• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.031 seconds

Key Audit Matters Readability and Investor Reaction

  • CHIRAKOOL, Wichuta;POONPOOL, Nuttavong;WANGCHAROENDATE, Suwan;BHONGCHIRAWATTANA, Utis
    • Journal of Distribution Science
    • /
    • v.20 no.9
    • /
    • pp.73-81
    • /
    • 2022
  • Purpose: This study aimed to examine whether key audit matters (KAMs) readability influences investor reaction. Research design, data, and methodology: The signaling theory was applied to explain the behavior of investors when they receive useful information for their decisions. Data were collected from 1,866 firm-year observations from Thai listed companies in both the Stock Exchange of Thailand (SET) and the Market for Alternative Investment (MAI) for the fiscal years of 2016-2019. The study was based on secondary data, which were collected from the SET Market Analysis and Reporting Tool (SETSMART) database and the Stock Exchange of Thailand's website (www.set.or.th). A statistical regression method was used with panel data analysis to evaluate possible associations between KAMs readability and investor reaction. The study relied on popular readability measures (Fog Index). Moreover, investor reaction was measured by absolute cumulative abnormal return and abnormal trading volume. Results: It was found that the KAMs readability has positive significance on both absolute cumulative abnormal return and abnormal trading volume. Conclusion: This study showed a significant contribution to the implication of KAMs in an emerging economy. The results reveal that more readable KAMs disclosure distributed new insights and useful information to investors and led to reducing the information gap between auditors and investors.

Password-Based Key Exchange Protocols for Cross-Realm (Cross-Realm 환경에서 패스워드기반 키교환 프로토콜)

  • Lee, Young Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.139-150
    • /
    • 2009
  • Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Password-based protocols for authenticated key exchange are designed to work even when user authentication is done via the use of passwords drawn from a small known set of values. There have been many protocols proposed over the years for password authenticated key exchange in the three-party scenario, in which two clients attempt to establish a secret key interacting with one same authentication server. However, little has been done for password authenticated key exchange in the more general and realistic four-party setting, where two clients trying to establish a secret key are registered with different authentication servers. In fact, the recent protocol by Yeh and Sun seems to be the only password authenticated key exchange protocol in the four-party setting. But, the Yeh-Sun protocol adopts the so called "hybrid model", in which each client needs not only to remember a password shared with the server but also to store and manage the server's public key. In some sense, this hybrid approach obviates the reason for considering password authenticated protocols in the first place; it is difficult for humans to securely manage long cryptographic keys. In this work, we introduce a key agreement protocol and a key distribution protocol, respectively, that requires each client only to remember a password shared with its authentication server.

A Study on Mobile IPv4 Authentication Mechanisms

  • Lim, Jung-Muk;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.277-280
    • /
    • 2005
  • With the proliferation of mobile terminals, use of the Internet in mobile environments is becoming more common. To support mobility in these terminals, Mobile IPv4 is proposed and represents the standard in IPv4 environments. Authentication should be mandatory, because mobile terminals can utilize Internet services in any foreign domain. Mobile IPv4 provides symmetric key based authentication using the default HMAC-MD5. However, symmetric key based authentication creates a key distribution problem. To solve this problem, public key based authentication mechanisms have been proposed. In this paper, the performance of each of these mechanisms is evaluated. The results present that, among these mechanisms, partial certificate based authentication has superior performance, and certificate based authentication has the worst performance. Although current public key based authentication mechanisms have lower performance than symmetric key based authentication, this paper presents the possibility that public key based authentication mechanisms may be used for future mobile terminal authentication.

  • PDF

Compromise-Resistant Pairwise Key Establishments for Mobile Ad hoc Networks

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.375-378
    • /
    • 2006
  • This letter presents a pairwise key establishment scheme that is robust against the compromise of nodes in mobile ad hoc networks. Each node establishes local keys with its neighbor nodes that are at most three hops away at network boot-up time. When any two nodes establish a pairwise key, they receive the secret information from the nodes on the route between them, and construct the pairwise key using the secret information. Here, the local keys are utilized by the nodes on the route to send the secret information securely. The simulation results have proven that the proposed scheme provides better security than the key pre-distribution-based scheme.

  • PDF

Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture

  • Jiang, Lirong;Feng, Gang;Qin, Shuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4268-4290
    • /
    • 2015
  • Future mobile communications face enormous challenges as traditional voice services are replaced with increasing mobile multimedia and data services. To address the vast data traffic volume and the requirement of user Quality of Experience (QoE) in the next generation mobile networks, it is imperative to develop efficient content distribution technique, aiming at significantly reducing redundant data transmissions and improving content delivery performance. On the other hand, in recent years cloud computing as a promising new content-centric paradigm is exploited to fulfil the multimedia requirements by provisioning data and computing resources on demand. In this paper, we propose a cooperative caching framework which implements State based Content Distribution (SCD) algorithm for future mobile networks. In our proposed framework, cloud service providers deploy a plurality of cloudlets in the network forming a Distributed Cloud Service Network (DCSN), and pre-allocate content services in local cloudlets to avoid redundant content transmissions. We use content popularity and content state which is determined by content requests, editorial updates and new arrivals to formulate a content distribution optimization model. Data contents are deployed in local cloudlets according to the optimal solution to achieve the lowest average content delivery latency. We use simulation experiments to validate the effectiveness of our proposed framework. Numerical results show that the proposed framework can significantly improve content cache hit rate, reduce content delivery latency and outbound traffic volume in comparison with known existing caching strategies.

Species diversity and distribution of the genus Colpomenia (Scytosiphonaceae, Phaeophyceae) along the coast of China

  • Song, Xiao-Han;Hu, Zi-Min;Sun, Zhong-Min;Draisma, Stefano G.A.;Fresia, Pablo;Duan, De-Lin
    • ALGAE
    • /
    • v.34 no.3
    • /
    • pp.217-228
    • /
    • 2019
  • The marine brown algal genus Colpomenia has a worldwide distribution, with five species reported in Korea and Japan. However, no studies to date attempted to identify the number of species and geographical distribution of Colpomenia along Chinese coast. To fill the biodiversity knowledge gap, we analyzed 63 mitochondrial cox3 and 62 mitochondrial atp6 sequences of Colpomenia specimens collected from 30 localities along the Chinese coast. Maximum likelihood and Bayesian inference trees suggest the presence of at least three Colpomenia species (i.e., C. peregrina, C. claytoniae, and C. sinuosa) in China. C. peregrina and C. claytoniae are documented for the first time. C. sinuosa was only found in the South China Sea and its distribution didn't overlap with that of C. peregrina which was found in the Yellow-Bohai Sea and the East China Sea. C. claytoniae appears to be confined to three isolated islands in the East and the South China Sea, where it occurs in sympatry with, respectively, C. peregrina and C. sinuosa. Future study can focus on comparing eco-physiological differences of Colpomenia species in response to environmental variables and exploring possible genetic hybridization / introgression at inter-specific contact zones.

A Design and Implementation of DRM System by Applying System Authentication Method (시스템 인증기법을 적용한 DRM 시스템 설계 및 구현)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.177-184
    • /
    • 2009
  • The digital contents distribution system via network provides comfortability, usability, and diversified functions to content's users. However, for the characteristic of easy access of digital contents, the copyright infringements and indiscreet contents distribution are realized in this days. In other words, any users with the authentication key can access to copyright contents with any restrictions. To solve this problems, we proposed a user authentication mechanism which prevent indiscreet access to the digital content by using user system information. Also, to provide safe distribution of digital content, we used user's unique content authentication key.

A Peer-to-Peer Key Establishment Scheme without Pre-distributing Keys in Ad-Hoc Networks (Ad-Hoc 네트워크에서 선행 키 분배 없는 단 대 단 키 설정 방안)

  • 왕기철;방상원;정병호;조기환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.1015-1023
    • /
    • 2004
  • In order to protect an exchanged data, it is indispensable to establish a peer-to-peer key between the two communicating nodes. Pre-distributing keys among the nodes is unrealistic in Ad-Hoc network environment because of the dynamic nature of its network topology and the equal authority of its nodes. This paper presents a peer-to-peer key establishment scheme without pre-distributing keys in Ad-Hoc networks. The proposed scheme is based on the Diffie-Hellman key exchange protocol. Main idea is to prevent the falsification of Diffe-Hellman values using some elements of a hash chain. As a result, it is as safe as the underlying hash function against a man-in-the-middle attack. Simulation results have shown that the proposed scheme dramatically reduces the number of messages, and has relatively higher scalability, as compared with the key pre-distribution based scheme.

Recent Progress in Methods of Generating Water Mist for Fire Suppression

  • Guangxuan, Liao;Xin, Huang;Beihua, Cong;Jun, Qin;Jianghong, Liu;Xishi, Wang
    • Journal of ILASS-Korea
    • /
    • v.11 no.4
    • /
    • pp.251-265
    • /
    • 2006
  • To prevent the ozonosphere from being destroyed by Halon, it is an urgent task to find out Halon replacement. As one of the replacements water mist have showed broad applications by its advantages: little pollution to environment (not destroying the ozone layer or bring green house effect), extinguishing fire quickly, consuming a small quantity of water and having little damage to the protected objects. The methods of generating water mist strongly influence fire suppression effectiveness, which determine the cone angle, drop size distribution, flux uniformity, and momentum of the generating spray. The traditional water mist nozzle included pressure jet nozzles, impingement nozzles and twin-fluid nozzles. All of them have more or less disadvantages for fire suppression. Therefore, many research institutes and corporations are taking up with innovations in mist generation. This article provided some recent studies in State Key Laboratory of Fire Science (SKLFS) of University of Science and Technology of China. SKLFS have investigated new methods of generating water mist (i.e. effervescent atomization and ultrasonic atomization). and self developed a series of nozzles and developed advanced DPIVS (Digital Particle Image Velocimetry and Sizing) technique. Characteristics of water mist (the distribution of droplet sizes, flux density, spray dynamics and cone angle) produced by these nozzles were measured under different conditions (work pressure, nozzle geometry, etc.) using LDV/APV and DPTVS systems. A series of experiments were performed to study the fire suppression effectiveness in different fire scenario (different kindsof the fuel, fire size and ventilation conditions). The fire extinguishing mechanisms of water mist was also discussed.

  • PDF