• Title/Summary/Keyword: Key distribution

Search Result 2,552, Processing Time 0.03 seconds

Online Music Distribution Strategy to Develop the future Hallyu Music Industry

  • Woo-Jun JANG;Min-Ho CHANG
    • Journal of Distribution Science
    • /
    • v.22 no.6
    • /
    • pp.115-122
    • /
    • 2024
  • Purpose: The main aim of this study is to analyze and suggest new online music distribution models targeted to facilitate the development of the Korean Wave (Hallyu) music market in all locations of the world. This study is conducted through a close analysis of the prevailing distribution models, the unique challenges of the K-pop market, and the trends in new technologies. Research design, data and methodology: To address the issue of how the online music distribution market could be domesticated for the Korean music industry, a systematic review of the previous studies was conducted. The use of the PRISMA approach was followed so that an accurate and transparent method for choosing the studies is ensured. Results: According to the investigation of literature analysis, the online distribution strategy may consist of four key plannings as follows, 1. Leveraging Social Media and User-Generated Content Platforms, 2. Embracing Immersive and Interactive Experiences, 3. Fostering Direct-to-Fan Connections and Monetization, 4. Harnessing Artificial Intelligence and Big Data Analytics. Conclusions: Finally, collaboration and strategic partnerships will be vital. The Korean music companies should seek to cooperate with the technology companies, social media platforms, and the global music streaming services so that they can grow their market, acquire new technologies, and to better their online distribution strategies.

Tissue Distribution, SNP Detection and Association Study with Immune Traits of Porcine LBP and CD14 Genes

  • Liu, H.Z.;Li, X.Y.;Liu, B.;Yu, M.;Ma, Y.H.;Chu, M.X.;Li, K.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.21 no.8
    • /
    • pp.1080-1087
    • /
    • 2008
  • Lipopolysaccharide binding protein (LBP) and CD14 protein play important roles in the defense against infection of Gram-negative bacteria. In the present study, tissue distribution and polymorphism of porcine LBP and CD14 genes were analyzed. Real-time PCR results showed that the porcine LBP gene was especially highly expressed in liver, while CD14 gene was highly expressed in liver and spleen tissues. A 1,732 bp cDNA fragment of porcine LBP gene and a 1,682 bp genomic DNA fragment of CD14 gene were isolated. Polymorphisms were identified in these two fragments and showed that there were 14 potential SNPs in the porcine LBP gene and 3 potential SNPs in the porcine CD14 gene. Three SNPs, 292G/A (Gly/Ser), 1168G/A (Ala/Thr) of the LBP gene and -61G/A of the CD14 gene, were genotyped using restriction fragment length polymorphism (RFLP) method. Association analyses indicated that polymorphism of the 292G/A locus was significantly associated with porcine immune traits hematocrit (HCT), IgG and delayed-type hypersensitivity (DTH) (p<0.01), and the 1168G/A locus was significantly associated with HCT and mean corpuscular volume (MCV) traits (p<0.05). No significant association was found between the -61G/A locus and immune traits of the pig. Our data indicated that the LBP gene was significantly associated with immune traits of pig. Also, we identified some SNPs which may be useful markers for disease-resistant breeding of pigs.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Micromechanical investigation for the probabilistic behavior of unsaturated concrete

  • Chen, Qing;Zhu, Zhiyuan;Liu, Fang;Li, Haoxin;Jiang, Zhengwu
    • Computers and Concrete
    • /
    • v.26 no.2
    • /
    • pp.127-136
    • /
    • 2020
  • There is an inherent randomness for concrete microstructure even with the same manufacturing process. Meanwhile, the concrete material under the aqueous environment is usually not fully saturated by water. This study aimed to develop a stochastic micromechanical framework to investigate the probabilistic behavior of the unsaturated concrete from microscale level. The material is represented as a multiphase composite composed of the water, the pores and the intrinsic concrete (made up by the mortar, the coarse aggregates and their interfaces). The differential scheme based two-level micromechanical homogenization scheme is presented to quantitatively predict the concrete's effective properties. By modeling the volume fractions and properties of the constituents as stochastic, we extend the deterministic framework to stochastic to incorporate the material's inherent randomness. Monte Carlo simulations are adopted to reach the different order moments of the effective properties. A distribution-free method is employed to get the unbiased probability density function based on the maximum entropy principle. Numerical examples including limited experimental validations, comparisons with existing micromechanical models, commonly used probability density functions and the direct Monte Carlo simulations indicate that the proposed models provide an accurate and computationally efficient framework in characterizing the material's effective properties. Finally, the effects of the saturation degrees and the pore shapes on the concrete macroscopic probabilistic behaviors are investigated based on our proposed stochastic micromechanical framework.

Security Mechanism of Agent for Effective Agro-Foods Mobile Commerce (농산물 모바일 상거래를 위한 효과적인 에이전트 보안 메커니즘)

  • Jung Chang-Ryul;Song Jin-Kook;Koh Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1573-1581
    • /
    • 2006
  • To utilize actively the agent which is one of the elements of revitalization of Agro-Foods Mobile I-commerce, an essential prerequisite is agent security. IF using partial PKI(Public Key Infrastructure)-based confirmation mechanism providing security for the agent, the size of agent is becoming larger, the result of the transmission speed is slow, and the confirmation speed is tardy as well because of performing calculation of public keys such as RSA and needing linkage with the CA for the valid examination of certificates. This paper suggests a mechanism that can cross certification and data encryption of each host in the side of improving the problems of key distribution on agent by shaping key chain relationship. This mechanism can guarantee the problem of ky distribution by using agent cipher key(ACK) module and generating random number to fit mobile surroundings and to keep the secret of the agent. Suggested mechanism is a thing that takes into consideration security and efficiency to secure agent for the revitalization of M-Commerce, and is a code skill to make the agent solid and is a safe mechanism minimizing the problems of memory overflow.

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

Initial Authentication Protocol of Hadoop Distribution System based on Elliptic Curve (타원곡선기반 하둡 분산 시스템의 초기 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.253-258
    • /
    • 2014
  • Recently, the development of cloud computing technology is developed as soon as smartphones is increases, and increased that users want to receive big data service. Hadoop framework of the big data service is provided to hadoop file system and hadoop mapreduce supported by data-intensive distributed applications. But, smpartphone service using hadoop system is a very vulnerable state to data authentication. In this paper, we propose a initial authentication protocol of hadoop system assisted by smartphone service. Proposed protocol is combine symmetric key cryptography techniques with ECC algorithm in order to support the secure multiple data processing systems. In particular, the proposed protocol to access the system by the user Hadoop when processing data, the initial authentication key and the symmetric key instead of the elliptic curve by using the public key-based security is improved.

Loading capacity of simply supported composite slim beam with deep deck

  • Shi, Yongjiu;Yang, Lu;Wang, Yuanqing;Li, Qiuzhe
    • Steel and Composite Structures
    • /
    • v.9 no.4
    • /
    • pp.349-366
    • /
    • 2009
  • The composite slim beam has become popular throughout Europe in recent years and has also been used on some projects in China. With its steel section encased in a concrete slab, the steel-concrete composite slim beam can provide the floor construction with minimum depth and high fire resistance. However, the design method of the T-shape steel-concrete composite beam is no longer applicable to the composite slim beam with deep deck for its special construction, of which the present design models are not available but mainly depend on experiences. The elevation of the flexural stiffness and bending capacity of composite slim beams with deep deck is rather complicated, because the influences of many factors should be taken into account, such as the variable section dimensions, development of cracks and non-linear characteristics of concrete, etc. In this paper, experimental investigations have been conducted into the flexural behavior of two specimens of simply supported composite slim beam with deep deck. The emphases were laid on the bonding force on the interface between steel beam and concrete, the stress distribution of beam section, the flexural stiffness and bending capacity of the composite beams. Based on the experimental results, the reduction factor of equivalent stress distribution in concrete flange is suggested, and the calculation method of flexural stiffness and bending capacity of simply supported slim beams are proposed.

Integrated Data Structure for Quantum Key Management in Quantum Cryptographic Network (양자암호 통신망에서 양자키 관리를 위한 통합 데이터 구조)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.3-7
    • /
    • 2021
  • In quantum cryptographic communication based on quantum mechanics, each piece of information is loaded onto individual photons and transmitted. Therefore, it is impossible to eavesdrop on only a part, and even if an intruder illegally intercepts a photon and retransmits it to the recipient, it is impossible to send the same information to the photon by the principle of quantum duplication impossible. With the explosive increase of various network-based services, the security of the service is required to be guaranteed, and the establishment of a quantum cryptographic communication network and related services are being promoted in various forms. However, apart from the development of Quantum Key Distribution (QKD) technology, a lot of research is needed on how to provide network-level services using this. In this paper, based on the quantum encryption device, we propose an integrated data structure for transferring quantum keys between various quantum encryption communication network devices and realizing an encrypted transmission environment.

A Group Key based Authentication Protocol Providing Fast Handoff in IEEE 802.11 (IEEE 802.11 환경에서 빠른 핸드오프를 제공하는 그룹키 기반의 인증 프로토콜)

  • Lee, Chang-Yong;Kim, Sang-Jin;Oh, Hee-Kuck;Park, Choon-Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.103-113
    • /
    • 2008
  • Reducing handoff latency is essential in providing seamless multimedia service in Wireless LAN based on the IEEE 802.11 standard. Reducing authentication delay is critical in reducing handoff latency. To this end, several authentication protocols for fBst handoff have been proposed. Mishra et al. used proactive key distribution to improve the authentication delay incurred in the current standard and Park et al. proposed a new authentication protocol based on Blom's key pre-distribution scheme. In this paper, we propose an enhanced authentication protocol based on Bresson et al.'s group key protocol. If a mobile node has previously access the network, our proposed protocol only requires simple hash operations in providing mutual authentication between a mobile node and access points. Our protocol is more efficient than Park et al.'s and Mishra et al.'s technique can be used in our protocol to further enhance our protocol.