• Title/Summary/Keyword: keys

Search Result 1,083, Processing Time 0.02 seconds

Morphological Characterization and Classification of Anuran Tadpoles in Korea

  • Park, Dae-Sik;Cheong, Seo-Kwan;Sung, Ha-Cheol
    • Journal of Ecology and Environment
    • /
    • v.29 no.5
    • /
    • pp.425-432
    • /
    • 2006
  • The tadpoles of 12 Korean anuran species, including Bombina orientalis, Bufo gargarizans, B. stejnegeri, Hyla japonica, Kaloula borealis, Rana dybowskii, R. huanrenensis, R. coreana, R. nigromaculata, R. chosenica, R. rugosa, and R. catesbeiana, were classified based on their morphological characteristics. We collected eggs or tadpoles of the 12 Korean anuran species from Gangwon, Incheon, Chungcheong, and Gyeonggi districts in 2005 and 2006 breeding seasons. When the tadpoles reached at $27{\sim}37$ Gosner's developmental stages, we described morphological characteristics of the tadpoles of each anuran species and measured their physical parameters such as total length, body length, and body mass. After that, we chose 12 morphological characteristics to identify each species and to use them as classification keys such as eye location, caudal musculature pattern, spiracle location, oral disc morphology, and labial tooth row formula. In this paper, we presented classification keys, morphological characteristics, and drawings for the tadpoles of 12 anuran species.

A User Satisfaction Based Touch Button Design (사용자 만족도를 고려한 터치 버튼 사이즈에 대한 연구)

  • Kim, Jin;Choi, Kwang-Soo
    • IE interfaces
    • /
    • v.20 no.4
    • /
    • pp.539-546
    • /
    • 2007
  • This study has been conducted on touch screen interface design for mobile devices. It was intended to measure user’s satisfaction on one-handed thumb input mobile devices. Recent studies proposed the optimal touch button size, but it is inappropriate for mobile devices. Therefore, this study was focused on four touch key factors-width, height, the horizontal and vertical distance between touch keys-as independent variables. The ANOVA results showed that the user satisfaction of four touch key factors was significantly affected by the thumb input. It also apparent that the interactions between four factors were significant. As a result, the horizontal and vertical distance as well as the width and height affected the satisfaction of users. In addition, this study suggested satisfaction models which represent the top 30%, 50%, 70% of user satisfaction measurement. The results of this study could be used to design touch keys that are able to enhance the usability on touch screen based mobile devices.

Compromise-Resistant Pairwise Key Establishments for Mobile Ad hoc Networks

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.375-378
    • /
    • 2006
  • This letter presents a pairwise key establishment scheme that is robust against the compromise of nodes in mobile ad hoc networks. Each node establishes local keys with its neighbor nodes that are at most three hops away at network boot-up time. When any two nodes establish a pairwise key, they receive the secret information from the nodes on the route between them, and construct the pairwise key using the secret information. Here, the local keys are utilized by the nodes on the route to send the secret information securely. The simulation results have proven that the proposed scheme provides better security than the key pre-distribution-based scheme.

  • PDF

Larval Development of Chthamalus challengeri Hoek (Cirripedia: Thoracica: Chthamalidae) with Keys to Barnacle Larvae of Korean Coastal Waters

  • Chu Lee
    • Animal cells and systems
    • /
    • v.3 no.1
    • /
    • pp.59-68
    • /
    • 1999
  • Chthamalus challengeri Hoek was collected from intertidal rocks to rear the larvae from hatching through nauplius to cyprid in the laboratory. Larval development consists of six nauplius stages and a cyprid. Unilobed labrum with a prominent protuberance and the frontolateral horns folded under the anterior cephalic shield margin are diagnostic features through all nauplius stages. The posterior border of the cephalic shield bears no posterior shield spines in nauplius stages IV-Ⅵ. There is a specific hispid seta in the fourth group of the antennal endopodite. Morphological features such as the cephalic shield, labrum, abdominal process, antennules, antennae and mandibles in all nauplius and cyprid stages are illustrated and described. The numerical setations of the antennule are found to aid in the intraspecific identification of barnacle nauplius stages without dissection. The keys to each stage of the barnacle larvae in Korean coastal waters are provided based on the reared nauplii of seven species: Pollicipes mitella Octomeris sulcata, Chthamalus challengeri, Balanus albicostatus B. trigonus, B. amphitrite, and B. improvisus inhabiting Korean coastal waters.

  • PDF

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

Cookie-Based Identification of the Public Keys of TLS/SSL Certificates (쿠키 기반의 TLS/SSL 인증서 공개키의 확인)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.101-103
    • /
    • 2016
  • We propose a HTTP cookie-based identification of the public keys of Web sites for the case of failure to validate certificates. The proposed scheme effectively protects users from the phishing attacks of inducing them to access bogus sites. It incurs little performance overhead on the browser and the server of Web sites. It requires to implement the input processing of user credentials and the encryption and verification of cookie values, though.

Design of a Key Scheduler for Supporting the Parallel Encryption and Decryption Processes of HIGHT (HIGHT 암복호화 병렬 실행을 위한 Key Scheduler 설계)

  • Choi, Won-Jung;Lee, Je-Hoon
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.107-112
    • /
    • 2015
  • HIGHT is an 64-bit block cipher, which is suitable for low power and ultra-light implementation that are used in the network that needs the consideration of security aspects. This paper presents a parallel key scheduler that generates the whitening keys and subkeys simultaneously for both encryption and decryption processes. We construct the reverse LFSR and key generation blocks to generate the keys for decryption process. Then, the new key scheduler is made by sharing the common logics for encryption and decryption processes to minimize the increase in hardware complexity. From the simulation results, the logic size is increased 1.31 times compared to the conventional HIGHT. However, the performance of HIGHT including the proposed key scheduler can be increased by two times compared to the conventional counterpart.

A Study on Smartcard-based Certification System using Kerberos and X.509 (Kerberos와 X.509를 이용한 스마트카드 기반 인증시스템에 관한 연구)

  • 박정용;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.1
    • /
    • pp.115-124
    • /
    • 2000
  • In this paper, we are introduced a certification system for open network environment. The Kerberos which was developed by MIT uses a secret key cryptosystem for authentication. It is secure and efficient for closed network users to authenticate each others. However, the kerberos has a disadvantage of managing a lot of secret keys for In this paper, we are introduced a certification system for open network environment. users in the open network environment. This paper suggests a method that uses X.509 to provide public keys with certification to Kerberos users for authentication in the X.500 directory standard. And we also suggest the smartcard as data storage device to enhance the security and availability.

  • PDF

NFC Mobile Coupon Protocol Based on Hash (해시 기반 NFC 모바일 쿠폰 프로토콜)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.782-790
    • /
    • 2017
  • As most of the recent smart devices have NFC function the NFC mobile coupon will become one of the pervasive NFC applications. We need the secure NFC coupon protocols to issue and use NFC mobile coupon. In this paper, we analyze the security of the previous protocols and point out the problems of security. As the result of analysis, Premium M-coupon Protocol proposed by A. Alshehri and S. Schneider is the most secure but has unnecessary operations. We propose the Modified Premium M-coupon Protocol-1 with the unnecessary operations removed and show this protocol is secure by security analysis. Most of NFC mobile coupon protocols use the cryptography with the shared secret keys. We propose the Modified Premium M-coupon Protocol-2 without the shared secret keys and show this protocol is secure by security analysis.

A High Quality Steganographic Method Using Morphing

  • Bagade, Anant M.;Talbar, Sanjay N.
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.256-270
    • /
    • 2014
  • A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.