• Title/Summary/Keyword: Key account

Search Result 535, Processing Time 0.026 seconds

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

The Plural Subject Account of Group Beliefs Using Grounding Concept

  • Koo, Ja-Rok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.11
    • /
    • pp.17-23
    • /
    • 2015
  • In this paper, we propose a plural subject account of group beliefs using grounding concept, which bridges the gap between the two main approaches of ACLs, the mentalistic accounts and the social commitment accounts. The key idea of this Gilbert's plural subject account of group beliefs is to extend the grounding logic into the common ground framework for the semantics of ACLs which is fully verifiable, fully formalized and easily applicable. Thus, we formalize the proper group belief concept using common ground framework and we define the semantics of the primitive speech acts of FIPA-ACL such as inform, request and confirm as case studies. Also, we illustrate our framework on an e-commerce agent purchase negotiation and compare this proposed framework with two traditional semantics for ACLs.

Performance Analysis of IEEE 802.15.6 MAC Protocol in Beacon Mode with Superframes

  • Li, Changle;Geng, Xiaoyan;Yuan, Jingjing;Sun, Tingting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1108-1130
    • /
    • 2013
  • Wireless Body Area Networks (WBANs) are becoming increasingly important to solve the issue of health care. IEEE 802.15.6 is a wireless communication standard for WBANs, aiming to provide a real-time and continuous monitoring. In this paper, we present our development of a modified Markov Chain model and a backoff model, in which most features such as user priorities, contention windows, modulation and coding schemes (MCSs), and frozen states are taken into account. Then we calculate the normalized throughput and average access delay of IEEE 802.15.6 networks under saturation and ideal channel conditions. We make an evaluation of network performances by comparing with IEEE 802.15.4 and the results validate that IEEE 802.15.6 networks can provide high quality of service (QoS) for nodes with high priorities.

Presentation-Oriented Key-Frames Coding Based on Fractals

  • Atzori, Luigi;Giusto, Daniele D.;Murroni, Maurizio
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.713-724
    • /
    • 2005
  • This paper focuses on the problem of key-frames coding and proposes a new promising approach based on the use of fractals. The summary, made of a set of key-frames selected from a full-length video sequence, is coded by using a 3D fractal scheme. This allows the video presentation tool to expand the video sequence in a "natural" way by using the property of the fractals to reproduce the signal at several resolutions. This feature represents an important novelty of this work with respect to the alternative approaches, which mainly focus on the compression ratio without taking into account the presentation aspect of the video summary. In devising the coding scheme, we have taken care of the computational complexity inherent in fractal coding. Accordingly, the key-frames are first wavelet transformed, and the fractal coding is then applied to each subband to reduce the search range. Experimental results show the effectiveness of the proposed approach.

  • PDF

Identification of Key Nodes in Microblog Networks

  • Lu, Jing;Wan, Wanggen
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.52-61
    • /
    • 2016
  • A microblog is a service typically offered by online social networks, such as Twitter and Facebook. From the perspective of information dissemination, we define the concept behind a spreading matrix. A new WeiboRank algorithm for identification of key nodes in microblog networks is proposed, taking into account parameters such as a user's direct appeal, a user's influence region, and a user's global influence power. To investigate how measures for ranking influential users in a network correlate, we compare the relative influence ranks of the top 20 microblog users of a university network. The proposed algorithm is compared with other algorithms - PageRank, Betweeness Centrality, Closeness Centrality, Out-degree - using a new tweets propagation model - the Ignorants-Spreaders-Rejecters model. Comparison results show that key nodes obtained from the WeiboRank algorithm have a wider transmission range and better influence.

A quasi-static finite element approach for seismic analysis of tunnels considering tunnel excavation and P-waves

  • Zhao, Wusheng;Zhong, Kun;Chen, Weizhong;Xie, Peiyao
    • Earthquakes and Structures
    • /
    • v.22 no.6
    • /
    • pp.549-559
    • /
    • 2022
  • The quasi-static finite element (FE) approaches are widely used for the seismic analysis of tunnels. However, the conventional quasi-static approaches may cause significant deviations when the tunnel excavation process is simulated prior to the quasi-static analysis. In addition, they cannot account for vertical excitations. Therefore, this paper first highlights the limitations of conventional approaches. A hybrid quasi-static FE approach is subsequently proposed and extensively validated for various conditions. The hybrid approach is simple and not time consuming, and it can be used for the preliminary seismic design of tunnels, especially when the tunnel excavation and vertically propagating P-waves are considered.

Recovery Phrase Management Scheme for Public Blockchain Wallets based on OTP (공용 블록체인 지갑을 위한 OTP 기반 계정 복구 문자열 관리 체계)

  • Song, Seounghan;Kim, Suntae;Shin, Jung-Hoon;Lee, Jeong-Hyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.35-44
    • /
    • 2020
  • The growing use of public blockchain-based virtual cryptocurrency calls for secure management of blockchain account information managed through cryptocurrency wallet programs. The previously proposed wallet program has high security in terms of managing an account's private key, but low security in managing an account's recovery phrase. Therefore, in this paper, we propose a safe management system of blockchain account recovery string based on the new user authentication method using the user's mobile device information and OTP technique to overcome the problem of the existing account recovery string management method. It also conducts an analysis of the proposed blockchain account recovery string management system based on the expected behavior scenario.

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.

Certificateless Public Key Encryption Revisited: Security Model and Construction (무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계)

  • Kim, Songyi;Park, Seunghwan;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1109-1122
    • /
    • 2016
  • Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user's ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.

Interactions among Measles Virus Hemagglutinin, Fusion Protein and Cell Receptor Signaling Lymphocyte Activation Molecule (SLAM) Indicating a New Fusion-trimer Model

  • Zhang, Peng;Li, Lingyun;Hu, Chunlin;Xu, Qin;Liu, Xin;Qi, Yipeng
    • BMB Reports
    • /
    • v.38 no.4
    • /
    • pp.373-380
    • /
    • 2005
  • For measles viruses, fusion on the cell membrane is an important initial step in the entry into the infected cells. The recent research indicated that hemagglutinin firstly leads the conformational changes in the fusion protein then co-mediates the membrane fusion. In the work, we use the co-immunoprecipitation and pull-down techniques to identify the interactions among fusion protein, hemagglutinin and signaling lymphocyte activation molecule (SLAM), which reveal that the three proteins can form a functional complex to mediate the SLAM-dependent fusion. Moreover, under the confocal microscope, fusion protein and hemagglutinin protein can show the cocapping mediated by the SLAM. So fusion protein not only is involved in the fusion but also might directly interact with the SLAM to be a new fusion-trimer model, which might account for the infection mechanism of measles virus.