• 제목/요약/키워드: Key Uniqueness

검색결과 62건 처리시간 0.06초

LOCAL EXISTENCE AND GLOBAL UNIQUENESS IN ONE DIMENSIONAL NONLINEAR HYPERBOLIC INVERSE PROBLEMS

  • Choi, Jong-Sung
    • 대한수학회논문집
    • /
    • 제17권4호
    • /
    • pp.593-606
    • /
    • 2002
  • We prove local existence and global uniqueness in one dimensional nonlinear hyperbolic inverse problems. The basic key for showing the local existence of inverse solution is the principle of contracted mapping. As an application, we consider a hyperbolic inverse problem with damping term.

객체별 특징 벡터 기반 3D 콘텐츠 모델 해싱 (3D Content Model Hashing Based on Object Feature Vector)

  • 이석환;권기룡
    • 전자공학회논문지CI
    • /
    • 제47권6호
    • /
    • pp.75-85
    • /
    • 2010
  • 본 논문에서는 3D 콘텐츠 인증을 위한 객체별 특징 벡터 기반 강인한 3D 모델 해싱을 제안한다. 제안한 3D 모델 해싱에서는 다양한 객체들로 구성된 3D 모델에서 높은 면적을 가지는 특징 객체내의 꼭지점 거리들을 그룹화한다. 그리고 각 그룹들을 치환한 다음, 그룹 계수, 랜덤 변수 키와 이진화 과정에 의하여 최종 해쉬를 생성한다. 이 때 해쉬의 강인성은 객체 그룹별 꼭지점 거리 분포를 그룹 계수에 의하여 향상되고, 해쉬의 유일성은 그룹 계수를 치환 키 및 랜덤변수 키 기반의 이진화 과정에 의하여 향상된다. 실험 결과로부터 제안한 해싱이 다양한 메쉬 공격 및 기하학 공격에 대한 해쉬의 강인성과 유일성을 확인하였다.

센서 네트워크의 노드간 세션키 생성을 위한 개선된 프로토콜 (An Improved Protocol for Establishing A Session Key in Sensor Networks)

  • 김종은;조경산
    • 정보처리학회논문지C
    • /
    • 제13C권2호
    • /
    • pp.137-146
    • /
    • 2006
  • 제한된 연산 및 통신 능력을 갖는 센서 노드에서는 전통적인 공개키 기반의 보안 기법들을 사용할 수 없으므로, 두 센서 노드 사이의 안전한 통신이 센서 네트워크의 중요한 연구 과제가 되었으며 두 센서 노드 사이의 안전한 직접 통신을 위한 다양한 세션키 설정 프로토콜들이 제안되었다. 본 연구에서는 기존의 대표적인 세션키 설정 프로토콜들을 세션키 설정 방법, 세션키의 유일성, 연결성, 통신 및 연산 과부하, 공격 취약성 등의 기준 측도에 의해 분석하고, 분석 결과를 토대로 안전하고 효율적인 프로토콜을 위한 기준안을 제시하였다. 또한, 제시된 기준안을 만족시키는 개선된 세션키 생성 프로토콜을 제안하고, 제안 프로토콜의 성능적 우수성을 상세한 분석을 통해 제시하였다.

${\ll}$ 제내경소문(黃帝內經素問).생기통천론(黃帝內經素問)${\gg}$의 음양체용관(陰陽體用觀)에 대한 시론(試論) (The Eum-Yang Body-Function Perspective(陰陽體用觀) in the Saenggitongcheonron Chapter of the "Hwangjenaegyeong"(${\ll}$黃帝內經素問.生氣通天論${\gg}$))

  • 장우창
    • 대한한의학원전학회지
    • /
    • 제23권6호
    • /
    • pp.73-85
    • /
    • 2010
  • The chapter holds great importance in understanding the fundamental aspect of disease occurrence, for it contains key concepts of disease of Naegyeong medicine. For this reason, prominent doctors from Jang Gyeong-ak(張景岳) of Ming to Lee Gyujun (李奎晙) of late Josun have based their Yang Gi-centered medical theories on this chapter. However, doctors such as Ju Jinhyeong(朱震亨) who have stressed the importance of Eum, also used the contents of this chapter to support their perspective on disease, which means that the main voice of this chapter is still unclear. Based on the previous chapter, it is valid to say that uses the Eum-Yang Body-Function Perspective(陰陽體用觀) to establish the fundamentals of life and parallels the uniqueness of each kind of Gi, Eum and Yang, in leading Gi activity in mankind. This philosophy based on the uniqueness of the activity of Eum/Yang Gi expands its target from human to disease in general, becoming actualized as a theory of external/internal body-function perspective. Cultivation methods based on this uniqueness is also being suggested.

Error Correction Codes for Biometric Cryptosystem: An Overview

  • Teoh, Andrew Beng Jin;Kim, Jaihie
    • 정보와 통신
    • /
    • 제32권6호
    • /
    • pp.39-49
    • /
    • 2015
  • In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By incorporating biometrics technologies which utilize the uniqueness of personal characteristics, the security of cryptosystems could be strengthened as authentication now requires the presence of the user. Biometric Cryptosystem (BC) encompasses the design of cryptographic keys protection methods by incorporating biometrics. BC involves either key-biometrics binding or direct key generation from biometrics. However, the wide acceptance and deployment of BC solutions are constrained by the fuzziness related with biometric data. Hence, error correction codes (ECCs) should be adopted to ensure that fuzziness of biometric data can be alleviated. In this overview paper, we present such ECC solutions used in various BCs. We also delineate on the important facts to be considered when choosing appropriate ECCs for a particular biometric based solution from accuracy performance and security perspectives.

SOLUTIONS OF A CLASS OF COUPLED SYSTEMS OF FUZZY DELAY DIFFERENTIAL EQUATIONS

  • Wu, Yu-ting;Lan, Heng-you;Zhang, Fan
    • Nonlinear Functional Analysis and Applications
    • /
    • 제26권3호
    • /
    • pp.513-530
    • /
    • 2021
  • The purpose of this paper is to introduce and study a class of coupled systems of fuzzy delay differential equations involving fuzzy initial values and fuzzy source functions of triangular type. We assume that these initial values and source functions are triangular fuzzy functions and define solutions of the coupled systems as a triangular fuzzy function matrix consisting of real functional matrices. The method of triangular fuzzy function, fractional steps and fuzzy terms separation are used to solve the problems. Furthermore, we prove existence and uniqueness of solution for the considered systems, and then a solution algorithm is proposed. Finally, we present an example to illustrate our main results and give some work that can be done later.

Analyzing the Impact of Value Satisfaction on Behavioral Intention to Use E-Resources

  • Kumar, Vinod;Garg, Ruchi Jain;Vandana, Vandana;Zia, Adil
    • Journal of Information Science Theory and Practice
    • /
    • 제10권3호
    • /
    • pp.1-14
    • /
    • 2022
  • The present study investigates the impact of perceived value metrics in driving satisfaction and behavioral intention to use e-resource among its users. Utilitarian, hedonic, uniqueness, epistemic, and economic are key values selected for the purpose of investigation in the study. This empirical study is carried out through a survey and responses have been analyzed using structural equation modelling. The target group is selected by means of simple random sampling (users of e-resources in selected business schools). Findings of the study reveal that utilitarian values, hedonic values, epistemic values, and uniqueness values have a significant impact on the usage intention of e-resources; however, economic values reflect an insignificant relationship to intention to use e-resources. The study is a distinctive piece of work on investigating the most and the least significant value(s) associated with satisfaction and usage intentions of e-resources.

𝓗-SIMULATION FUNCTIONS AND Ωb-DISTANCE MAPPINGS IN THE SETTING OF Gb-METRIC SPACES AND APPLICATION

  • Tariq Qawasmeh
    • Nonlinear Functional Analysis and Applications
    • /
    • 제28권2호
    • /
    • pp.557-570
    • /
    • 2023
  • The conceptions of generalized b-metric spaces or Gb-metric spaces and a generalized Ω-distance mappings play a key role in proving many important theorems in existence and uniqueness of fixed point theory. In this manuscript, we establish a new type of contraction namely, Ωb(𝓗, 𝜃, s)-contraction, this contraction based on the concept of a generalized Ω-distance mappings which established by Abodayeh et.al. in 2017 together with the concept of 𝓗-simulation functions which established by Bataihah et.al [10] in 2020. By utilizing this new notion we prove new results in existence and uniqueness of fixed point. On the other hand, examples and application were established to show the importance of our results.

THE NEUMANN PROBLEM FOR A CLASS OF COMPLEX HESSIAN QUOTIENT EQUATIONS

  • Yuying Qian;Qiang Tu;Chenyue Xue
    • 대한수학회보
    • /
    • 제61권4호
    • /
    • pp.999-1017
    • /
    • 2024
  • In this paper, we study the Neumann problem for the complex Hessian quotient equation ${\frac{{\sigma}_k({\tau}{\Delta}uI+{\partial}{\bar{\partial}u)}}{{\sigma}_l({\tau}{\Delta}uI+{\partial}{\bar{\partial}u)}}}={\psi}$ with 0 ≤ 𝑙 < k ≤ n. We prove a priori estimate and global C1 estimates, in particular, we use the double normal second derivatives on the boundary to establish the global C2 estimates and prove the existence and the uniqueness for the Neumann problem of the above complex Hessian quotient equation.

SoC Virtual Platform with Secure Key Generation Module for Embedded Secure Devices

  • Seung-Ho Lim;Hyeok-Jin Lim;Seong-Cheon Park
    • Journal of Information Processing Systems
    • /
    • 제20권1호
    • /
    • pp.116-130
    • /
    • 2024
  • In the Internet-of-Things (IoT) or blockchain-based network systems, secure keys may be stored in individual devices; thus, individual devices should protect data by performing secure operations on the data transmitted and received over networks. Typically, secure functions, such as a physical unclonable function (PUF) and fully homomorphic encryption (FHE), are useful for generating safe keys and distributing data in a network. However, to provide these functions in embedded devices for IoT or blockchain systems, proper inspection is required for designing and implementing embedded system-on-chip (SoC) modules through overhead and performance analysis. In this paper, a virtual platform (SoC VP) was developed that includes a secure key generation module with a PUF and FHE. The SoC VP platform was implemented using SystemC, which enables the execution and verification of various aspects of the secure key generation module at the electronic system level and analyzes the system-level execution time, memory footprint, and performance, such as randomness and uniqueness. We experimentally verified the secure key generation module, and estimated the execution of the PUF key and FHE encryption based on the unit time of each module.