• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.027 seconds

A Secure Multicast Key Distribution Protocol (안전한 멀티캐스트 키분배 프로토콜)

  • 조현호;박영호;이경현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.152-156
    • /
    • 2001
  • In this paper we propose a secure multicast key distribution protocol using OFT(One-way Function Trees). The proposed protocol is a hybrid scheme of DKMP(Distributed Key Management Protocol) that guarantees all group member's participation for generating a group key, and CKMP(Centralized Key Management Protocol) that makes it easy to manage group key and design a protocol. Since the proposed protocol also computes group key using only hash function and bitwise-XOR, computational overhead ran be reduced. Hence it is suitably and efficiently adaptive to dynamic multicast environment that membership change event frequently occurs.

  • PDF

A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure (네트웍 환경에서 안전한 Kerberos 인증 메커니즘에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2002
  • In Network Environment, Kerberos certification mechanism to require Kerberos server in other area unconditionally belief. Also, Kerberos server in cooperation area must be share server of other area and secret key. To solve these two problems, this paper proposed safe security mechanism of doing to ably IETF CAT's PKINIT/PKCROSS a1gorithm with Public Key Infrastructure and use Directory System and service between realms do trust and prove each Kerberos trust center base. Also, Although Kerberos server of each area must be foreknowing each server's secret key and public key, Obtain through Trust center and acquire each area's public key and common symmetric key, Application server excluded process that must register key in Key Distribution Center.

A study on the Entry Strategy of Chinese Distribution Market in Korean Company (한국 기업의 중국 유통시장의 진출 전략에 관한 연구)

  • Oh, Soo-Kyun
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.321-350
    • /
    • 2008
  • The China has opened the distribution market completely since it joined the World Trade Organization on Dec 11 2001. The notable features of Chinese distribution market are the transition from the consumers' monolithic demand to diversification for the luxury goods, well-being products. The regional characteristics of consumers are smart, conservative, optimistic and advanced. and the open door policy has prompted the capitalistic economy gradually. We analyzed the Chinese distribution markets and came up with the following strategies. First, we recommend the setting of the key regional market not covering the whole chinese markets. then we can extend the main market step by step. Second, we need to cooperate and advance with the Korean distribution companies which entered into markets already. Third, we need to acquire the competitive and stable distribution channel in China. Fourth, we need to implement the localization strategy in terms of human resources and procurement. Fifth, the consignment management can be another strategy. I hope this research can be a little help to those who wish to expand to the Chinese markets.

  • PDF

A meso-scale approach to modeling thermal cracking of concrete induced by water-cooling pipes

  • Zhang, Chao;Zhou, Wei;Ma, Gang;Hu, Chao;Li, Shaolin
    • Computers and Concrete
    • /
    • v.15 no.4
    • /
    • pp.485-501
    • /
    • 2015
  • Cooling by the flow of water through an embedded cooling pipe has become a common and effective artificial thermal control measure for massive concrete structures. However, an extreme thermal gradient induces significant thermal stress, resulting in thermal cracking. Using a mesoscopic finite-element (FE) mesh, three-phase composites of concrete namely aggregate, mortar matrix and interfacial transition zone (ITZ) are modeled. An equivalent probabilistic model is presented for failure study of concrete by assuming that the material properties conform to the Weibull distribution law. Meanwhile, the correlation coefficient introduced by the statistical method is incorporated into the Weibull distribution formula. Subsequently, a series of numerical analyses are used for investigating the influence of the correlation coefficient on tensile strength and the failure process of concrete based on the equivalent probabilistic model. Finally, as an engineering application, damage and failure behavior of concrete cracks induced by a water-cooling pipe are analyzed in-depth by the presented model. Results show that the random distribution of concrete mechanical parameters and the temperature gradient near water-cooling pipe have a significant influence on the pattern and failure progress of temperature-induced micro-cracking in concrete.

Key Pose-based Proposal Distribution for Upper Body Pose Tracking (상반신 포즈 추적을 위한 키포즈 기반 예측분포)

  • Oh, Chi-Min;Lee, Chil-Woo
    • The KIPS Transactions:PartB
    • /
    • v.18B no.1
    • /
    • pp.11-20
    • /
    • 2011
  • Pictorial Structures is known as an effective method that recognizes and tracks human poses. In this paper, the upper body pose is also tracked by PS and a particle filter(PF). PF is one of dynamic programming methods. But Markov chain-based dynamic motion model which is used in dynamic programming methods such as PF, couldn't predict effectively the highly articulated upper body motions. Therefore PF often fails to track upper body pose. In this paper we propose the key pose-based proposal distribution for proper particle prediction based on the similarities between key poses and an upper body silhouette. In the experimental results we confirmed our 70.51% improved performance comparing with a conventional method.

Diversity and Distribution of Methanogenic Archaea in an Anaerobic Baffled Reactor (ABR) Treating Sugar Refinery Wastewater

  • Li, Jianzheng;Zhang, Liguo;Ban, Qiaoying;Jha, Ajay Kumar;Xu, Yiping
    • Journal of Microbiology and Biotechnology
    • /
    • v.23 no.2
    • /
    • pp.137-143
    • /
    • 2013
  • The diversity and distribution of methanogenic archaea in a four-compartment anaerobic baffled reactor (ABR) treating sugar refinery wastewater were investigated by polymerase chain reaction-denaturing gradient gel electrophoresis (PCR-DGGE). At an organic loading rate of 5.33 kg $COD/m^3{\cdot}day$, the ABR could perform steadily with the mean chemical oxygen demand (COD) removal of 94.8% and the specific $CH_4$ yield of 0.21 l/g $COD_{removed}$. The $CH_4$ content in the biogas was increased along the compartments, whereas the percentage of $H_2$ was decreased, indicating the distribution characteristics of the methanogens occurred longitudinally down the ABR. A high phylogenetic and ecological diversity of methanogens was found in the ABR, and all the detected methanogens were classified into six groups, including Methanomicrobiales, Methanosarcinales, Methanobacteriales, Crenarchaeota, Arc I, and Unidentified. Among the methanogenic population, the acid-tolerant hydrogenotrophic methanogens including Methanoregula and Methanosphaerula dominated the first two compartments. In the last two compartments, the dominant methanogenic population was Methanosaeta, which was the major acetate oxidizer under methanogenic conditions and could promote the formation of granular sludge. The distribution of the hydrogenotrophic (acid-tolerant) and acetotrophic methanogens in sequence along the compartments allowed the ABR to perform more efficiently and steadily.

A Efficient Key Distribution Scheme for Individual/Group Communication on TRS (TRS 상의 개별/그룹 통신을 위한 효율적인 키 분배 기법)

  • Lee, Deok-Gyu;Park, Yong-Suk;Ahn, Jong-Chul;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.913-922
    • /
    • 2006
  • It used exclusively the radio communication where is the TRS(Trunked Radio Service) at frequency where the person whom it does is specific with hitherto radio communication method differently frequency of the decimal which is allocated to the relay station it talks the at the room which the multiple user uses with commonness. The TRS system the most big feature is the region multiple group and order communication method. The TRS the composition of system is composed of the multi mind group, the each group is composed of the terminal of the users who have the objective which is similar relates in business contents. With above it follows in same multi objective and the connection of the form which is various or group communication accomplishes and quality case, a possibility a or of having many problem point in key distribution for a large scale communication there is it could be exposed to attack of the form which is various. There is a place where it accomplishes the communication which is safe at the TRS from research which it sees it investigates group key distribution method which is an essential element. The method which it sees when it reduces a communication frequency, it stands but is the user, it proposes the efficient group key distribution method it will be able to accomplish.

An Experimental Study on Pairwise Key Pre-distribution Schemes of Wireless Sensor Networks Considering 3D Environments (3D 환경을 고려한 무선 센서 네트워크의 키 사전 분배 기법 실험 연구)

  • Yun, Hyemin;Shin, Sooyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.975-980
    • /
    • 2020
  • To protect wireless sensor networks (WSNs), various key distribution and management schemes have been proposed. However, most of them conducted simulations and experiments for performance evaluation by considering only the two-dimensional (2D) environments. In this paper, we investigate the effect of real-world three-dimensional (3D) topographic features on the key pre-distribution schemes for WSNs. For this purpose, we analyze and compare the performance of three pairwise key pre-distribution schemes in 2D and 3D environments: full pairwise (FP), random pairwise (RP), and full and random pairwise (FRP) schemes. For the experiments, we employ a network simulator NS-3 and 3D graphic tools such as Blender and Unity. As a result, we confirm that there was a difference in the performance of each scheme according to the actual 3D terrain and that the location-based FRP that considers deployment errors, has the highest efficiency in many aspects.

Distribution and Pathogenicity of Fusarium Species Associated with Soybean Root Rot in Northeast China

  • Yingying Liu;Xuena Wei;Feng Chang;Na Yu;Changhong Guo;Hongsheng Cai
    • The Plant Pathology Journal
    • /
    • v.39 no.6
    • /
    • pp.575-583
    • /
    • 2023
  • Fusarium root rot is an increasingly severe problem in soybean cultivation. Although several Fusarium species have been reported to infect soybean roots in Heilongjiang province, their frequency and aggressiveness have not been systematically quantified in the region. This study aimed to investigate the diversity and distribution of Fusarium species that cause soybean root rot in Heilongjiang province over two years. A total of 485 isolates belonging to nine Fusarium species were identified, with F. oxysporum and F. solani being the most prevalent. Pot experiments were conducted to examine the relative aggressiveness of different Fusarium species on soybean roots, revealing that F. oxysporum and F. solani were the most aggressive pathogens, causing the most severe root rot symptoms. The study also assessed the susceptibility of different soybean cultivars to Fusarium root rot caused by F. oxysporum and F. solani. The results indicated that the soybean cultivar DN51 exhibited the most resistance to both pathogens, indicating that it may possess genetic traits that make it less susceptible to Fusarium root rot. These findings provide valuable insights into the diversity and distribution of Fusarium species that cause soybean root rot and could facilitate the development of effective management strategies for this disease.

A Design of Secure Communication Architecture Applying Quantum Cryptography

  • Shim, Kyu-Seok;Kim, Yong-Hwan;Lee, Wonhyuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.123-134
    • /
    • 2022
  • Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography systems is actively being conducted. The most powerful cryptography systems are quantum key distribution (QKD) and post quantum cryptograph (PQC) systems; in this study, a network based on both QKD and PQC is proposed, along with a quantum key management system (QKMS) and a Q-controller to efficiently operate the network. The proposed quantum cryptography communication network uses QKD as its backbone, and replaces QKD with PQC at the user end to overcome the shortcomings of QKD. This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.