• Title/Summary/Keyword: Key Exchange System

Search Result 228, Processing Time 0.024 seconds

Investigation on Ferroelectric and Magnetic Properties of Pb(Fe1/2Nb1/2)O3 Fe-Site Engineered with Antisymmetric Exchange Interaction (반대칭 교환 상호작용을 갖도록 Fe-Site가 제어된 PbFe1/2Nb1/2O3의 강유전/자기적 특성 연구)

  • Park, Ji-Hun;Lee, Ju-Hyeon;Cho, Jae-Hyeon;Jang, Jong Moon;Jo, Wook
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.35 no.3
    • /
    • pp.297-302
    • /
    • 2022
  • We investigated the origin of magnetic behaviors induced by an asymmetric spin exchange interaction in Fe-site engineered lead iron niobate [Pb(Fe1/2Nb1/2)O3, PFN], which exhibits a room-temperature multiferroicity. The magnitude of spin exchange interaction was regulated by the introduced transition metals with a distinct Bohr magneton, i.e., Cr, Co, and Ni. All compositions were found to have a single-phase perovskite structure keeping their ferroelectric order except for Cr introduction. We discovered that the incorporation of each transition metal imposes a distinct magnetic behavior on the lead iron niobate system; antiferro-, hard ferro-, and soft ferromagnetism for Cr, Co, and Ni, respectively. This indicates that orbital occupancy and interatomic distance play key roles in the determination of magnetic behavior rather than the magnitude of the individual Bohr magneton. Further investigations are planned, such as X-ray absorption spectroscopy, to clarify the origin of magnetic properties in this system.

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

Improving military officers' career management system as a strategy for personnel innovation in the military (군 간부의 경력관리 제도 개선을 통한 군 인사 혁신 방안)

  • Ju-Yong Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.153-161
    • /
    • 2024
  • This study proposes improvements to the personnel management system for military officers in South Korea, addressing challenges posed by rapidly changing security environments and population decline due to low birth rates. The research identifies key issues in the current system, including lack of predictability in long-term service selection, limited opportunities for professional development, uncertainties in post-retirement careers, rigid organizational culture, and inadequate responses to demographic changes. To address these issues, the study analyzes personnel management practices in foreign militaries, including the United States, United Kingdom, and Israel, deriving valuable insights. Based on this analysis, the research suggests several improvement measures: enhancing predictability in long-term service selection, providing tailored job transition support for different military specialties, and expanding personnel exchanges between military and civilian sectors. Specific recommendations include clarifying long-term service selection criteria, introducing a phased selection system, strengthening connections between military specialties and civilian job sectors, expanding support for professional certifications, and increasing personnel exchange programs with public institutions and private companies. The study also outlines necessary legal and institutional reforms, strategies for securing and allocating budgets, and a phased implementation plan. The research proposes amendments to the Military Personnel Management Act, legislation for supporting retired military personnel, and the introduction of a performance-based budget management system. A systematic implementation plan is presented, divided into short-term, medium-term, and long-term phases.

The Conceptual Model of the Smart City Platform for the Citizen Participation (시민참여를 위한 스마트 도시 플랫폼의 개념모델)

  • Seo, Dong-Jo;Kim, Mi-Yun
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.63-73
    • /
    • 2021
  • In order to effectively promote a smart city, various urban information must be opened and linked, and the information system that each member can share is required. In addition, it is necessary to establish a cooperative system in which citizens and citizen's organizations can participate. In this study, the components and conceptual model of a smart city platform were proposed to create a smart city that enables citizen participation. Its components include sensors for collecting data from the real world, information storage and management, information sharing and standard system, citizens' personal information protection and management system, utilization and service, etc. For the conceptual model, roles of smart city members were defined, so that citizen-centered participation and services could be made. It also includes data collection, information linkage and sharing, and service configuration system. Citizens can perform various roles such as data collector and provider, service planner or requestor, service beneficiary, etc. Ultimately, free communication and exchange of opinions with citizens is a key factor in the success of smart cities.

Managing and Modeling Strategy of Geo-features in Web-based 3D GIS

  • Kim, Kyong-Ho;Choe, Seung-Keol;Lee, Jong-Hun;Yang, Young-Kyu
    • Proceedings of the KSRS Conference
    • /
    • 1999.11a
    • /
    • pp.75-79
    • /
    • 1999
  • Geo-features play a key role in object-oriented or feature-based geo-processing system. So the strategy for how-to-model and how-to-manage the geo-features builds the main architecture of the entire system and also supports the efficiency and functionality of the system. Unlike the conventional 2D geo-processing system, geo-features in 3B GIS have lots to be considered to model regarding the efficient manipulation and analysis and visualization. When the system is running on the Web, it should also be considered that how to leverage the level of detail and the level of automation of modeling in addition to the support for client side data interoperability. We built a set of 3D geo-features, and each geo-feature contains a set of aspatial data and 3D geo-primitives. The 3D geo-primitives contain the fundamental modeling data such as the height of building and the burial depth of gas pipeline. We separated the additional modeling data on the geometry and appearance of the model from the fundamental modeling data to make the table in database more concise and to allow the users more freedom to represent the geo-object. To get the users to build and exchange their own data, we devised a file format called VGFF 2.0 which stands for Virtual GIS File Format. It is to describe the three dimensional geo-information in XML(eXtensible Markup Language). The DTD(Document Type Definition) of VGFF 2.0 is parsed using the DOM(Document Object Model). We also developed the authoring tools for. users can make their own 3D geo-features and model and save the data to VGFF 2.0 format. We are now expecting the VGFF 2.0 evolve to the 3D version of SVG(Scalable Vector Graphics) especially for 3D GIS on the Web.

  • PDF

Managing Scheme for 3-dimensional Geo-features using XML

  • Kim, Kyong-Ho;Choe, Seung-Keol;Lee, Jong-Hun;Yang, Young-Kyu
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 1999.12a
    • /
    • pp.47-51
    • /
    • 1999
  • Geo-features play a key role in object-oriented or feature-based geo-processing system. So the strategy for how-to-model and how-to-manage the geo-features builds the main architecture of the entire system and also supports the efficiency and functionality of the system. Unlike the conventional 2D geo-processing system, geo-features in 3D GIS have lots to be considered to model regarding the efficient manipulation and analysis and visualization. When the system is running on the Web, it should also be considered that how to leverage the level of detail and the level of automation of modeling in addition to the support for client side data interoperability. We built a set of 3D geo-features, and each geo-feature contains a set of aspatial data and 3D geo-primitives. The 3D geo-primitives contain the fundamental modeling data such as the height of building and the burial depth of gas pipeline. We separated the additional modeling data on the geometry and appearance of the model from the fundamental modeling data to make the table in database more concise and to allow the users more freedom to represent the geo-object. To get the users to build and exchange their own data, we devised a fie format called VGFF 2.0 which stands for Virtual GIS File Format. It is to describe the three dimensional geo-information in XML(extensible Markup Language). The DTD(Document Type Definition) of VGFF 2.0 is parsed using the DOM(Document Object Model). We also developed the authoring tools for users can make their own 3D geo-features and model and save the data to VGFF 2.0 format. We are now expecting the VGFF 2.0 evolve to the 3D version of SVG(Scalable Vector Graphics) especially for 3D GIS on the Web.

  • PDF

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

Financial and Economic Risk Prevention and Countermeasures Based on Big Data and Internet of Things

  • Songyan Liu;Pengfei Liu;Hecheng Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.391-398
    • /
    • 2024
  • Given the further promotion of economic globalization, China's financial market has also expanded. However, at present, this market faces substantial risks. The main financial and economic risks in China are in the areas of policy, credit, exchange rates, accounting, and interest rates. The current status of China's financial market is as follows: insufficient attention from upper management; insufficient innovation in the development of the financial economy; and lack of a sound financial and economic risk protection system. To further understand the current situation of China's financial market, we conducted a questionnaire survey on the financial market and reached the following conclusions. A comprehensive enterprise questionnaire from the government's perspective, the enterprise's perspective and the individual's perspective showed that the following problems exist in the financial and economic risk prevention aspects of big data and Internet of Things in China. The political system at the country's grassroots level is not comprehensive enough. The legal regulatory system is not comprehensive enough, leading to serious incidents of loan fraud. The top management of enterprises does not pay enough attention to financial risk prevention. Therefore, we constructed a financial and economic risk prevention model based on big data and Internet of Things that has effective preventive capabilities for both enterprises and individuals. The concept reflected in the model is to obtain data through Internet of Things, use big data for screening, and then pass these data to the big data analysis system at the grassroots level for analysis. The data initially screened as big data are analyzed in depth, and we obtain the original data that can be used to make decisions. Finally, we put forward the corresponding opinions, and their main contents represent the following points: the key is to build a sound national financial and economic risk prevention and assessment system, the guarantee is to strengthen the supervision of national financial risks, and the purpose is to promote the marketization of financial interest rates.

International Monetary System Reform and the G20 (국제통화제도의 개혁과 G20)

  • Cho, Yoon Je
    • KDI Journal of Economic Policy
    • /
    • v.32 no.4
    • /
    • pp.153-195
    • /
    • 2010
  • The recent global financial crisis has been the outcome of, among other things, the mismatch between institutions and the reality of the market in the current global financial system. The International financial institutions (IFIs) that were designed more than 60 years ago can no longer effectively meet the challenges posed by the current global economy. While the global financial market has become integrated like a single market, there is no international lender of last resort or global regulatory body. There also has been a rapid shift in the weight of economic power. The share of the Group of 7 (G7) countries in global gross domestic product (GDP) fell and the share of emerging market economies increased rapidly. Therefore, the tasks facing us today are: (i) to reform the IFIs -mandate, resources, management, and governance structure; (ii) to reform the system such as the international monetary system (IMS), and regulatory framework of the global financial system; and (iii) to reform global economic governance. The main focus of this paper will be the IMS reform and the role of the Group of Twenty (G20) summit meetings. The current IMS problems can be summarized as follows. First, the demand for foreign reserve accumulation has been increasing despite the movement from fixed exchange rate regimes to floating rate regimes some 40 years ago. Second, this increasing demand for foreign reserves has been concentrated in US dollar assets, especially public securities. Third, as the IMS relies too heavily on the supply of currency issued by a center country (the US), it gives an exorbitant privilege to this country, which can issue Treasury bills at the lowest possible interest rate in the international capital market. Fourth, as a related problem, the global financial system depends too heavily on the center country's ability to maintain the stability of the value of its currency and strength of its own financial system. Fifth, international capital flows have been distorted in the current IMS, from EMEs and developing countries where the productivity of capital investment is higher, to advanced economies, especially the US, where the return to capital investment is lower. Given these problems, there have been various proposals to reform the current IMS. They can be grouped into two: demand-side and supply-side reform. The key in the former is how to reduce the widespread strong demand for foreign reserve holdings among EMEs. There have been several proposals to reduce the self-insurance motivation. They include third-party insurance and the expansion of the opportunity to borrow from a global and regional reserve pool, or access to global lender of last resort (or something similar). However, the first option would be too costly. That leads us to the second option - building a stronger globalfinancial safety net. Discussions on supply-side reform of the IMS focus on how to diversify the supply of international reserve currency. The proposals include moving to a multiple currency system; increased allocation and wider use of special drawing rights (SDR); and creating a new global reserve currency. A key question is whether diversification should be encouraged among suitable existing currencies, or if it should be sought more with global reserve assets, acting as a complement or even substitute to existing ones. Each proposal has its pros and cons; they also face trade-offs between desirability and political feasibility. The transition would require close collaboration among the major players. This should include efforts at the least to strengthen policy coordination and collaboration among the major economies, and to reform the IMF to make it a more effective institution for bilateral and multilateral surveillance and as an international lender of last resort. The success on both fronts depends heavily on global economic governance reform and the role of the G20. The challenge is how to make the G20 effective. Without institutional innovations within the G20, there is a high risk that its summits will follow the path of previous summit meetings, such as G7/G8.

  • PDF