• Title/Summary/Keyword: key-agreement

Search Result 649, Processing Time 0.042 seconds

A Key Agreement Protocol with User Anonymity for Content Transmission Using Smart Card (스마트 카드를 이용한 익명성을 제공하는 방송 콘텐츠 암호화 키 교환 프로토콜)

  • Hwang, Byung-Hee;Kim, Bum-Han;Lee, Dong-Hoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.47-50
    • /
    • 2008
  • 인터넷과 같이 안전하지 않은 네트워크 환경에서 도청은 손쉽게 일어난다. 또한 수신자가 누구인지 알아내기가 쉽다. 이러한 환경에서 정당한 수신자에게 방송 콘텐츠를 안전하게 제공하면서 익명성을 제공하기 위해서는 서버와 수신자 사이에 익명성을 제공하는 키 교환이 필요하다. 스마트 카드를 이용한 익명성을 제공하는 키 교환 프로토콜은 이러한 요건을 충족시킨다. 스마트 카드를 이용한 방법은 여러 가지가 존재하나 이 논문에서는 Kumar Mangipudi 가 제안한 sika프로토콜을 향상시킨 Ren-Chiun Wang의 프로토콜을 알아보고, 취약점을 분석한다. 마지막으로 취약한 점을 보완한 프로토콜을 제안하고 제안한 프로토콜의 안전성을 분석한다. 제안하는 프로토콜은 Ren-Chiun Wang의 프로토콜보다 안전성 측면에서 향상되었다.

  • PDF

Design, Microfabricaiton and Testing of Laterally-Resonating Polysilicon Microactuators (수평공진형 다결정실리콘 미소액추에이터의 설계, 제작 및 시험)

  • Jo, Yeong-Ho
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.20 no.5
    • /
    • pp.1363-1371
    • /
    • 1996
  • This paper presents the design, fabrication, and testing of polysilicon electrostatic microactuators that resonate in the direction parallel to the silicon susbstrates. A set of six different designs has been developed using a theoretical model and design formulae developed for the mocroactuators. Microactuator prototypes are fabricated from a 2.1 $\mu{m}$-thick LPCVD polysilicon film, using a 4-mask surface-micromachining process. The prototypes are tested under a d.c. bias voltage of 45V with an a.c. drive voltage amplitude of 20 v.Measured resorant frequencies are in the ranges of 40-60 kHz, showing a good agreement to their theoretical estimates within error bounds of .$\pm$.5%. Important issues inthe design and microfabrication of the microactuators are discussed, together with potential applicaitons of the key technology involved.

Analysis of Start-Up Characteristics of Gas Turbines for Power Generation (발전용 가스터빈의 시동특성 해석)

  • Kim, Jae-Hwan;Song, Tae-Won;Kim, Tong-Seop;Ro, Sung-Tack
    • Proceedings of the KSME Conference
    • /
    • 2000.11b
    • /
    • pp.662-667
    • /
    • 2000
  • A simulation procedure for a full transient analysis of the start-up of heavy-duty gas turbines for power generation is constructed. Compressor stages are grouped into three categories (front, mid, rear) and three different stage characteristic curves are applied to consider the different low-speed operating characteristics. Start-up behavior of a typical single-shaft gas turbine for power generation is simulated. The predicted transient behavior shows a good agreement with the field data. Special attention is paid to the effects of the modulation of VIGV on start-up characteristics, which play a key role in the stable operation of gas turbines.

  • PDF

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

Numerical Simulation of Flows Past Two Spheres (I) -Two Spheres Aligned in the Streamwise Direction- (2개의 구를 지나는 유동에 대한 수치 해석적 연구 (I) -유동방향으로 놓여진 2개의 구-)

  • Yoon Dong-Hyeog;Yang Kyung-Soo
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.29 no.2 s.233
    • /
    • pp.247-254
    • /
    • 2005
  • A parametric study on the interactions of two spheres aligned in the streamwise direction is carried out using an immersed boundary method. The numerical results for the case of single sphere for the range of $Rs{\le}300$ are in good agreement with other authors' experimental and numerical results currently available. Then, our main investigation is focused on identifying the change of the vortical structures in the presence of a nearby sphere aligned in the streamwise direction for the range $Re{\le}300$. It turns out that significant changes in physical characteristics are noticed depending on how close the two spheres are. In this paper, not only quantitative changes in the key physical parameters such as the force coefficients, but also qualitative changes in vortex structures are reported and analyzed.

Modeling of fiber pullout behaviors of stiff fiber reinforced cementitious composites

  • Chang, Xu;Chen, Ya-Juan;Lin, Hai-Xiao;Zhang, Yong-Bin
    • Computers and Concrete
    • /
    • v.9 no.3
    • /
    • pp.171-178
    • /
    • 2012
  • This paper presents numerical studies of stiff fiber pullout behaviors of fiber reinforced cementitious composites based on a progressive damage model. The ongoing debonding process is simulated. Interfacial stress distribution for different load levels is analyzed. A parametric study, including bond strength and the homogeneity index on the pullout behaviors is carried out. The numerical results indicate that the bond stress decreases gradually from loaded end to embedded end along fiber-cement interface. The debonding initially starts from loaded end and propagates to embedded end as load increasing. The embedded length and bond strength affect the load-loaded end displacement curves significantly. The numerical results have a general agreement with the experimental investigation.

Axial compressive behavior of concrete-filled steel tube columns with stiffeners

  • Liang, Wei;Dong, Jiangfeng;Wang, Qingyuan
    • Steel and Composite Structures
    • /
    • v.29 no.2
    • /
    • pp.151-159
    • /
    • 2018
  • In order to reduce the deformation and delay the local buckling of concrete filled steel tube (CFST) columns, strengthening the structures with stiffeners is an effective method. In this paper, a new stiffening method with inclined stiffeners was used to investigate the behaviors of short CFST columns under axial compression. Besides, a three-dimensional nonlinear finite element (FE) model was applied to simulate the mechanical performances, including the total deformation, local buckling, and stress-strain relationship. Revised constitutive models of stiffened steel tube and confined concrete are proposed. A good agreement was achieved between the test and FE results. Furthermore, the calculated results of load capacity by using a simplified method also show a good correlation with experimental data.

A Strong Biometric-based Remote User Authentication Scheme for Telecare Medicine Information Systems with Session Key Agreement

  • An, Younghwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.41-49
    • /
    • 2016
  • Recently, many biometrics-based user authentication schemes for telecare medicine information systems (TMIS) have been proposed to improve the security problems in user authentication system. In 2014, Mishra et al. proposed an improvement of Awasthi-Srivastava's biometric based authentication for TMIS which is secure against the various attacks and provide mutual authentication, efficient password change. In this paper, we discuss the security of Mishra et al.'s authentication scheme, and we have shown that Mishra et al.'s authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to remove these security problems of Mishra et al.'s authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved biometric based authentication scheme is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack and provides mutual authentication between the user and the telecare system.

Analysis of a Process Sequence in Precision Press Forming of Electronic Components (정밀전자부품 성형을 위한 소성가공 공정해석)

  • 변상규;허병우;강범수
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 1995.10a
    • /
    • pp.119-127
    • /
    • 1995
  • A process sequence in precison press forming of electronic components is investigated by the finite element method. Aperture, a key component of electronic gun, is formed through a wequence of about 15 operations, among which the beading & bending, the first coining, and the second coining operations are expected to be most critical in view of industrial experts' opinions. Thus, the analysis performed by a commercial code MARC focuses on the three operations, and comparisons are made between the results of the analysis and the measurement of experimental forming of the component, and it appears a sound agreement.

  • PDF

Numerical Simulation of Prestressed Precast Concrete Bridge Deck Panels Using Damage Plasticity Model

  • Ren, Wei;Sneed, Lesley H.;Yang, Yang;He, Ruili
    • International Journal of Concrete Structures and Materials
    • /
    • v.9 no.1
    • /
    • pp.45-54
    • /
    • 2015
  • This paper describes a three-dimensional approach to modeling the nonlinear behavior of partial-depth precast prestressed concrete bridge decks under increasing static loading. Six full-size panels were analyzed with this approach where the damage plasticity constitutive model was used to model concrete. Numerical results were compared and validated with the experimental data and showed reasonable agreement. The discrepancy between numerical and experimental values of load capacities was within six while the discrepancy of mid-span displacement was within 10 %. Parametric study was also conducted to show that higher accuracy could be achieved with lower values of the viscosity parameter but with an increase in the calculation effort.