• 제목/요약/키워드: Public Network

검색결과 2,447건 처리시간 0.023초

임베디드 장비 상에서의 공개키 기반 암호를 위한 다중 곱셈기 최신 연구 동향 (Research on Multi-precision Multiplication for Public Key Cryptography over Embedded Devices)

  • 서화정;김호원
    • 정보보호학회논문지
    • /
    • 제22권5호
    • /
    • pp.999-1007
    • /
    • 2012
  • 공개키 기반 암호화 상에서의 다중 곱셈 연산은 높은 복잡도로 인해 성능 개선을 위해서는 우선적으로 고려되어야 한다. 특히 임베디드 장비는 기존의 환경과는 달리 한정적인 계산 능력과 저장 공간으로 인해 높은 복잡도를 나타내는 공개키 기반의 암호화를 수행하기에는 부적합한 특성을 가진다. 이를 극복하기 위해 다중 곱셈 연산을 빠르게 연산하고 적은 저장공간을 요구하는 기법이 활발히 연구되고 있다. 본 논문에서는 자원 한정적인 센서 네트워크 상에서의 효율적인 공개키 기반 암호화 구현을 위한 다중 곱셈기의 최신 연구 동향을 살펴본다. 이는 앞으로의 센서 네트워크상에서의 공개키 기반 암호화 구현을 위한 참고자료로서 활용이 가능하다.

iBeacon을 이용한 AP 자동접속 방안 (An Automatic AP Connections Scheme using iBeacon)

  • 남춘성;신동렬
    • 인터넷정보학회논문지
    • /
    • 제18권2호
    • /
    • pp.1-11
    • /
    • 2017
  • 스마트 디바이스를 이용하여 특정 공간에서 미리 설정된 무선랜에 접속하는 방법은 개방형 방식과 사용자 인증 방식으로 나뉠 수 있다. 개방형 방식은 무선랜 접속을 위한 인증이 없이 접속하는 방법이다. 스마트 디바이스 사용자가 자신이 사용하려는 무선랜에 대한 정보를 SSID(Service Set IDentifier)를 통해 공공 무선랜 표기 형식에 따라 제공받아야 하지만, 모든 개방형 무선랜이 이러한 방식을 수동으로 입력하는 방식에는 무리가 있다. 반면에 사용자 인증 방식은 SSID와 PW(PassWord) 설정을 통해 사용자에게 무선랜 접속을 제공하는 방식이다. 따라서 SSID를 통해 공공 무선랜 표기 형식을 따를 수는 있지만, AP 접속을 위해서는 일일이 사용자가 수동으로 패스워드 입력을 통해 AP에 접속해야만 한다. 따라서 본 논문에서는 사용자 인증방식과 공공 무선랜 표기형식을 iBeacon 메시지 수신을 통해 자동적으로 AP에 접속할 수 있는 방안을 제안한다.

A Study on NEMO-partially DMM based E2E Seamless Data Integration Transmission Scheme in SOC Public Infrastructures

  • Ryu, Wonmo;Caytiles, Ronnie D.;Park, Byungjoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권4호
    • /
    • pp.33-41
    • /
    • 2020
  • Nowadays, distributed mobility management (DMM) approaches have been widely adopted to address the limitations of centralized architectural methods to support seamless data transmission schemes in wireless sensor networks. This paper deals with the end-to-end (E2E) integration of Network Mobility (NEMO) basic support protocol in distributed wireless sensor network systems in structural health and environmental monitoring of social overhead capital (SOC) public infrastructures such as bridges, national highways, tunnels, and railroads. The proposed scheme takes advantage of the features of both the NEMO basic support protocol and partially distributed network-based DMM framework in providing seamless data transmission and robust mobility support. The E2E seamless data transmission scheme allows mobile users to roam from fixed-point network access locations and mobile platforms (i.e., vehicles such as cars, buses, and trains) without disconnecting its current sessions (i.e., seamless handover).

데이터 통신을 위한 우리나라 공중교환전화망 개방과 공중교환데이타망 구성의 전망

  • 조규심
    • 기술사
    • /
    • 제16권1호
    • /
    • pp.4-12
    • /
    • 1983
  • 데이터통신은 역사적으로 볼 때 전용회선이용시기로부터 공중전화교환망개선을 거쳐 데이터 전용교환망 구축으로 발전해 간다. 초기단계부터 분리독립된 데이터전용교환건설은 방대한 비용이 소요되므로 어느 나라도 이런 방법을 택하지 않는다. 한국도 전용회선시대를 지나 금년상반기(1983)에는 공중전화교환망을 데이터통신에 개선할 것과 금년하반기에는 데이터통신공중교환기인 Packet교환기를 설치할 계획이다. 이 논문은 서울의 공중교환전화선의 특성을 측정한 것과 한국의 데이터통신의 장래의 발전을 전망한 것이다.

  • PDF

공중교환전화망 (PSTN)에 의한 데이터 전송에 있어서의 군지정 #곡에 관한 연구 (Study on Group Delay Distortion in Data transmission by Means of Public Switching Telephone Network (PSTN))

  • 조규심;박규태
    • 대한전자공학회논문지
    • /
    • 제21권4호
    • /
    • pp.24-30
    • /
    • 1984
  • 군지연왜곡(상위왜곡)은 음성전송의 입장에서는 그다지 문제가 되지 않는 특성이다. 그러나 기존의 공중교환전화망(음성대역전송)을 통하여 데이터, FAX 등의 파형전송을 하는 경우에는 데이터 신호를 왜곡시키는 최대의 요인이 되므로 이를 철저하게 검토하여야 한다. 본고는 기존의 공중교환전화망을 데이터전송에 개방하기 위하여 군지연왜곡에 관한 해석을 하고, 실험 및 측정결과를 기술하고 또 이 왜곡의 개선에 대해서도 언급한 것이다.

  • PDF

ATM 고객망관리를 위한 통합 구조에 대한 연구 (An Integration Architecture for the ATM Customer Network Management)

  • Jon
    • 한국통신학회논문지
    • /
    • 제22권4호
    • /
    • pp.823-832
    • /
    • 1997
  • As enterprises use ATM networks for their private networks and as these private networks use public ATM networks for wide area communication, the need for the customers to be able to manage both private and public networks. Currently, some standardization work is being done towards providing this capability to customers. In this paper, we propose a new customer network management (CNM) system architecture for the management of both ATM a private network and a public network in a uniform way. The particular features of the proposed architecture lies in the efficient support of the complex hierarchial TMN manager-agent relationships at M3 and M4 interfaces, and the support of SNMP and CMIP integration which is necessary for the implementation of a CNM system. The TMN hierarchical many-to-many manager-agent relationships are realized by the utilization of CORBA-Based SMK (Shared Management Knowledge) implementation. We have also implemented the prototype of a ATM CNM system, and measures the performance for the demonstration of the suitability of the proposed architecture.

  • PDF

KORNET- THE LATEST PUBLIC PACKET-SWITCHED NETWORK

  • C.K.Un;Cho, D.H.
    • 한국통신학회:학술대회논문집
    • /
    • 한국통신학회 1986년도 춘계학술발표회 논문집
    • /
    • pp.119-124
    • /
    • 1986
  • This paper describes the development of the KORNET that may be regarded as the latest public packet-swiched computer communication network. The KORNET project included the development of the network management center (NMC), a network concentrator. For the KORNET we use the virtual circuit(VC) method, a distributed adaptive routing algorithm, and a dynamic buffer management algorithm. The NMC acts as a nerve center of the network, performing such function as network monitoring, subscriber and network management and routing management, etc. As for the NNP and NC hardware, we have implemented them with the 16-bit multitask/multiprocessor technology using MC68000 microprocessors. Softwares have been developed using C language is required for real time processing. All the network protocols we have developed comply completely with the latest CCITT recommendations including X.25, X,3 , X.28 and X.29.

  • PDF

Business Environment of Public Sector Enterprises: Using the International Rankings for Evaluation

  • Shalimova, Nataliia;Kuzmenko, Halyna;Shalimov, Volodymyr;Reshetov, Valerii;Androshchuk, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.297-309
    • /
    • 2022
  • Taking into account the globalization of the economy and the intensification of European integration processes, it has been proved that an important part of evaluating the effectiveness of activity of public sector enterprises should be a comparative analysis of the overall operation environment, namely public procurement, economic environment and tax policy, with the relevant systems of other countries of the world. The indicators and components of international ratings "Doing Business", "Paying Taxes", "Benchmarking Public Procurement" have been studied. Different groups of indicators forming "Doing Business" and "Paying Taxes" in the context of the impact on public sector enterprises have been identified: those which fully comply with the need to evaluate the operating environment of public sector enterprises and those which should be used with restrictions, regarding the peculiarities of creating and functioning of public sector enterprises. A comparative analysis of the place of Ukraine, Lithuania and Slovenia among other countries of the world in accordance with the international rankings of "Doing Business", "Paying Taxes", "Benchmarking Public Procurement" have been made. It has been substantiated that the results of such comparative analysis will allow identifying risk areas, and relevant information can be used in developing of recommendations for improving the effectiveness of activity of public sector enterprises.

On the Application of Public Search Measures to Detect and Obtain Information

  • Kozytska, Olena;Tsilmak, Olena;Protsenko, Olena;Yankovyi, Mykola;Lysenko, Аndrii;Shulzhenko, Assol
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.109-112
    • /
    • 2021
  • The article considers the state of legislation that regulates the use of public methods of obtaining information by authorized state bodies. The correlation of public investigative (search) actions with operative-search measures as concepts denoting the application of public methods of obtaining information has been studied. In addition, it argues the need for more detailed delineation and legislative regulation of public investigative (search) actions and operational and investigative measures at the legislative and departmental levels. The purpose of the article is to analyze certain provisions of the Law of Ukraine "On operational and investigative activities" to identify inconsistencies in the content of the text of the law in order to correct and prevent ambiguity in the theory and practice of law enforcement.

Formation of Anti-Corruption Consciousness of Citizens as a Direction of Interaction of Public Authorities and Institutions of Civil Society

  • Shpak, Yurii;Bandura, Ivan;Primush, Roman;Dokalenko, Varvara;Abdullayev, Vagif
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.17-22
    • /
    • 2022
  • This article defines the process of formation of anti-corruption consciousness as one of the areas of interaction between public authorities and civil society institutions. It is concluded that the implementation of the state anti-corruption policy in Ukraine may be more promising if the institutions of civil society are actively involved. The degree of citizen engagement can be increased by increasing social trust, as well as by increasing the level of political and legal education and culture. Particular attention should be paid to the organization of public control and monitoring of the activities of public authorities, impartial coverage of information on the fight against corruption in the media, as well as the joint conduct of an information and educational campaign and the promotion of the formation of anti-corruption consciousness among a large number of citizens.