• Title/Summary/Keyword: S/KEY

Search Result 10,080, Processing Time 0.036 seconds

PRA RESEARCH AND THE DEVELOPMENT OF RISK-INFORMED REGULATION AT THE U.S. NUCLEAR REGULATORY COMMISSION

  • Siu, Nathan;Collins, Dorothy
    • Nuclear Engineering and Technology
    • /
    • v.40 no.5
    • /
    • pp.349-364
    • /
    • 2008
  • Over the years, probabilistic risk assessment (PRA) research activities conducted at the U.S. Nuclear Regulatory Commission (NRC) have played an essential role in support of the agency's move towards risk-informed regulation. These research activities have provided the technical basis for NRC's regulatory activities in key areas; provided PRA methods, tools, and data enabling the agency to meet future challenges; supported the implementation of NRC's 1995 PRA Policy Statement by assessing key sources of risk; and supported the development of necessary technical and human resources supporting NRC's risk-informed activities. PRA research aimed at improving the NRC's understanding of risk can positively affect the agency's regulatory activities, as evidenced by three case studies involving research on fire PRA, human reliability analysis (HRA), and pressurized thermal shock (PTS) PRA. These case studies also show that such research can take a considerable amount of time, and that the incorporation of research results into regulatory practice can take even longer. The need for sustained effort and appropriate lead time is an important consideration in the development of a PRA research program aimed at helping the agency address key sources of risk for current and potential future facilities.

Selaginella austrotibetica (Selaginellaceae), a new spikemoss from Xizang, China

  • Meng-Hua Zhang;Jie Yang;Aleksandr Petrovich Shalimov;Jong-Soo Kang;Xian-Chun Zhang
    • Journal of Species Research
    • /
    • v.13 no.1
    • /
    • pp.1-9
    • /
    • 2024
  • Selaginella austrotibetica, a new spikemoss species from China, is described. The species is epipetric and was found on a moss-covered rocky cliff by a riverbank. Morphologically, it is unlike any anisosporophyllous species in the genus Selaginella. However, it resembles species of the S. sanguinolenta group, especially similar to S. sajanensis in gross morphology, except for the characters of strobilus. The molecular phylogenetic analysis clearly showed that S. austrotibetica was nested within the anisosporophyllous species clade, forming a sister relationship with the clade of S. vaginata and S. xipholepis, and distinct from the S. sanguinolenta group, including S. sajanensis. Although S. austrotibetica is sister to the clade of S. vaginata and S. xipholepis, the species can be clearly distinguished by its sparse leaves on branches, dorsal leaves that are broad-ovate, base obtuse to rounded, margin denticulate or very shortly sparsely ciliolate, and leaves that are slightly thick and shiny. Therefore, we described Selaginella austrotibetica as a new species and discuss its phylogenetic relationships within the genus Selaginella.

Certificateless Public Key Encryption Revisited: Security Model and Construction (무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계)

  • Kim, Songyi;Park, Seunghwan;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1109-1122
    • /
    • 2016
  • Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user's ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.

Improved Selective Randomized Load Balancing in Mesh Networks

  • Zhang, Xiaoning;Li, Lemin;Wang, Sheng;Yang, Fei
    • ETRI Journal
    • /
    • v.29 no.2
    • /
    • pp.255-257
    • /
    • 2007
  • We propose an improved selective randomized load balancing (ISRLB) robust scheme under the hose uncertainty model for a special double-hop routing network architecture. The ISRLB architecture maintains the resilience properties of Valiant's load balancing and reduces the network cost/propagation delay in all other robust routing schemes.

  • PDF

Crystallization of a-Si Induced by Ni-Si oxide source

  • Meng, Z.;Liu, Z.;Zhao, S.;Wu, C.;Wong, M.;Kwok, H.;Xiong, S.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.985-988
    • /
    • 2008
  • Metal induced crystallization of a-Si with a source of Ni/Si oxide was studied. Its mechanism to induce crystallization was discussed. It was found that new source behaves an effect of self-released nickel and reducing nickel residua, so can provide a wider process tolerance; improve the uniformity and stability of TFTs.

  • PDF

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

A Kinetic Consideration on the Selective Adsorption and Molecular Recognition by Molecularly Imprinted Polymer

  • Li, Wuke;Li, Songjun;Luo, Gang;Ding, Kerong
    • Bulletin of the Korean Chemical Society
    • /
    • v.28 no.8
    • /
    • pp.1346-1352
    • /
    • 2007
  • This article presents an original work on kinetically studying the selective adsorption and recognition by molecularly imprinted polymer (MIP). With S-naproxen as template, the imprinted polymer was prepared. The result indicates that the prepared polymer shows a more complicated sorption toward S-naproxen than toward its enantiomer R-naproxen. The rate constant in the case of template appears to be a variable. There are also significant deviations from the idealized Langmuir model. Related information indicates that these, in logic, can be a result of biomimic structural and functional complements between imprint and the template, which makes the polymer capable of selectively recognizing the imprint species.

Trends and Technology Ana17sis of XKMS(Xml Key Management Specification) (XKMS(Xml Key Management Specification)동향 및 기술 분석)

  • 김세영;이석래;박정환;신동일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.772-774
    • /
    • 2001
  • 최근 XML(eXtensible Markup Language)이 인터넷 전자 상거래와 데이터 전송 및 검색 부문에서 광범위하게 이용됨에 따라, XML 문서에 대한 보안과 표준화 문제가 대두되고 있다. XML을 이용한 각종 데이터 및 문서는 웹 상에 존재하게 되며, 가상공간에서 문서적 처리는 제 3자에 의해 위조나 변경이 가능하다. 이에 데이터 및 문서를 보호하는 일은 현재 필수적인 사안이며, XML 문서 보안에 대한 연구 개발 또한 활발히 진행되고 있다. 최근 Microsoft와 Verisign, Webmethods등 3개사는 XML기반 차세대 PKI(Public Key Infrastructure)기술인 XKMS(Xml Key Management Specification)를 개발하였으며, XKMS 표준화 작업에 휴렛패커드(HP), 불티모어, IBM, 퓨어에지솔루션스, 로이터 등이 참여하고 있다. 이에 본 논문에서는 XKMS의 표준화를 진행중인 표준화 단체의 XML 보안동향을 파악하고, XKMS의 내부 구조 및 전반적인 기술을 분석한다.

  • PDF

Completed Stream Cipher by Cellular Automata - About Cellular Automata rule 30 - (Cellular Automata 기초로 형성된 Stream Cipher - Cellular Automata rule 30을 중심으로 -)

  • Nam, Tae-Hee
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.2
    • /
    • pp.93-98
    • /
    • 2008
  • In this study, analyzed principle about stream cipher that is formed to Cellular Automata foundation. Cellular Automata can embody complicated and various principle with simple identifying marks that is State, Neighborhood, Transition Rules originally. Cellular Automata is hinting that can handle encipherment smoothly using transition rule. Create binary pad (key stream) by Cellular Automata's transition rule 30 applications in treatise that see therefore, and experimented ability of encryption and decryption because using stream cipher of symmetric key encryption way of password classification.

  • PDF

Recent Technology Trends of Free-Space Quantum Key Distribution System and Components (무선 양자암호통신 시스템 및 부품 최신 기술 동향)

  • Youn, C.J.;Ko, H.;Kim, K.J.;Choi, B.S.;Choe, J.S.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.6
    • /
    • pp.94-106
    • /
    • 2018
  • A quantum key distribution (QKD) provides in principle an unconditional secure communication unlike the standard public key cryptography depending on the computational complexity. In particular, free-space QKD can give a secure solution even without a fiber-based infrastructure. In this paper, we investigate an overview of recent research trends in the free-space QKD system, including satellite and handheld moving platforms. In addition, we show the key components for a free-space QKD system such as the integrated components, single photon detectors, and quantum random number generator. We discuss the technical challenges and progress toward a future free- space QKD system and components.