• Title/Summary/Keyword: Key share

Search Result 446, Processing Time 0.02 seconds

An Expanded Website Quality Model in Online Shopping Malls for Developing Satisfaction and Loyalty: The Moderating Effect of Gender

  • Sang Min KIM;Tian JIAQI;Yong-Ki LEE
    • Journal of Distribution Science
    • /
    • v.22 no.5
    • /
    • pp.93-104
    • /
    • 2024
  • Purpose: This study used the SORmodel (or cue utilization theory) to examine the impact of expanded quality factorsincluding product quality on customer satisfaction, attitude, and behavioral loyalty. This study examined the moderating effect of gender on the customer satisfaction-attitudinal and behavioral loyalty relationship. Research design, data, and methodology: 364 respondents were collected through an online survey and analyzed using the SmartPLS 4.0 program. Results: The findings show that product quality, along with system quality and service quality, are key determinants of customer satisfaction. In addition, this study shows that the relationship between customer satisfaction and attitudinal loyalty (repurchase and word-of-mouth intention) does not differ depending on gender, but the relationship between customer satisfaction and behavioral loyalty (share-of-visit and share-of-wallet) is stronger for women than for men. Conclusions: This research integrates concepts from environmental psychology and marketing focusing on website quality (information, system, service, and product), as well as satisfaction, attitudinal and behavioral loyalty. Online shopping mall practitioners must systematically analyze and assess the quality of online shopping, a pivotal factor driving customer satisfaction, attitude, and behavioral loyalty. Acknowledging the influence of gender on consumers' online purchasing behavior can aid online retailers in devising tailored e-commerce marketing strategies aimed at attracting and retaining customers.

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF

A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure (네트웍 환경에서 안전한 Kerberos 인증 메커니즘에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2002
  • In Network Environment, Kerberos certification mechanism to require Kerberos server in other area unconditionally belief. Also, Kerberos server in cooperation area must be share server of other area and secret key. To solve these two problems, this paper proposed safe security mechanism of doing to ably IETF CAT's PKINIT/PKCROSS a1gorithm with Public Key Infrastructure and use Directory System and service between realms do trust and prove each Kerberos trust center base. Also, Although Kerberos server of each area must be foreknowing each server's secret key and public key, Obtain through Trust center and acquire each area's public key and common symmetric key, Application server excluded process that must register key in Key Distribution Center.

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • v.37 no.4
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

A New Group Key Management Protocol for WSN

  • Gerelbayar, Tegshbayar;Lee, Sang-Min;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.143-152
    • /
    • 2008
  • Sensor networks have a wide spectrum of military and civil applications, particularly with respect to security and secure keys for encryption and authentication. This thesis presents a new centralized approach which focuses on the group key distribution with revocation capability for Wireless Sensor Networks. We propose a new personal key share distribution. When utilized, this approach proves to be secure against k-number of illegitimate colluding nodes. In contrast to related approaches, our scheme can overcome the security shortcomings while keeping the small overhead requirements per node. It will be shown that our scheme is unconditionally secure and achieves both forward secrecy and backward secrecy. The analysis is demonstrated in terms of communication and storage overheads.

  • PDF

Design and Implementation of Key Frame Sharing Application in Android Using Chord Protocol

  • Kim, Kang Wook
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.405-412
    • /
    • 2014
  • Due to the popularity of mobile phones, Peer-to-Peer (P2P) content sharing in mobile phones is highly desirable, especially in a mobile data connection. In addition, there has been an increasing demand for content sharing applications for P2P communication in Android-based smartphones as ubiquitous mobile devices. However, due to wireless network limits, unstable characteristic and restricted storage space, mobile users confront challenges in establishing connections and sharing video frames with other users. To solve this issue, we propose an architectural design and implementation of key frame sharing application that uses Chord, a distributed lookup protocol to establish a content sharing platform for mobile devices, combined with the Chord SDK based on Android. Our proposed system enables users easily to share key information on video data in real-time over a wireless network without manual processing of devices which join or leave the group and cost associated with the 3G/4G network.

Strategies and Ethical Considerations for Scholarly Journals: A Focus on KODISA

  • SHIN, Dong Jin
    • Journal of Research and Publication Ethics
    • /
    • v.1 no.2
    • /
    • pp.15-20
    • /
    • 2020
  • Purpose: The purpose of this paper is to examine the ethical considerations that must be addressed in journals and discern the strategies that will elevate the quality of the journals. Research design, data, and methodology: This study utilized the past studies that were conducted in this field. Examples of journals were used to mark some of the key features of reputable journals, as well as the guidelines for KODISA. Results: This study has showed the importance of ethical considerations in journals for the best interests of the scholars and journal community as a whole. A clear set of outlines makes the journal a place for scholars to share their knowledge, as well as elevate the journal into a good standing in the academic world. Some of the key strategies in improving KODISA include inviting notable members of a field to share their knowledge and encouraging more scholars to contribute to this network. Conclusion: KODISA has a strong set of ethical considerations for the scholars that publish in their journals and will continue to improve its quality for the future. It includes improving its strategies and keeping up to date with the trends in the current field of discipline.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

The Key Success Factors of Design-oriented New Product Development Strategy : A Case Study of Chocolate-Phone (디자인 중심 신제품 개발 전략의 성공 요인 : 초콜릿 폰 개발 사례를 중심으로)

  • Ryu, Sung-Il;Kim, Jin-Woo;Jang, Seong-Keun
    • Korean Management Science Review
    • /
    • v.24 no.1
    • /
    • pp.1-24
    • /
    • 2007
  • The function of product design has been an important part for success on new product development. We deeply studied 'Chocolate-Phone' case which is considered as a representative of adopting design-oriented new product development strategy. According to this study, we found three contextual factors and nine key success factors for design-oriented new product development. The contextual factors consist of the strong needs for innovative product development, customer's needs for the emotional value, competitive situation for the new product launching. The key success factors consist of design, development, marketing, overall sides. The key success factors of design side are to select talented designers and take an insight for market and communication skill. The key success factors of development side are to possess high technological abilities, to do divergence with removing or giving up some function, management's strong support. The key success factors of marketing side are to bring core marketers from outside, capacity to gather ideas from outside. The key success factors of overall side are to share design-oriented principle with other functions and to change member's mind from engineer-oriented to market-oriented.