is derived. We find that for cylindrical shell, by properly arranging damping conditions, the structural intensity can be efficiently changed and further the noise property can be improved. The proposed methodology has important implications and potential applications in the vibration and noise control of fuselage structure.

Influence of fracture characters on flow distribution under different Reynold numbers

  • Wang, Jing;Li, Shu-Cai;Li, Li-Ping;Gao, Cheng-Lu
    • Geomechanics and Engineering
    • /
    • v.14 no.2
    • /
    • pp.187-193
    • /
    • 2018
  • Water inrush through the destruction of water resisting rock mass structure was divided into direct water inrush, key block water inrush and splitting water inrush. In the direct water inrush, the Reynolds numbers has a significant effect on the distribution of the water flow and vortex occurred in the large Reynolds numbers. The permeability coefficient of the fracture is much larger than the rock, and the difference is between 104 and 107 times. The traditional theory and methods are not considering the effect of inertia force. In the position of the cross fracture, the distribution of water flow can only be linearly distributed according to the fracture opening degree. With the increase of Reynolds number, the relationship between water flow distribution and fracture opening is studied by Semtex.

PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid

  • He, Shiming;Zeng, Weini;Xie, Kun;Yang, Hongming;Lai, Mingyong;Su, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1510-1532
    • /
    • 2017
  • In smart grid, privacy implications to individuals and their families are an important issue because of the fine-grained usage data collection. Wireless communications are utilized by many utility companies to obtain information. Network coding is exploited in smart grids, to enhance network performance in terms of throughput, delay, robustness, and energy consumption. However, random linear network coding introduces a new challenge for privacy preserving due to the encoding of data and updating of coefficients in forwarder nodes. We propose a distributed privacy preserving scheme for random linear network coding in smart grid that considers the converged flows character of the smart grid and exploits a homomorphic encryption function to decrease the complexities in the forwarder node. It offers a data confidentiality privacy preserving feature, which can efficiently thwart traffic analysis. The data of the packet is encrypted and the tag of the packet is encrypted by a homomorphic encryption function. The forwarder node random linearly codes the encrypted data and directly processes the cryptotext tags based on the homomorphism feature. Extensive security analysis and performance evaluations demonstrate the validity and efficiency of the proposed scheme.

Geographic Distribution and Epidemiology of Lung Cancer During 2011 in Zhejiang Province of China

  • Lin, Xia-Lu;Chen, Yan;Gong, Wei-Wei;Wu, Zhao-Fan;Zou, Bao-Bo;Zhao, Jin-Shun;Gu, Hua;Jiang, Jian-Min
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.13
    • /
    • pp.5299-5303
    • /
    • 2014
  • Background: To explore etiology for providing scientific clues for the prevention of lung cancer. Materials and Methods: Data for lung cancer incidence and meteorological geographic factors from 25 counties in Zhejiang province of China during 2011 were studied. Stepwise multiple regression and correlation analysis were performed to analyze the geographic distribution and epidemiology of lung cancer. Results: 8,291 new cases (5,998 in males and 2,293 females) of lung cancer during 2011 in Zhejiang province were reported in the 25 studied counties. Reported and standardized incidence rates for lung cancer were 58.0 and 47.0 per 100,000 population, respectively. The incidence of lung cancer increased with age. Geographic distribution analysis shows that the standardized incidence rates of lung cancer in northeastern Zhejiang province were higher than in the southwestern part, such as in Nanhu, Fuyang, Wuxing and Yuyao counties, where the rates were more than 50 per 100,000 population. In the southwestern Zhejiang province, for instance, in Yueqing, Xianju and Jiande counties, the standardized incidence rates of lung cancer were lower than 37 per 100,000 population. Spearman correlation tests showed that forest coverage rate, air quality index (AQI), and annual precipitation level are associated with the incidence of lung cancer. Conclusions: Lung cancer in Zhejiang province shows obvious regional differences. High incidence appears associated with low forest coverage rate, poor air quality and low annual precipitation. Therefore, increasing the forest coverage rate and controlling air pollution may play an important role in lung cancer prevention.

Applied to Satellite Network of Modified Diffie-Hellman Scheme (Diffie-Hellman 방법의 위성망에서의 응용)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.23-30
    • /
    • 1996
  • This paper presented a key distribution scheme based on the Yacobi scheme that does not use the secret key provided by key distribution center as a power, but uses instead a random number generated by the user. The scheme is independent of the exposure of the secret key. Then this paper described modified Diffie-Hellman schemes based on the discrete logarithm and prime resolution into factors. The modified DH scheme was applied to point-to-multicasting, and broadcasting networks via satellite.

Height-thickness ratio on axial behavior of composite wall with truss connector

  • Qin, Ying;Shu, Gan-Ping;Zhou, Xiong-Liang;Han, Jian-Hong;He, Yun-Fei
    • Steel and Composite Structures
    • /
    • v.30 no.4
    • /
    • pp.315-325
    • /
    • 2019
  • Double skin composite walls offer structural and economic merits over conventional reinforced concrete counterparts in terms of higher capacity, greater stiffness, and better ductility. This paper investigated the axial behavior of double skin composite walls with steel truss connectors. Full-scaled tests were conducted on three specimens with different height-to-thickness ratios. Test results were evaluated in terms of failure mode, load-axial displacement response, buckling loading, axial stiffness, ductility, strength index, load-lateral deflection, and strain distribution. The test data were compared with AISC 360 and Eurocode 4 and it was found that both codes provided conservative predictions on the safe side.

A Secure Authentication Protocol of Nodes between Cluster based on ECC (ECC 기반의 클러스터간 노드들의 안전한 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.167-175
    • /
    • 2008
  • The current pre-distribution of secret keys uses a-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among nodes and it is not efficient to find public-key because of the problem for time and energy consumption. We presents key establishment scheme designed to satisfy authentication and confidentiality, without the need of a key distribution center. Proposed scheme is scalable since every node only needs to hold a small number of keys independent of the network size, and it is resilient against node capture and replication due to the fact that keys are localized. In simulation result, we estimate process time of parameter used in proposed scheme and efficiency of Proposed scheme even if increase ECC key length.

  • PDF