• Title/Summary/Keyword: Key sharing

Search Result 612, Processing Time 0.025 seconds

Factors affecting COVID-19 health information sharing behaviors via social media: A comparison between South Korea and China

  • Kim, Jong Ki;Wang, Jian Bo
    • The Journal of Information Systems
    • /
    • v.33 no.1
    • /
    • pp.159-182
    • /
    • 2024
  • Purpose This study aims to investigate the factors influencing social media users' sharing behaviors of COVID-19 health information. Specifically, we seek to examine the impact of three key antecedents-trust in information source, trust in information content, and trust in social media platform-on users' trust in information quality and determine whether their effects vary between South Korea and China. Design/methodology/approach To fulfill our research objectives, we conducted an online survey across two countries, collecting 408 valid responses (South Korea: N = 201; China: N = 207) for our analysis. We employed Partial Least Squared based Structural Equation Modeling (PLS-SEM) with SmartPLS 4 and performed Exploratory Factor Analysis (EFA) and independent t-tests with SPSS 27. Findings The study revealed that perceived risks significantly inhibit users from sharing health information, highlighting the critical role of trust in countering these effects. We also identified variances in the levels of trust in information content and trust in social media platform between the two countries, which offers fresh perspectives for designing culturally tailored public health communications and interventions.

(Key Recovery Technology for E-Transaction) (전자 거래를 위한 키복구 기술)

  • 이병수;조시용
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.1105-1116
    • /
    • 2002
  • This paper has presented three types of key recovery methods, which are known as key escrow, key encapsulation, and trusted third party scheme. we have analyzed the existing key recovery products, which have been developed by the advanced nations for electronic commerce and electronic government. we have also analyzed the key recovery policies proposed by the advanced nations, such as The United States of America, Great Britain, and Japan. In this paper, several key recovery policies are proposed for the e-commerce and e-government system. And we have proposed key recovery scheme for the e-commerce system utilizing the on-line secret sharing scheme based on the Internet and public bulletin board.

  • PDF

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • v.37 no.4
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

Generalized Stability Criterion for Multi-module Distributed DC System

  • Liu, Fangcheng;Liu, Jinjun;Zhang, Haodong;Xue, Danhong
    • Journal of Power Electronics
    • /
    • v.14 no.1
    • /
    • pp.143-155
    • /
    • 2014
  • The stability issues of a multi-module distributed DC power system without current-sharing loop are analyzed in this study. The physical understanding of the terminal characteristics of each sub-module is focused on. All the modules are divided into two groups based on the different terminal property types, namely, impedance (Z) and admittance (Y) types. The equivalent circuits of each group are established to analyze the stability issues, and the mathematical equations of the equivalent circuits are derived. A generalized criterion for multi-module distributed systems is proposed based on the stability criterion in a cascade system. The proposed criterion is independent of the power flow direction.

Effective UML models by using database system

  • Halim, Faisal;Muttaqin, Rizal
    • Korean Journal of Artificial Intelligence
    • /
    • v.1 no.1
    • /
    • pp.1-3
    • /
    • 2013
  • This study suggested ways to control UML diagram and to make design of database and to retrieve diagram information by giving questions. The study classified elements of the diagram. For instance, class diagram was made of classes, and class was done of class name and attribute operator. The elements were transformed to be database table having basic key and foreign key information. The ways suggested had advantages of users' sharing of model information and reuse of the model. This study investigated cost saving, time saving and UML model construction by database. We had designed integrated and relation database that could save and manage UML diagram, and suggested retrieval. For instance, we classified class diagram into elements to make tables and kept relation of each element by using not only basic key of relation database but also foreign key information. We made database of modeling depending upon methods to give users convenience.

A Secure Auction Protocol without Any Dispute

  • Ha, Jung-Hoon;Kwak, Dong-Jin;Moon, Sang-Jae
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.518-522
    • /
    • 2003
  • We propose a new auction protocol scheme that uses the publicly verifiable secret sharing (PVSS) scheme. Unlike the existing scheme where a verifiable encryption scheme is employed when there is a dispute between a bidder and the auctioneer, the proposed scheme essentially removes the potential of a dispute. In addition, it has a robust registration phase and any entities participating in or observing the auction can verify the correctness of the auction process. The manager does not directly chooses the private key for the bidders, but only verifies the correctness between the private key and the public key, thereby improving the security, such as a bid submission of a malicious manager using the private key of a bidder.

  • PDF

Research trends in dental hygiene based on topic modeling and semantic network analysis

  • Yun-Jeong Kim;Jae-Hee Roh
    • Journal of Korean society of Dental Hygiene
    • /
    • v.22 no.6
    • /
    • pp.495-502
    • /
    • 2022
  • Objectives: The purpose of this study was to analyze research trends in dental hygiene using topic modeling and semantic network analysis. Methods: A total of 261 published studies were collected 686 key words from the Research Information Sharing Service (RISS) by 2019-2021. Topic modeling and semantic network analysis were performed using Textom. Results: The most frequently and frequency-inverse document frequently key words were 'dental hygienist', 'oral health', 'elderly', 'periodontal disease', 'dental hygiene'. N-gram of key words show that 'dental hygienist-emotional labor', 'dental hygienist-elderly', 'dental hygienist-job performance', 'oral health-quality of life', 'oral health-periodontal disease' etc. were frequently. Key words with high degree centrality were 'dental hygienist (0.317)', 'oral health (0.239)', 'elderly (0.127)', 'job satisfaction (0.057)', 'dental care (0.049)'. Extracted topics were 5 by topic modeling. Conclusions: Results from the current study could be available to know research trends in dental hygiene and it is necessary to improve more detailed and qualitative analysis in follow-up study.

A Load-Sharing Scheme using SCTP Multi-homing (SCTP 멀티호밍 특성을 활용한 부하 분산 기법)

  • Song Jeonghwa;Lee Meejeong
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.595-607
    • /
    • 2004
  • Networks often evolve to provide a host with multiple access points to the Internet. In this paper, we propose a transport layer load distribution mechanism utilizing the multiple network interfaces simultaneously. We specifically propose an extension of Stream Control Transmission Protoco1 (SCTP) to have load sharing over multiple network interfaces. We named the particular service provided by the Proposed load sharing mechanism to be LS (Load Sharing) mode service. LS mode service is based on the following four key elements: (i) the separation of flow control and congestion control, (ii) congestion window based striping, (iii) redundant packet retransmission for fast packet loss recovery, (iv) a novel mechanism to keep track of the receiver window size with the SACKS even if they arrive out-of-order. Through simulations, it is shown that the proposed LS mode service can aggregate the bandwidth of multiple paths almost ideally despite of the disparity in their bandwidth. When a path with a delay of 100% greater is utilized as the second path, the throughput is enhanced about 20%.

The Relationship Between Information-Sharing and Resource-Sharing Networks in Environmental Policy Governance: Focusing on Germany and Japan

  • Lee, Junku;Tkach-Kawasaki, Leslie
    • Journal of Contemporary Eastern Asia
    • /
    • v.17 no.2
    • /
    • pp.176-198
    • /
    • 2018
  • Environmental issues are among the most critical issues nowadays. These issues are no longer confined to individual countries, and international society has been progressing in building global dialogues since the early 1970s. Within these international efforts, Germany and Japan have played essential roles in global environmental governance. However, there are major differences in nation-level environmental policies in both countries. Governance based on network structure is more efficient than that based on hierarchy for solving complex problems. The network structure is formed through horizontal cooperation among various autonomous actors, and the relationship intensity among actors is one of the key concepts in the governance. Using social network analysis as a framework to explain complicated societal structures explains how interaction among actors creates networks, and these networks further affect their interactions. The purpose of this study is to investigate the structure of environmental policy governance as collaborative governance in Germany and Japan. To address this goal, this paper analyzes the relationship between the informational dimension of governance networks and its complement resource-sharing networks in both countries. The results show that the information-sharing networks have lower-level network influence on the resource-sharing networks as higher-level networks even if not all of the information factors have singular influences. The results suggest that the information-sharing networks may be one of the pieces of the puzzle for explaining this phenomenon in environmental governance in Germany and Japan.

Smart Home Environment for the Protection of Multimedia Digital Contents (멀티미디어 콘텐츠 보호를 위한 스마트 홈 환경)

  • Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Ho-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.189-196
    • /
    • 2011
  • As internet is getting advanced day by day, digital contents have been developed in various areas as killer content in the IT industry. It needs to develop lots of complicated digital content protect systems due to the enhancement and variety of user's multimedia devices. Although there are lots of protect systems based on DRM(Digital Rights Management) technology, it is difficult to provide secure protection because of the problems resulting from analog hole problem, inefficiency of key sharing and various independent protect technologies. Thus, in this paper, we propose a novel authentication and protect system based on RFID(Radio Frequency Identification) technology to solve the problems and show possibility of free content duplication and efficient contents management in smart home environments.