• 제목/요약/키워드: Private key

검색결과 685건 처리시간 0.025초

Strategies for Stimulating Customer Relationship: A Study of Some Public and Private Sector Banks

  • Kiran, Ravi;Sharma, Ridhima
    • 유통과학연구
    • /
    • 제11권3호
    • /
    • pp.31-37
    • /
    • 2013
  • Purpose - The present research has been undertaken to examine the Customer Relationship Management (CRM) strategies adopted by public and private sector banks in India. The initial part of research helps to identify the factors of overall satisfaction of customers. The study also tries to identify the key determinants of CRM of Indian banking. Research design, data, methodology - The present research uses a self-structured questionnaire having a reliability score of 0.817 to elicit responses from customers in New Delhi and surrounding areas in India to examine the CRM used by public and private sector banks for enhancing customer satisfaction. The scale had 32 questions covering customer perceptions related to overall satisfaction and factors contributing to CRM. Results - The results highlight that overall satisfaction comprises of two factors namely personalised Services; and reliability and dependability. The determinants of CRM as identified through survey are: Speed, safety and security; Employee CRM; on time services; customer targeting; and friendly and helpful staff. The results also highlight that safety and security was preferred to other factors by the respondents. Conclusions - The findings of this study show that in terms of performance private sector banks fared better in providing CRM services than public sector banks.

  • PDF

Public-Private Partnership in the System of Economic Development of the Country

  • Muliar, Volodymyr;Ryda, Tetyana;Dolot, Volodymyr;Didych, Oleg;Grechanyk, Bogdan;Chornysh, Iurii
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.83-88
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the public-private partnership system in the context of the economic development of the state. At first glance, the mutually exclusive interests of the state and business do not contribute to the development of common and agreed development goals. At the same time, ignoring the versatility of interests and the aggravation of the discussion regarding the two sides under consideration, the study of the theoretical foundations of the interaction between the public and private sectors of the economy allows us to draw the following conclusion: world economic theory from classical political economy to new institutionalism has a clear structured position on the ancient historical depth of existence of the form of partnerships Based on the results of the study, the main elements of the public-private partnership system in the context of the economic development of the state were identified.

The Prospects of Metaverse in the Public vs. Private Sector by Millennials and Generation Z: Citizen/Customer Relationship Management

  • Yooncheong CHO
    • 산경연구논집
    • /
    • 제15권2호
    • /
    • pp.1-10
    • /
    • 2024
  • Purpose: The aim of this study is to examine the factors influencing prospects toward for the metaverse in both the public and private sectors, focusing on the perspectives of millennials and generation Z that were rarely examined in previous studies. Research design, data and methodology: This study employed an online survey as its research methodology utilizing factor analysis, ANOVA, and regression analysis to test the formulated hypotheses. Results: The findings of this study reveal that factors such as citizen/customer relationship management, the application of metaverse in both in the public and private sectors. Moreover, the effect size of applying the metaverse to cities on prospects toward the Metaverse was notably higher in the public sector. The effect size of metaverse management for customer relationship management showed a greater impact in the private sector. Conclusions: The results carry significant managerial and policy implications. They shed light on how millennials and generation Z perceive the applications of the metaverse in relation to cities, products, and brands. Notably, the results suggest that application of the metaverse for cities and management of customer relationships for products and brands emerge as key factors influencing the prospect of the metaverse in the public and private sectors.

새로운 GSM의 인증프로토콜 제안 (Proposal of new GSM Authentication protocol)

  • 최현;송윤경;박동선
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 I
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察) (A Study on the Certification System in Electromic Commerce)

  • 하강헌
    • 한국중재학회지:중재연구
    • /
    • 제9권1호
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권12호
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

D-OCSP-KIS에서 OCSP Responder의 세션 개인키의 노출을 검출하는 방법 (A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS)

  • 이영교;남정현;김지연;김승주;원동호
    • 정보보호학회논문지
    • /
    • 제15권4호
    • /
    • pp.83-92
    • /
    • 2005
  • Koga와 Sakurai에 의해 제안된 D-OCSP-KIS는 USP Responder의 인증서 수를 줄여줄 뿐만 아니라 클라이언트에게 OCSP Responder의 인증서 상태 검증도 제공하여 주며 통신량, 계산량 그리고 클라이언트의 메모리량을 줄일 수 있는 효율적인 방법이지만 몇 가지 문제점도 가지고 있다. 공격자가 한 시간 주기(예, 1일)에서 OCSP Responder의 세션 개인키를 획득하였다면 OCSP Responder가 인식하지 못하는 경우, 한 시간주기 동안에 OCSP Responder를 사칭할 수 있다. 그리고 그는 가로챈 해쉬값을 이용하여 클라이언트에게 잘못된 응답을 보낼 수 있어 E-commerce상의 서버와 사용자는 심각한 혼란과 손해를 입을 수 있다. 아울러 해쉬 체인의 계산과 배포는 CA에게 부하가 될 수 있다. 따라서 본 논문에서는 D-OCSP-KIS에서 OCSP Responder의 세션 개인키의 노출과 해쉬값의 악용을 검출할 수 있는 방법을 제안하고자 한다. 이 방법에서 각 해쉬값은 OCSP Responder의 인증서 검증을 위해 한번씩만 사용이 되며 CA에서의 해쉬 체인을 위한 부하가 각 OCSP Responder로 분산되어진다.

Private LoRa 기반 어구 자동식별 시스템의 거리 측정 시험 (Test of Communication Distance Measurement of Fishing Gear Automatic System Based on Private LoRa)

  • 이성렬;김세훈
    • 한국항행학회논문지
    • /
    • 제24권2호
    • /
    • pp.61-66
    • /
    • 2020
  • 해양은 지구 표면의 70.8%를 차지하기 때문에 해양산업에서 IoT 기술의 적용은 넓은 영역에 배치된 수많은 장치로부터 다양한 정보를 수집하고 활용하는 것이다. LPWA는 통신 거리가 넓은 특징으로 해양에 배치하기에 매우 적합한 통신이다. 본 논문에서는 전자 어구 실명제를 실행하기 위한 핵심기술인 private LoRa를 기반으로 실해역 성능 거리 실험은 진행하였다. sx1276을 기반으로 한 private LoRa 모듈을 개발하였고, 게이트웨이는 private LoRa로 수신 받은 데이터를 SKT Cat. M1을 이용하여 서버로 데이터를 전송하도록 개발하였다. 해발 599 m에 게이트웨이를 설치하고 25 km, 40 km, 60 km에서 데이터 송수신 실험을 한 결과, 각각 96.1%. 97.1%, 96.2%의 통신 성공률을 보이는 것을 확인할 수 있었다.

국내 민간투자사업 리스크 재분담의 재무적 영향성 분석 - 민간투자자 간 지분거래 및 약정거래를 중심으로 - (Financial Analysis of Risk Reallocation in PPP Projects - Focusing on the Transactions between Private Investors in Korea -)

  • 주창환;권병기;이현수;박문서
    • 한국건설관리학회논문집
    • /
    • 제19권2호
    • /
    • pp.25-37
    • /
    • 2018
  • 민간투자자 사이에서의 리스크 재분담은 민간투자자의 현금흐름에 추가적인 변동성을 야기하며, 민간부문의 투자결정에 있어 제약요인이 되고 있다. 하지만 기존의 재정건전성 평가모델은 지분거래와 약정거래가 충분히 반영되지 않아, 민간투자자 간 리스크 재분담에 따른 현금흐름의 변동성을 분석하기에 한계가 있다. 본 연구는 민간투자자 사이에서 이루어지는 지분거래와 약정거래를 분석하고, 이를 반영한 민간투자자의 재무적 평가 모델을 개발하였다. 또한, 개발된 모델의 실증적 분석을 통해 지분거래의 주요변수와 약정거래의 영향요인을 도출하였으며, 민간투자자 간 리스크 재분담과 민간투자자의 수익률 간의 관계를 증명하였다. 본 연구는 리스크 재분담에 대한 민간투자자의 의사결정에 기여할 것이며, 더 나아가 민간투자사업의 협약지연의 문제를 관리하는데 도움이 될 것이다.

무선 센서네트워크를 위한 TEEN 기반의 안전한 그룹통신 기법 (Teen Based Secure Group Communication Scheme for Wireless Sensor Networks)

  • 서일수
    • 융합보안논문지
    • /
    • 제9권2호
    • /
    • pp.71-78
    • /
    • 2009
  • 무선 센서 네트워크(WSN : Wireless Sensor Network)는 계산 능력, 전력, 통신 대역폭 등 다양한 제약 조건을 가지기 때문에 기존의 보안 기법을 WSN에 적용하기는 매우 어렵다. 이러한 문제점을 해결하기 위해 본 논문에서는 무선 센서 네트워크에 적용 가능한 안전한 그룹통신 기법을 제안한다. 제안한 기법은 클러스터링 기반의 계층적 라우팅 프로토콜인 TEEN(Threshold sensitive Energy Efficient sensor Network protocol) 알고리즘에 보안 메커니즘이 결합된 형태로서, 네트워크는 센서노드, 클러스터 헤더, 베이스 스테이션(BS : Base Station)으로 이루어진다. 보다 강력한 보안성 제공과 효율적인 키 관리를 위해 제안된 기법은 비밀 키 및 공개 키 알고리즘 모두를 사용하며, 전력소모를 줄이기 위해 참여 노드들 간의 통신은 계층적 트리구조에 의해 이루어진다. 따라서 본 논문에서 제안한 기법은 강력한 보안성을 제공할 뿐만 아니라, 통신에 있어 보다 낮은 전력을 소모하므로 무선 센서 네트워크 환경에 적합하다고 할 수 있다.

  • PDF