• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.024 seconds

Research on Possibilies of Social Network Services through IPTV (IPTV를 통한 SNS 가능성에 관한 연구)

  • Kim, Hyun-Suk;Kim, So-Hyun
    • Journal of the HCI Society of Korea
    • /
    • v.4 no.1
    • /
    • pp.11-15
    • /
    • 2009
  • Social Network Service has been extremely popular these days and providing diverse features and functions to users. Social networking and interest sharing in between users are key factors of SNS and this circles back to draw more users to the service. Web is the first media to provide SNS and mobile is the next. The service based on mobile environmental uniqueness such as Location-based-service(LBS) is the key success factors to convert users to web SNS to mobile SNS. TV has also been a possible SSN market to draw users to share interests and participation. However TV has been always community electronics in family members and personalization to provide SNS has been barrier to overcome. In this study, we explorer ideas of key factors of personalization in TV environment and conducted a field study to define characteristics of TV personalization in terms of depth, method, style and structure. Research finds out that there are significant differences in these categories.

  • PDF

The Empirical Study on the Effects of Repurchase Intention on Airbnb: The Role of Emotions and Key Components of Airbnb (Airbnb 고객들의 재구매 의도에 관한 실증 연구: 감정과 Airbnb 특성 요인의 역할)

  • Kim, Byoungsoo;Kim, Daekil
    • Knowledge Management Research
    • /
    • v.21 no.4
    • /
    • pp.89-108
    • /
    • 2020
  • This study investigates key factors influencing customers' repurchase intention in the context of Airbnb. Positive and negative emotions formed after customer's first-hand experience are identified as vital antecedents in determining consumer's repurchase intention. This study posits authentic experience, amenities, and price fairness as the key characteristics of Airbnb. It clarifies the role of subjective norms and trend-seeking tendency in repurchase decisions. The proposed research model was analyzed for 306 customers with experience in using Airbnb via structural equation model. The analysis results showed that both positive and negative emotions have a significant effect on customer's repurchase intention. The results clarified the role of Airbnb's characteristic components on repurchase decisions. Finally, subjective norms and trend-seeking tendency had no significant impact on customer's repurchase intention. The results of this study are expected to help establish effective strategies for customer experience and marketing to achieve sustainable growth of Airbnb.

A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths (4가지 운영모드와 128/256-비트 키 길이를 지원하는 ARIA-AES 통합 암호 프로세서)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.795-803
    • /
    • 2017
  • This paper describes a dual-standard cryptographic processor that efficiently integrates two block ciphers ARIA and AES into a unified hardware. The ARIA-AES crypto-processor was designed to support 128-b and 256-b key sizes, as well as four modes of operation including ECB, CBC, OFB, and CTR. Based on the common characteristics of ARIA and AES algorithms, our design was optimized by sharing hardware resources in substitution layer and in diffusion layer. It has on-the-fly key scheduler to process consecutive blocks of plaintext/ciphertext without reloading key. The ARIA-AES crypto-processor that was implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,658 gate equivalents (GEs), and it can operate up to 95 MHz clock frequency. The estimated throughputs at 80 MHz clock frequency are 787 Mbps, 602 Mbps for ARIA with key size of 128-b, 256-b, respectively. In AES mode, it has throughputs of 930 Mbps, 682 Mbps for key size of 128-b, 256-b, respectively. The dual-standard crypto-processor was verified by FPGA implementation using Virtex5 device.

Medium Access Control Design for UWB Communication Systems: Review and Trends

  • Nardis, Luca De;Di Benedetto, Maria-Gabriella
    • Journal of Communications and Networks
    • /
    • v.5 no.4
    • /
    • pp.386-393
    • /
    • 2003
  • Future wireless networks are expected to achieve high bit rates at low cost, enabling multimedia and QoS-based services over the wireless medium. The impulse radio ultra-wide band (IR-UWB) technique is a promising candidate in the deployment of such networks, thanks to its potential robustness and capacity. In the past, most of the UWB research focused on hardware and physical layer aspects in order to solve the technological challenges posed by IR-UWB. UWB peculiar characteristics may, however, also stimulate innovative higher layers’ design. This work addresses MAC issues for UWB communication systems. Key areas such as medium sharing, MAC organization, packet scheduling and power control are reviewed. The impact of UWB on the above functions is discussed, and areas which require UWB specific design are identified. Finally, novel MAC functions enabled by UWB specific features, i.e., precise ranging and positioning, are presented.

Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6

  • Park, Sugil;Masayuki Abe;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.495-498
    • /
    • 2002
  • The need for network protection, accounting and resource management in foreign administrative domain requires appropriate security services. In this paper, we propose an access control protocol to support the authentication between mobile node and visiting subnet. Our hybrid way of approach aims to reduce computational overhead and minimize the use of network bandwidth. We also propose non-certificate based public-key cryptography to provide non-repudiation, which does not require CRL retrieval and certificate validation.

  • PDF

Defense against HELLO Flood Attack in Wireless Sensor Network

  • Hamid Md. Abdul;Hong Choong Seon;Byun Sang Ick
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.214-216
    • /
    • 2005
  • We consider Wireless Sensor Network Security (WSN) and focus our attention to tolerate damage caused by an adversary who has compromised deployed sensor node to modify, block, or inject packets. We adopt a probabilistic secret sharing protocol where secrets shared between two sensor nodes are not exposed to any other nodes. Adapting to WSN characteristics, we incorporate these secrets to establish new pairwise key for node to node authentication and design multipath routing to multiple base stations to defend against HELLO flood attacks. We then analytically show that our defense mechanisms against HELLO flood attack can tolerate damage caused by an intruder.

  • PDF

A Review of Power Electronics Based Microgrids

  • Wang, Xiongfei;Guerrero, Josep M.;Blaabjerg, Frede;Chen, Zhe
    • Journal of Power Electronics
    • /
    • v.12 no.1
    • /
    • pp.181-192
    • /
    • 2012
  • The increased penetration of Distributed Energy Resources (DER) is challenging the entire architecture of conventional electrical power system. Microgrid paradigm, featuring higher flexibility and reliability, becomes an attractive candidate for the future power grid. In this paper, an overview of microgrid configurations is given. Then, possible structure options and control methods of DER units are presented, which is followed by the descriptions of system controls and power management strategies for AC microgrids. Finally, future trends of microgrids are discussed pointing out how this concept can be a key to achieve a more intelligent and flexible power system.

Consignment Review: Investigation into Its Potential as a Supply Chain Collaboration Program

  • Ryu, Chungsuk
    • Journal of Distribution Science
    • /
    • v.12 no.7
    • /
    • pp.89-101
    • /
    • 2014
  • Purpose - This study aims to show that consignments can enable supply chain collaboration, based on the review of selected studies, and aims to investigate its potential to be a better collaboration program, through an analytical comparison with other collaboration initiatives. Research design, data, and methodology - This study uses a literature review on selected studies that researched consignments. In addition, based on the proposed framework, the current consignment process and other well-known collaboration programs are analyzed in terms of three key collaboration aspects. Results - Most studies employ simple research in terms of their purpose and methodology. An analysis with the proposed framework indicates the potential of consignments to foster supply chain collaboration. Conclusions - Based on the literature review, this study suggests that future research needs to aim for diverse research goals and conduct sophisticated research on consignments. An analysis with the proposed framework shows that consignments would be more effective for supply chain collaboration if active information sharing and joint decision-making are implemented.

VLSI Design of Cryptographic Processor for SEED and Triple DES Encryption Algorithm (SEED 와 TDES 암호 알고리즘을 구현하는 암호 프로세서의 VLSI 설계)

  • 정진욱;최병윤
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.169-172
    • /
    • 2000
  • This paper describes design of cryptographic processor which can execute SEED, DES, and triple DES encryption algorithm. To satisfy flexible architecture and area-efficient structure, the processor has I unrolled loop structure with hardware sharing and can support four standard mode, such as ECB, CBC, CFB, and OFB modes. To reduce overhead of key computation, the precomputation technique is used. Also to eliminate increase of processing time due to data input and output time, background I/O technique is used which data input and output operation execute in parallel with encryption operation of cryptographic processor. The cryptographic processor is designed using 2.5V 0.25 $\mu\textrm{m}$ CMOS technology and consists of about 34.8K gates. Its peak performances is about 250 Mbps under 100 Mhz ECB SEED mode and 125 Mbps under 100 Mhz triple DES mode.

  • PDF

A Proposal for a Personal Branding Support Service in Social Media Times

  • Kawano, Yoshihiro;Obu, Yuka
    • Journal of Contemporary Eastern Asia
    • /
    • v.12 no.2
    • /
    • pp.49-59
    • /
    • 2013
  • Social media such as Twitter and Facebook have become popular. In the age of social media, many people have become more active online. For example, about half of all global active Internet users are on Facebook (Perry 2012). Personal branding is a very important strategy to build on an individual's strengths, and this kind of branding is expected to contribute to self-actualization. Therefore, the presence of mentors who advise users to discover their own strong points for self-actualization is necessary. In this paper, we propose a personal branding support service, Mentors, which connects mentors and mentees. The core concept is: "Everyone has the face of both a mentor and mentee." The key function is sharing stages of self-analysis in human life design: Determining value, creating a mission, and forming a strategy. From this function, a good match between a mentor and mentee can be found. The program aims to improve human life by understanding the client's strengths and using social media effectively. Future work includes launching Mentors and evaluating its service.