• Title/Summary/Keyword: key value

Search Result 2,482, Processing Time 0.026 seconds

Private Key Recovery on Bitcoin with Duplicated Signatures

  • Ko, Ju-Seong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1280-1300
    • /
    • 2020
  • In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.

Intensity of Intraoperative Spinal Cord Hyperechogenicity as a Novel Potential Predictive Indicator of Neurological Recovery for Degenerative Cervical Myelopathy

  • Guoliang Chen;Fuxin Wei;Jiachun Li;Liangyu Shi;Wei Zhang;Xianxiang Wang;Zuofeng Xu;Xizhe Liu;Xuenong Zou;Shaoyu Liu
    • Korean Journal of Radiology
    • /
    • v.22 no.7
    • /
    • pp.1163-1171
    • /
    • 2021
  • Objective: To analyze the correlations between intraoperative ultrasound and MRI metrics of the spinal cord in degenerative cervical myelopathy and identify novel potential predictive ultrasonic indicators of neurological recovery for degenerative cervical myelopathy. Materials and Methods: Twenty-two patients who underwent French-door laminoplasty for multilevel degenerative cervical myelopathy were followed up for 12 months. The Japanese Orthopedic Association (JOA) scores were assessed preoperatively and 12 months postoperatively. Maximum spinal cord compression and compression rates were measured and calculated using both intraoperative ultrasound imaging and preoperative T2-weight (T2W) MRI. Signal change rates of the spinal cord on preoperative T2W MRI and gray value ratios of dorsal and ventral spinal cord hyperechogenicity on intraoperative ultrasound imaging were measured and calculated. Correlations between intraoperative ultrasound metrics, MRI metrics, and the recovery rate JOA scores were analyzed using Spearman correlation analysis. Results: The postoperative JOA scores improved significantly, with a mean recovery rate of 65.0 ± 20.3% (p < 0.001). No significant correlations were found between the operative ultrasound metrics and MRI metrics. The gray value ratios of the spinal cord hyperechogenicity was negatively correlated with the recovery rate of JOA scores (ρ = -0.638, p = 0.001), while the ventral and dorsal gray value ratios of spinal cord hyperechogenicity were negatively correlated with the recovery rate of JOA-motor scores (ρ = -0.582, p = 0.004) and JOA-sensory scores (ρ = -0.452, p = 0.035), respectively. The dorsal gray value ratio was significantly higher than the ventral gray value ratio (p < 0.001), while the recovery rate of JOA-motor scores was better than that of JOA-sensory scores at 12 months post-surgery (p = 0.028). Conclusion: For degenerative cervical myelopathy, the correlations between intraoperative ultrasound and preoperative T2W MRI metrics were not significant. Gray value ratios of the spinal cord hyperechogenicity and dorsal and ventral spinal cord hyperechogenicity were significantly correlated with neurological recovery at 12 months postoperatively.

Key Account Management in Business-to-Business Relationship: Identifying Top K Persuaders Using Singular Value Decomposition

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd
    • Journal of Distribution Science
    • /
    • v.14 no.9
    • /
    • pp.15-24
    • /
    • 2016
  • Purpose - Key account management is a supplier company initiated relational approach that has received great attention from both academics and practitioners manifested in the business-to-business relationship literatures. However, there is widespread debate and contention on what should be the underlying theoretical base for defining this vital part of relationship marketing. With the insights from the social exchange theory, present paper explores how social exchange affects the dynamic nature of key account management relationship at the organizational level. Research design, data, and methodology - The paper follows a comprehensive review approach to examine the relationship between social exchange theory and key account management approach. Conceptual arguments and findings are assessed across studies with the main objective of showing how social exchange theory develops the governance mechanism in maintaining the key account relationship. Results - Since relational norm is considered as a glue for the maintenance of buyer-seller relationship in social exchange theory, factors develop the non-contractual governance mechanism 'relationship' in business-to-business relationship and this norm replaces or supplements more formal governance mechanisms such as contracts are explored. Conclusions - This paper advances central relational norm to manage the company's most important key customers and demonstrates how this norm can be developed in buyer-seller key account relationship. Implications from this new perspective are forwarded.

Statics variation analysis due to spatially moving of a full ocean depth autonomous underwater vehicle

  • Jiang, Yanqing;Li, Ye;Su, Yumin;Cao, Jian;Li, Yueming;Wang, Youkang;Sun, Yeyi
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.11 no.1
    • /
    • pp.448-461
    • /
    • 2019
  • Changes in gravity and buoyancy of a Full Ocean Depth Autonomous Underwater Vehicle (FOD-AUV) during its descending and ascending process must be considered very carefully compared with a Human Occupied Vehicle (HOV) or a Remotely Pperated Vehicle (ROV) whose activities rely on human decision. We firstly designed a two-step weight dropping pattern to achieve a high descending and ascending efficiency and a gravity-buoyancy balance at designed depth. The static equations showed that gravity acceleration, seawater density and displacement are three key aspects affecting the balance. Secondly, we try our best to analysis the gravity and buoyancy changing according to the previous known scientific information, such as anomaly of gravity acceleration, changing of seawater states. Finally, we drew conclusion that gravity changes little (no more than 0.1kgf, it is impossible to give a accurate value). A density-depth relationship at the Challenger Deep was acquired and the displacement changing of the FOD-AUV was calculated preciously.

Effect of bamboo shoot dietary fiber on gel properties, microstructure and water distribution of pork meat batters

  • Li, Ke;Liu, Jun-Ya;Fu, Lei;Zhao, Ying-Ying;Zhu, He;Zhang, Yan-Yan;Zhang, Hua;Bai, Yan-Hong
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.33 no.7
    • /
    • pp.1180-1190
    • /
    • 2020
  • Objective: To develop healthier comminuted meat products to meet consumer demand, the gel properties, rheological properties, microstructure and water distribution of pork meat batters formulated with various amounts of bamboo shoot dietary fiber (BSDF) were investigated. Methods: Different levels of BSDF (0% to 4%) were added to pork batters, and the pH, color, water-holding capacity, texture and rheological properties of pork batters were determined. Then, pork batters were analyzed for their microstructure and water distribution using scanning electron microscopy (SEM) and low-field nuclear magnetic resonance (LF-NMR). Results: Compared with the control, BSDF addition into meat batters showed a significant reduction in L*-value and a significant increase in b*-value (p<0.05). BSDF addition of up to 4% reduced the pH value of pork batters by approximately 0.15 units; however, the cooking loss and expressible water loss decreased significantly (p<0.05) with the increased addition of BSDF. The hardness and gel strength were noticeably enhanced (p<0.05) as the content of BSDF increased. The rheological results showed that BSDF added into pork batters produced higher storage modulus (G') and loss modulus (G") values. The SEM images suggested that the addition of BSDF could promote pork batters to form a more uniform and compact microstructure. The proportion of immobilized water increased significantly (p<0.05), while the population of free water was decreased (p<0.05), indicating that BSDF improved the water-holding capability of pork batters by decreasing the fraction of free water. Conclusion: BSDF could improve the gel properties, rheological properties and water distribution of pork meat batters and decrease the proportion of free water, suggesting that BSDF has great potential as an effective binder in comminuted meat products.

Prognostic Value of CD44 Variant exon 6 Expression in Non-Small Cell Lung Cancer: a Meta-analysis

  • Zhao, Shuang;He, Jin-Lan;Qiu, Zhi-Xin;Chen, Nian-Yong;Luo, Zhuang;Chen, Bo-Jiang;Li, Wei-Min
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.16
    • /
    • pp.6761-6766
    • /
    • 2014
  • Background: CD44v6 (CD44 variant exon 6) is the chief CD44 variant isoform regulating tumor invasion, progression, and metastasis. The prognostic value of CD44v6 expression in non small cell lung cancer (NSCLC) has been evaluated in many studies, but the results have remained controversial. Thus, we performed a meta-analysis of currently available studies to investigate the prognostic value of CD44v6 expression in NSCLC patients and the relationship between the expression of CD44v6 and clinicopathological features. Materials and Methods: Two independent reviewers searched the relevant literature in Pubmed, Medline and Embase from 1946 to January 2014. Overall survival (OS) and various clinicopathological features were collected from included studies. This meta-analysis was accomplished using STATA 12.0 and Revman 5.2 software. Pooled hazard ratios (HRs) with 95% confidence intervals (95%CIs) were calculated to estimate the effects. Results: A total of 921 NSCLC patients from ten studies met the inclusion criteria. The results showed that CD44v6 high expression was a prognostic factor for poor survival (HR=1.91, 95%CI=1.12-3.26, p<0.05). With respect to clinicopathological features, CD44v6 high expression was related to histopathologic type (squamous cell carcinoma versus adenocarcinoma: OR=2.72, 95%CI=1.38-5.38, p=0.004), and lymph node metastasis (OR=3.02, 95%CI=1.93-4.72, p<0.00001). Conclusions: Our results suggested CD44v6 high expression as a poor prognostic factor for NSCLC, and CD44v6 expression is associated with lymph node metastasis and histopathologic type. Therefore, CD44v6 expression can be used as a novel prognostic marker in NSCLC cases.

Diagnostic Value of Interleukin 21 and Carcinoembryonic Antigen Levels in Malignant Pleural Effusions

  • Bunjhoo, Hansvin;Wang, Zheng-Yun;Chen, Hui-Long;Cheng, Sheng;Xiong, Wei-Ning;Xu, Yong-Jian;Cao, Yong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.7
    • /
    • pp.3495-3499
    • /
    • 2012
  • The aim of this study was to evaluate the diagnostic value of interleukin 21(IL-21) and carcinoembryonic antigen (CEA) in tuberculous pleural effusions (TPEs) and malignant pleural effusions (MPEs). Pleural effusion samples from 103 patients were classified on the basis of diagnosis as TPE (n=51) and MPE (n=52). The concentration of IL-21 was determined by ELISA. Lactate dehydrogenase (LDH), adenosine dehydrogenase (ADA) and CEA levels were also determined in all patients. A significant difference was observed in the levels of ADA and CEA (P<0.01), but not in the levels of LDH (P>0.05) between TPE and MPE. The concentration of IL-21 in MPE was significantly higher compared to TPE (P<0.01). With a threshold value of 4.32 pg/ml, IL-21 had a sensitivity of 76.9% (40/52) and a specificity of 80.4% (41/51). Combined detection of IL-21 and CEA had a sensitivity of 69.2% (36/52) and a specificity of 92.2% (47/51). These two markers can contribute to the differential diagnosis of MPEs.

Hybrid PKI Public Certificate Security Method Based on Device ID (디바이스 ID 기반의 하이브리드 PKI 공인 인증 보안 기법)

  • Son, Young-Hwan;Choi, Woon-Soo;Kim, Ki-Hyun;Choi, Han-Na;Lee, Dae-Yoon;Oh, Chung-Shick;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.113-124
    • /
    • 2010
  • In this study, the hybrid authorization quotation technique is based on the device ID for the integrity of the source region guarantee of user certificate, in order to improve the convenience and security for user in the hybrid PKI certificate Mechanism for authentication. The feature of the model in which it is presented from this paper is 5. First, because the user can select the policy himself in which it matches with each authentication situation and security level, the convenience can be improved. Second, the integrity of the source region of the user certificate can be guaranteed through the comparison of the DLDI Key, that is the hash-value of the device ID. Third, the security can be improved by continuously changing an encoding, and the value of the key in which it decodes through the EOTP Key. Fourth, the index value is added to a certificate, and the storage of a certificate is possible at the Multi-Device. Fifth, since the addi the inan aratus for the integrity of the source region guarantee of a certificate is not needed, the authentication process time can be reduced and the computational load of the certificate server can be reduced also.

Certificateless Public Key Encryption Revisited: Security Model and Construction (무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계)

  • Kim, Songyi;Park, Seunghwan;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1109-1122
    • /
    • 2016
  • Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user's ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.