• 제목/요약/키워드: Key distribution

검색결과 2,530건 처리시간 0.025초

Review of Vendor Managed Inventory: Investigation on How It Improves Supply Chain Performance

  • Ryu, Chung-Suk
    • 유통과학연구
    • /
    • 제14권9호
    • /
    • pp.47-64
    • /
    • 2016
  • Purpose - This study reviews the past studies that have researched Vendor Managed Inventory (VMI) as a well-known supply chain collaboration program. The main goals of this study are to figure out how VMI brings significant benefits to the supply chain system and suggest additional areas that future studies would address to discover the true nature of VMI. Research design, data, methodology - This study conducts literature reviews on numerous studies that have researched VMI. The past studies are classified in terms of several main issues that have been commonly addressed by many researchers. This study also identifies three key collaborative features of VMI, which possibly explain why VMI improves the supply chain performance. Results - This study finds out that most past studies focused on a limited research issues about VMI. Many researchers have considered integrated decision making and information sharing to be key features that enables VMI to improve the supply chain performance. Conclusions - Based on the findings from the literature review, this study suggests that future studies on VMI take account of new research issues and pay attention to cost payment that researchers have rarely addressed.

우리나라 Encarsia Förster에 대한 보고(벌목: 면충좀벌과) (New Records of Aphelinids, Encarsia Förster (Hymenoptera: Aphelinidae), in Korea)

  • 서수정
    • 한국응용곤충학회지
    • /
    • 제54권3호
    • /
    • pp.281-284
    • /
    • 2015
  • 각진장미흰깍지벌레, 참식나무흰깍지벌레와 후박나무굴깍지벌레로부터 채집된 Encarsia explorata (Silvestri) [후박굴깍지좀벌 (신칭)] 및 담배가루이로부터 채집된 Encarsia lutea (Masi) [가루이좀벌 (신칭)] 을 국내분포로 처음 보고한다. 또한 이들 종들의 검색표, 식별형질, 사진자료, 분포 및 기주 정보도 함께 제공하였다.

Source Environment Feature Related Phylogenetic Distribution Pattern of Anoxygenic Photosynthetic Bacteria as Revealed by pufM Analysis

  • Zeng, Yonghui;Jiao, Nianzhi
    • Journal of Microbiology
    • /
    • 제45권3호
    • /
    • pp.205-212
    • /
    • 2007
  • Anoxygenic photosynthesis, performed primarily by anoxygenic photosynthetic bacteria (APB), has been supposed to arise on Earth more than 3 billion years ago. The long established APB are distributed in almost every corner where light can reach. However, the relationship between APB phylogeny and source environments has been largely unexplored. Here we retrieved the pufM sequences and related source information of 89 pufM containing species from the public database. Phylogenetic analysis revealed that horizontal gene transfer (HGT) most likely occurred within 11 out of a total 21 pufM subgroups, not only among species within the same class but also among species of different phyla or subphyla. A clear source environment feature related phylogenetic distribution pattern was observed, with all species from oxic habitats and those from anoxic habitats clustering into independent subgroups, respectively. HGT among ancient APB and subsequent long term evolution and adaptation to separated niches may have contributed to the coupling of environment and pufM phylogeny.

효율적인 회의용 키분배 시스템을 위한 Block Design의 응용 (Application of Block Design for an Efficient Conference Key Distribution System)

  • 이태훈;정일용
    • 정보처리학회논문지C
    • /
    • 제8C권3호
    • /
    • pp.271-276
    • /
    • 2001
  • 회의용 키분배 시스템은 회의용 키를 생성하여 키를 회의에 참석하고 있는 사람에게만 전달하여 서로간에 안전하게 통신하도록 한다. 본 논문에서는 Block Design의 한 분류인 symmetric balanced incomplete block design(SBIBD)를 적용한 효율적인 회의용 키분배시스템을 제안한다. 회의용 키를 생성하고 개인식별 정보를 근거로 하여 인증을 수행하는 통신 프로토콜이 설계된다. 제안된 프로토콜은 회의용 키를 생성하는 메시지의 복잡도를 최소화시키는데, SBIBD의 특별한 분류에서는 참석자의 수 v에 따라 메시지 복잡도는 O(v√v)가 된다. 보안시스템의 구현에서 중요한 요소인 프로토콜의 안전성은 factoring과 discrete logarithm을 계산할 정도로 난해하여 충분히 보장됨을 증명할 수 있다.

  • PDF

인증 및 키 분배 프로토콜의 논리성 검증을 위한 ASVO 로직 (Automation-considered SVO Logic for Verifying Authentication and Key Distribution Protocols)

  • 권태경;임선간;박해룡
    • 정보보호학회논문지
    • /
    • 제13권5호
    • /
    • pp.17-37
    • /
    • 2003
  • 본 논문에서는 인증 및 키 분배 프로토콜에 대한 논리성 검증을 위한 ASVO 로직을 제안한다. ASVO 로직은 기존의 인증 로직 중 하나인 SVO 로직에 대해서 자동 검증을 고려하여 변형 설계한 로직이다. ASVO 로직은 구문적/의미적 구조의 안전성을 갖는 로직으로서. 비교적 간소화된 증명 단계를 갖는다. 또한 Isabelle/Isar 시스템을 이용하여 구현된 Isabelle/ASVO 시스템은 ASVO 로직을 통한 반자동 검증을 지원한다.

그룹 통신을 위한 멀티캐스트 키 분배 프로토콜 설계 및 검증 (The Design and Verification of Multicast Key Distribution Protocol for Group Communication)

  • 김봉한
    • 정보보호학회논문지
    • /
    • 제10권2호
    • /
    • pp.31-42
    • /
    • 2000
  • 특성 사용자 그룹에게만 음성과 영상 데이터를 전송할 수 있는 통신 메커니즘을 가진 멀티캐스트는 유니캐스트와 비교해서 통신 링크의 수가 상당히 많으므로 부당한 공격자로부터 신분위장 서비스 부인 공격과 재전송 공격 부인, 트래픽 관찰 공격을 받기가 쉽다. 그러므로 본논문에서는 현재 멀티캐스트 통신을 위해서 제안 및 사용되고 있는 여러 가지 멀티캐스트 라우팅 프로토콜 중에서 보다 효율적인 보안 체계를 구성할 수 있는 공유 트리를 기반으로 하는 코어 기반 트리(CBT: Core Based Tree)를 이용하여 3개로 구성된 그룹키 KEK TEK을 획득함으로서 안전한 멀티캐스트 통신이 가능한 키 분배 프로토콜을 설계하였다 그리고 패트리넷을 이용하여 안전성을 검증하였다.

물류공동화 사용의도에 영향을 미치는 의료공급사슬관리 경쟁역량 연구 (A Study on the HSCM Capabilities which Affect Usage Intention of Logistics Collaboration)

  • 정대현;김진성
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제31권2호
    • /
    • pp.179-196
    • /
    • 2022
  • Purpose The purpose of this study is to examine what expectations and mediating factors are needed as variables necessary for the intention to use logistics hollowing out, and at the same time, what factors strengthen medical SCM competitiveness. In order to develop competitive competency variables for medical institutions that affect the intention to use logistics cavitation, we would like to examine the key success factors applying AHP model analysis. Design/methodology/approach For AMOS analysis, we conducted an online survey of four universities and analyzed 212 samples. The analysis method used SPSS, and AMOS. We proposed several factors categorized as reliability, SCM advance, and scalability. Findings The results showed that all proposed variables (competitive competencies for HSCM, expected performance) had a significant impact on intention of physical distribution cooperation. According to the measurement methods proposed in this study, key success factors for strengthening the capacity of HSCM can increase the need for physical distribution cooperation through expected performance.

Homomorphic Subspace MAC Scheme for Secure Network Coding

  • Liu, Guangjun;Wang, Xiao
    • ETRI Journal
    • /
    • 제35권1호
    • /
    • pp.173-176
    • /
    • 2013
  • Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This letter presents a novel homomorphic subspace message authentication code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is to exploit the combination of the symmetric cryptography and linear subspace properties of network coding. The proposed scheme can tolerate the compromise of up to r-1 intermediate nodes when r source keys are used. Compared to previous MAC solutions, less secret keys are needed for the source and only one secret key is distributed to each intermediate node.

Enhancing Irregular Repetition Slotted ALOHA with Polarization Diversity in LEO Satellite Networks

  • Su, Jingrui;Ren, Guangliang;Zhao, Bo;Ding, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3907-3923
    • /
    • 2020
  • An enhanced irregular repetition slotted ALOHA (IRSA) protocol is proposed by using polarization characteristic of satellite link and MIMO detection in low earth orbit (LEO) satellite networks, which is dubbed polarized MIMO IRSA (PM-IRSA). In the proposed scheme, one or two packets in one slot can be decoded by employing polarized MIMO detection, and more than two collided packets in multiple slots which can construct the virtual MIMO model can be decoded by the MIMO detection algorithm. The performance of the proposed scheme is analyzed with the density evolution (DE) approach and the degree distribution is optimized to maximize the system throughput by using a differential evolution. Numerical results certify our analysis and show that the normalized throughput of the proposed PM-IRSA can achieve 1.89 bits/symbol.

Geometric structure and electronic behavior of Rh decorating effect on zigzag CNTs (n=7-12): A DFT study

  • Cui, Hao;Zhang, Xiaoxing;Zhou, Yongjian;Zhang, Jun
    • Carbon letters
    • /
    • 제26권
    • /
    • pp.61-65
    • /
    • 2018
  • Comprehensive calculations of the Rh decoration effect on zigzag CNTs with n ranging from 7 to 12 were conducted in this work to understand the effect of Rh doping on geometric structures and electronic behaviors upon metallic and semiconducting CNTs. The obtained results indicated that Rh dopant not only contributes to the deformation of C-C bonds on the sidewall of CNTs, but also transforms the electron distribution of related complexes, thereby leading to a remarkable increase of the conductivity of pure CNTs given the emerged novel state within the energy gap for metallic CNTs and the narrowed energy gap for semiconducting CNTs. Our calculations will be meaningful for exploiting novel CNT-based materials with better sensitivity to electrons and higher electrical conductivity compared with pure CNTs.