• Title/Summary/Keyword: Master Key

Search Result 222, Processing Time 0.029 seconds

TP53I11 suppresses epithelial-mesenchymal transition and metastasis of breast cancer cells

  • Xiao, Tongqian;Xu, Zhongjuan;Zhang, Hai;Geng, Junsa;Qiao, Yong;Liang, Yu;Yu, Yanzhen;Dong, Qun;Suo, Guangli
    • BMB Reports
    • /
    • v.52 no.6
    • /
    • pp.379-384
    • /
    • 2019
  • Epithelial-mesenchymal transition (EMT) is widely-considered to be a modulating factor of anoikis and cancer metastasis. We found that, in MDA-MB-231 cells, TP53I11 (tumor protein P53 inducible protein 11) suppressed EMT and migration in vitro, and inhibited metastasis in vivo. Our findings showed that hypoxic treatment upregulated the expression of $HIF1{\alpha}$, but reduced TP53I11 protein levels and TP53I11 overexpression reduced $HIF1{\alpha}$ expression under normal culture and hypoxicconditions, and in xenografts of MDA-MB-231 cells. Considering $HIF1{\alpha}$ is a master regulator of the hypoxic response and that hypoxia is a crucial trigger of cancer metastasis, our study suggests that TP53I11 may suppress EMT and metastasis by reducing $HIF1{\alpha}$ protein levels in breast cancer cells.

Security Improvement of Authentication Method Using Transfer Agent in USN

  • Cho, Do-Eun
    • International Journal of Contents
    • /
    • v.7 no.4
    • /
    • pp.35-43
    • /
    • 2011
  • USN is a technology to detect human external environment. It is an important factor in buildinga ubiquitous computing environment. In this thesis, an authentication method was proposed to allow the sensor nodes, which have weak computing operation capability, to safely communicate with each other in USN and guarantee the anonymity of users for their privacy. In the proposed authentication method that takes into account the characteristics of sensor network, sensor nodes based on a symmetric key algorithm do not transfer keys directly, instead, they mix the random numbers received from AS to generate keys necessary for communications, having a master key and a pseudo-random number generator.In addition, in this thesis, TA was adopted to minimize the leakage of users' information, and a scheme through which virtual IDs received from AS are delivered to sensor nodes was applied to improve anonymity.

A Study on the Application of Elliptic Curve Cryptography to EMV (타원 곡선 암호의 EMV 적용에 관한 연구)

  • Kim, Woong;Lim, Dong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.269-271
    • /
    • 2005
  • EMV was formed in February 1999 by Europay International, MasterCard International and Visa International to manage, maintain and enhance the EMV Integrated Circuit Card Specifications for Payment Systems as technology advances and the implementation of chip card programs become more prevalent. The formation of EMV ensures that single terminal and card approval processes are developed at a level that will allow cross payment system interoperability through compliance with the EMV specifications. A credit card environment of the domestic market adopted the standard Local-EMV to have the compatibility with EMV international standard and the EMV migration have been carried out b,# the step-by-step process. It may be possible to adopt various kinds of cryptographic algorithms, however, RSA public key algorithm is currently used. In this paper, as a public key algorithm for the authentication process, Elliptic Curve Cryptographic algorithm is applied to the EMV process. Implementation results is shown. and the possible changes necessary to accommodate Elliptic Curve Cryrtography is proposed.

  • PDF

A Statistical Study on the Key Words in the Titles of Nursing Related Theses (학위논문의 주요어 분석 (간호학 및 간호학관련 학위논문을 중심으로 : 1960-1991. 8))

  • 고옥자;김상혜;김희걸;이금재;이영숙
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.1
    • /
    • pp.58-69
    • /
    • 1994
  • In order to see the development of Nursing related research activities in Korea over the last three decades, abstracts of almost all of the Master and Ph.D theses that appeared from 1961 up to August 1991 were collected. The number of theses was 2354, from which an index of key words has been constructed. Key words were defined as those terms in each thesis title that convey major objectives of the given thesis study and the important nursing concepts dealt with in the thesis. Although all the key words were picked from the thesis title only, full use was made of the abstracts in deciding the principal objectives and essential contents of the thesis studies and their important concepts as well. In total, 539 kinds of key words were identified from the 2354 titles, and the identified words were all found to be in the International Nursing Index. On an average each title has two key words. Which key words were most frequently used, how they have changed with time, what kind of concept is preferably dealt with by each graduate school, and the concepts to which a given key word is likely to be connected were examined. The results are summerized below : 1) For each decade the theses numbers were as follows : 54(2.3%) from the 60’s, 413(17.5%) from the 70’s, 1523(64.7%) from the 80’s, and 364(15.5%) from the 90’s. Master’s thesis contributed 96% (2252) of the papers and Ph. D’s theses filled the remaining 4%(102). 2) A total of 539 key words were used, averaging about 2 for each thesis. The most frequently used key words were ‘Nurse’, ‘Anxiety’, ‘Knowledge / Attitude /Practice’, ‘Stress /Stressor’, ‘Attitude’, ‘Job-Satisfaction’, ‘Mental Disorder’, ‘Operation’, ‘Elderly’, ‘Nursing Role’. 3) Each decades key words can be classified as : the 60’s : ‘Nursing Education’, ‘Pulmonary Tuberculosis’, ‘Mother-Child Health’, ‘Growth & Development’, ‘Public Facilities’, ‘Mental Disorder’ : the 70’s : ‘Nurse’, ‘Family Planning’, ‘Attitude’ / ‘Knowledge, Attitude / Practice’, ‘Curriculum in Nursing Education’, ‘Clinical Practice in Nursing’, ‘Analysis of the Work of the Nurse’, ‘Health Education of School’, : the 80’s : ‘Nurse’, ‘Anxiety’, ‘Stress /Stressor’, ‘Operation’, ‘Nursing Role’, ‘Job Satisfaction’ : the 90’s : ‘Nurse’, ‘Elderly’, ‘Family-Support’, ‘Stress /Stressor’, ‘Home Care’. Key word ‘Nurse’ appears continuously and most frequently through the years, which indicates that there has been active study of the characteristics of nurses and related fields. The concept ‘Anxiety’ has been studied steadly from the 80’s and it shows that interest in health and disease are increasing Which comes as a result of society changing to an industrial and informational community. 4) Looking into each graduate school’s study area key words ‘Anxiety’, ‘Nurse’, ‘Mental Disorder’, ‘Stress /Stressor’, ‘Operation’, ‘Attitude’, ‘Hemo-dialysis’, were studied in the regular graduate school : ‘Family Planning /Contraception’, ‘Knowledge / Attitude /Practice’, ‘Physical Health-State /Physical Health Examination’, ‘Nurse’, ‘Using Clinical Facilities’, ‘Health Education of School’, were studied in the Graduate School of Public Health’ ; ‘Nurse’, ‘Anxiety’, ‘Stress / Stressor’, ‘Job-Satisfaction’, ‘Clinical Practice Education’, ‘Nursing Education’, were studied in the Graduate School of Education : ‘Nurse’, ‘Job Satisfaction’, ‘Nursing Role’, ‘Administration - Employment /Employment Management’, ‘Leadership’, ‘Personnel Profile’, ‘Nursing Manpower / Changing Working Place’, were studied in the Graduate School of Public Administration. 5) The Connection between key words were : ‘Nurse Job Satisfaction’, ‘Stress / Stressor ⇔ Coping / Ajustment’, ‘Nurse ⇔ Nursing Role’, ‘Anxiety ⇔ Giving Information’, ‘Nurse ⇔ Stress / Stressor’, ‘Anxiety ⇔ Operation’, ‘Nurse ⇔ Burnout’, ‘Knowledge, Attitude, Practice ⇔ Family Planning’, ‘Nurse Administration ⇔ Employment’, ‘Anxiety Muscle ⇔ Relaxation Technic’, ‘Anxiety ⇔ Mental Disorder’. From the above it can be noted that many nursing concepts were handled in the thesis titles. But there were more than enough papers on the characteristics of the nurse. It is suggested that in depth research be made on ‘Nursing Accidents’, t-‘Ethics’, ‘Nurse - Patient Interactions’, ‘Spritual Care’, ‘Dying’, ‘Hospice’, ‘Resident Helper’ and that there should be in depth research relating to the physical and mental development of youth and in particular physical concepts like ‘Drug - Abuse’, ‘Child -Abuse and Teaching’.

  • PDF

A Small-area Hardware Design of 128-bit Lightweight Encryption Algorithm LEA (128비트 경량 블록암호 LEA의 저면적 하드웨어 설계)

  • Sung, Mi-Ji;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.888-894
    • /
    • 2015
  • This paper describes an efficient hardware design of Lightweight Encryption Algorithm (LEA) developed by National Security Research Institute(NSRI). The LEA crypto-processor supports for master key of 128-bit. To achieve small-area and low-power implementation, an efficient hardware sharing is employed, which shares hardware resources for encryption and decryption in round transformation block and key scheduler. The designed LEA crypto-processor was verified by FPGA implementation. The LEA core synthesized with Xilinx ISE has 1,498 slice elements, and the estimated throughput is 216.24 Mbps with 135.15 MHz.

Authentication Protocol Supporting Secure Seamless Handover in Network Mobility (NEMO) Environment (네트워크 이동성 환경에서 안전한 Seamless 핸드오버 지원을 위한 인증 프로토콜)

  • Kim, Jong-Young;Yoon, Yong-Ik;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.57-64
    • /
    • 2012
  • The existing protocols proposed in network mobility (NEMO) environment can require many computational costs and can bring about a delay of binding update. To solve these problems, in this paper we propose an authentication protocol supporting secure seamless handover in NEMO environment. The proposed protocol can handle quickly mutual authentication between a mobile router (MR) and an access router (AR), which uses group key among ARs and a master key (MK) issuing from key issuing server (KIS) for reducing the time of binding update as much as possible. In performance, the proposed protocol can process quickly binding update with little computational cost comparison with the existing binding update protocols and it results in robustness against existing attacks.

A Novel Interleaving Control Scheme for Boost Converters Operating in Critical Conduction Mode

  • Yang, Xu;Ying, Yanping;Chen, Wenjie
    • Journal of Power Electronics
    • /
    • v.10 no.2
    • /
    • pp.132-137
    • /
    • 2010
  • Interleaving techniques are widely used to reduce input/output ripples and to increase the power capacity of boost converters operating in critical conduction mode. Two types of phase-shift control schemes are studied in this paper, the turn-on time shifting method and the turn-off time shifting method. It is found that although the turn-off time shifting method exhibits better performance, it suffers from sub-harmonic oscillations at high input voltages. To solve this problem, an intensive quantitative analysis of the sub-harmonic oscillation phenomenon is made in this paper. Based upon that, a novel modified turn off time shifting control scheme for interleaved boost converters operating in critical conduction mode is proposed. An important advantage of this scheme is that both the master phase and the slave phase can operate stably in critical conduction mode without any oscillations in the full input voltage range. This method is implemented with a FPGA based digital PWM control platform, and tests were carried out on a two-phase interleaved boost PFC converter prototype. Experimental results demonstrated the feasibility and performance of the proposed phase-shift control scheme.

Enhanced Key Distribution Scheme in Wireless Sensor Networks (무선 센서 네트워크에서의 향상된 키 분배 기법)

  • Cho Jung-Sik;Yeo Sang-Soo;Kim Sung Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.151-153
    • /
    • 2005
  • 무선 센서 네트워크는 방대한 응용분야와 유비쿼터스 환경 하에서 중요한 한 부분을 차지하며 그 유용성을 입증하고 있다. 이런 무선 센서 네트워크의 센서 노드는 작은 크기를 바탕으로 목표 장소에 임의로 배치되어 다양한 데이터를 수집하는 능력이 탁월하다 하지만 이런 장점은 센서 노드의 한정된 하드웨어 능력과 전원공급 문제, 물리적 노출 문제로 인해 스스로를 위험에 노출시키는 여지를 만들게 되었다. 즉 일반적으로 사용되어지는 네트워크 보안 방법을 무선 센서 네트워크에 적응하기에는 센서 노드 능력에 한계가 있으며, 환경적 요소로 인해 불가능하다. 따라서 무선 센서 네트워크의 특성을 감안한 효과적인 보안 방법이 필요하며, 이런 맥락에 본 논문은 무선 센서 네트워크의 하드웨어적인 한계를 감안한 대칭키(Symmetric key) 기반의 키 분배 기법을 제안하고자 한다. 제안하는 기법에서는 모든 노드가 공통으로 소유한 전체 마스터 키(master key)와 의사 난수 생성기(pseudo random number generator:PRNG), 그리고 특정 대상으로부터 분배되는 난수(random number)의 조합을 통해 임의의 키를 생성, 갱신함으로써 다양한 종류의 무선 센서 네트워크 모델에 유연하게 대처할 수 있도록 하였다. 또한 이를 위한 통신 회수를 최소화함으로써 효율성을 제공해 준다.

  • PDF

Flush+Reload Cache Side-Channel Attack on Block Cipher ARIA (블록 암호 ARIA에 대한 Flush+Reload 캐시 부채널 공격)

  • Bae, Daehyeon;Hwang, Jongbae;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1207-1216
    • /
    • 2020
  • Since the server system in the cloud environments can simultaneously operate multiple OS and commonly share the memory space between users, an adversary can recover some secret information using cache side-channel attacks. In this paper, the Flush+Reload attack, a kind of cache side-channel attacks, is applied to the optimized precomputation table implementation of Korea block cipher standard ARIA. As an experimental result of attack on ARIA-128 implemented in Ubuntu environment, we show that the adversary can extract the 16 bytes last round key through Flush+Reload attack. Furthermore, the master key of ARIA can be revealed from last and first round key used in an encryption processing.