• Title/Summary/Keyword: Sender

Search Result 466, Processing Time 0.026 seconds

Many-to-One Encryption and Authentication Scheme and Its Application

  • Lin, Xi-Jun;Wu, Chuan-Kun;Liu, Feng
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.18-27
    • /
    • 2008
  • This paper is to study a subclass of group-oriented cryptographic scheme: Many-to-one encryption and authentication scheme. The many-to-one encryption and authentication scheme is to solve a practical problem, i.e., the scenario that the number of the receivers is very small compared with the number of the senders and a receiver may serve millions of senders. Compared with the traditional methods, the burdens of the receiver and the KGC are reduced greatly. How to revoke a sender from his receiver's legitimate sender group is also proposed and it is efficient compared with some traditional methods. The proposed scheme is proven in the random oracle models. The computational complexity of our scheme is independent of the number of the senders. At the end of the paper, an example is given to show how to use our scheme in online software registration and update.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

A Fair Multicast Congestion Control Mechanism based on the Designated Server (지정된 서버를 이용한 공정한 멀티캐스트 혼잡제어 메커니즘)

  • Oh, Jae-Hwan;Kum, Jung-Hyun;Chung, Kwang-Sue;Kim, Hwa-Sung
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.233-241
    • /
    • 2002
  • In this paper, we proposed a new mechanism that solves the fairness problem between unicast traffic using the TCP and multicast traffic using the UDP, and satisfies the requirement of various receivers fairly in the Internet. The proposed mechanism decentralizes the load of blanket transmission rate control from sender to designated server, and uses the method that talc designated server intercepts the sender's data and controls the transmission rate suitable for it's local network. Therefore, the proposed mechanism not only provides multicast service by accurate estimation of the network status of each receiver, but also realizes both the inter-session fairness and the intra-session fairness problem.

A Design for Data Transmission Algorithm of Multimedia Data with Best Effort Environment (Best Effort 환경에 적절한 멀티미디어 데이터 전송 알고리즘 설계)

  • 허덕행
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.155-162
    • /
    • 1999
  • Various applications of video conferencing are required real-time transmission in order to offer service of best effort in internet. Because the bandwidth of internet changes dynamically, appropriated QoS could not be guaranteed To resolve the problem. available bandwidth between sender and receiver is measured. And according to measured bandwidth, the transmission of multimedia data is controlled In this paper, we propose algorithm of efficient transmission for best QoS in internet According to a present status of network, we measure available bandwidth using feedback RTCP information and change a compression rate to reduce a producing CODEC data. And according to the priority that is measured by packet loss for received RTCP information, we abandon frames indicated as lower weight in transmission buffer of sender.

  • PDF

A Genetic Approach for Dynamic Load Redistribution in Heterogeneous Distributed Systems (이질형 분산시스템에서의 동적 부하재분배를 위한 유전적 접근법)

  • Lee, Seong-Hoon;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.1-10
    • /
    • 2006
  • Load redistribution algorithm is a critical factor in computer system. In a receiver-initiated load redistribution algorithm, receiver(underloaded processor) continues to send unnecessary request messages for load transfer until a sender(overloaded processor) is found while the system load is light. Therefore, it yields many problems such as low CPU utilization and system throughput because of inefficient inter-processor communications until the receiver receives an accept message from the sender in this environment. This paper presents an approach based on genetic. algorithm(GA) for dynamic load redistribution in heterogeneous distributed systems. In this scheme the processors to which the requests are sent off are determined by the proposed GA to decrease unnecessary request messages.

  • PDF

A High Performance Asynchronous Interface Unit for Globally-Asynchronous Locally-Synchronous Systems (전역적 비동기 지역적 동기 시스템을 위한 고성능 비동기식 접속장치)

  • 오명훈;박석재;최호용;이동익
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.5
    • /
    • pp.321-334
    • /
    • 2003
  • Globally-Asynchronous Locally-Synchronous (GALS) systems are worthy of notice as an adequate architecture for a large scaled chip design with guaranteeing easy designs and functional confidence. In this paper, we suggest an advanced structure of the interface unit which is indispensable for GALS systems by using stoppable clocks. The proposed interface unit is composed of a sender module and a receiver module. The sender module can carry out data transmission partially without the relation to an internal clock. We have designed it with 0.25${\mu}{\textrm}{m}$ standard cell library at the gate level and simulated its operation to show performance improvement. Finally, we constructed all example circuit with the interface unit and proved the correct operation of it.

Effective Destination Decision Policies for Dynamic Load Balancing in Distributed Computer Systems with Star Topology (스타형 분산 컴퓨터 시스템의 동작 부하분산을 위한 효율적인 위치결정 정책)

  • Im, Gyeong-Su;Ha, Seong-Ryong;Kim, Jong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.768-776
    • /
    • 1995
  • In a distributed computer system with star topology, the processing power of central node may be greater than that of peripheral nodes and the job arrival rate of each node may be different. The performance of load balancing may be very different according to the selection of sender criteria and receiver criteria for job transfer. But the optimal decision of sender and receiver criteria is very difficult in heterogeneous distributed computer systems. In this paper we propose effective destination decision policies using dynamic criteria such as mean job response time of a node and estimated response time of a job, instead of fixed threshold for dynamic load balancing.

  • PDF

Transnational Effects of Sharing on Social Capital among Young Adults: How the acts of sharing strengthen relationships between givers and recipients

  • Kim, Jiwon;Bang, Hyejin
    • Journal of Contemporary Eastern Asia
    • /
    • v.16 no.2
    • /
    • pp.93-109
    • /
    • 2017
  • Cross-culturally, acts of sharing are recognized as an effective method to initiate and maintain human relationships in real-life situations by promoting continuous reciprocal exchanges between donors and recipients. Specifically, this study examines the effects of sharing a media product from the perspective of the givers, as compared to effects on the receivers. "Gangnam Style," a Korean music video, is of interest because it was spontaneously shared worldwide by young adults who used it as a vehicle to build and strengthen social relationships, among young adults. While both the givers and receivers of the "Gangnam Style" benefited from bridging new relationships, the results of this study found that those who gave "Gangnam Style" benefited more in terms bonding already existing relationships, compared to those who received materials. This study provides further evidence in support of the "sender-effect" paradigm and enhances our understanding of how online sharing contributes to the construction of social capital among the young adults.

A study on the Spreading-Qi (포기치료(布氣治療)에 관한 고찰(考察))

  • Choi Moon-Seok;Kim Youn-Sub
    • Journal of Korean Medical Ki-Gong Academy
    • /
    • v.5 no.1
    • /
    • pp.148-159
    • /
    • 2001
  • The Spreading-Qi recorded curative effect with a long history. I studied the Qi-therapy through train of the Qi-sender. methods of the Spreading-Qi and clinical application of the Spreading-Qi. 1. Train of the Qi-sender. Sitting, standing and ling postures can all be applied as training postures for training Qi. Qi grows in Lower Dan(elixir field) and circulates in heavenly circuits by static Qi. Training Qi by dynamic Qi is a fundamental exercise for the maneuvers to conduct Qi. 2. Methods of the Spreading-Qi, Breathe naturally concentrate the mind on Lower Dan(elixir field). When exhaling. Mindwill accompanies Qi to go to the Conception Vessel(CV) and Governor Vessel(GV), conduct Qi to the palms or fingers and emit Qi, with the emitting site touching or leaving the treated region. 3. Clinical application of the Spreading-Qi, its wide range of indications. 4. The Spreading-Qi is similar to Western 'Healing' and 'Hands of light'. Mind will accompanies energy to go to hand and emit energy to the treated region.

A Dynamic toad Redistribution Using Genetic Algorithm in Heterogeneous Systems (유전 알고리즘을 이용한 이질형 시스템에서의 동적 부하재분배)

  • Lee Seong Hoon
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.93-101
    • /
    • 2004
  • In a receiver-initiated load redistribution algorithm, receiver(underloaded processor) continues to send unnecessary request messages for load transfer until a sender(overloaded processor) is found while the system load is light, Therefore, it yields many problems such as low cpu utilization and system throughput because of inefficient inter-processor communications until the receiver receives an accept message from the sender in this environment. This paper presents an approach based on genetic algorithm(GA) for dynamic load redistribution in heterogeneous distributed systems. In this scheme the processors to which the requests are sent off are determined by the proposed GA to decrease unnecessary request messages. The performance of proposed algorithm shows better than that of the conventional algorithm through various experiments.

  • PDF