• Title/Summary/Keyword: message protocol

Search Result 946, Processing Time 0.023 seconds

공정한 은닉 KCDSA 서명에 기반한 추적 가능한 전자화폐 시스템

  • 이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.85-97
    • /
    • 1999
  • A blind signature scheme is a protocol allowing verifier to obtain a valid signature for a message m from a signer without him seeing the message. This means that the bank in collaboration with the shop cannot trace the electronic cash to user. However anonymous electronic cash also facilitates fraud and criminal acts such as money laundering anonymous blackmailing and illegal purchaes. Therefore in this paper we propose fair blind signature scheme based on KCDSA which is a domestic digital signature scheme and it apply a electronic cash system. In particularly a proposed electronic cash system have an anonymity control ability which trace a user who make use a electronic cash illegally in association with a trusted center.

A Design Methodology of the MSIB(Message Store Information Base) for EDI-MS(EDI-Message Store) Using Object-Relation Mapping Function (객체-관계 대응 함수를 이용한 EDI-MS용 MSIB의 설계 방법)

  • 백승혜;김태윤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.1
    • /
    • pp.143-158
    • /
    • 1994
  • X.435 is the EDI communication protocol published by CCITT and ISO/IEC in 1990. The message types and abstract services of EDI-MS are specified in X.435 recommendation. In this paper, the design methodology on implementation of MSIB in the case that MHS-MS is required to be extended into EDI-MS has been studied. The design methodology presented in this paper is the one using the mapping function of the object relation. This methodology considers the EDI message types and characterictics. The proposed design methodology han an advantage that is able to design the component tables of MSIB satisfying the third normal form and it does not require the normalization processing. The MSIB constructed by the proposed method can store and retrieve multi-values efficiently.

  • PDF

Message Complexity Analysis of TDMA Ad-hoc Network MAC Protocols (TDMA Ad-hoc 네트워크 MAC 프로토콜의 메시지 복잡도 분석)

  • Kim, Sang-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.768-776
    • /
    • 2009
  • This paper analyses the message complexity of TDMA ad hoc MAC protocols. Since the network resource of ad hoc networks is limited due to the multiple interferences and the contention-based wireless channel, the scalability issue is one of the main research topics in developing ad hoc algorithms. Simulation demonstrates that SMACS protocol has the lowest message complexity, whereas TMMAC has the highest. In addition, it is found that since the effect of unicast dominates in the message complexity compared to other factors with an increasing number of nodes, Z-MAC tends to have the property of linearity, whereas BMA and TMMAC show exponential increases in their complexities.

Analyses of RFID System Using Lighted Weight Algorithm

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.19-23
    • /
    • 2009
  • In this paper, we propose a general idea about an RFID system which provides lighted weight algorithm. We discuss how RFID could be applied for this kind of system, especially, compact protocol. We evaluate a few protocols that have been suggested for use in passive RFID tagged systems. We can reduce security computation without losing security features by message integration and pre-computation in this paper. And the proposed protocol can be used in low-cost RFID systems that require a small computational load for both the back-end database and the tags.

A Study on Method of QoS Guarantee for Ad hoc network (Ad hoc 망의 QoS 보장 방안에 대한 연구)

  • 이광제;정진욱
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.129-132
    • /
    • 2003
  • In this paper, we propose the DQM - CBRP( Distributed QoS Monitoring - Cluster Based Routing Protocol ) routing protocol to provide Quality of Service guarantee for multimedia service in Ad hoc mobile network. This paper proves the DQM-CBRP can avoid message loss and is suitable to guarantee of QoS thru simulation of COMNET III.

  • PDF

Design of A Push Content Generator for Push Service in Wireless Application Protocol (WAP기반 Push 서비스를 위한 Push Content Generator 설계)

  • 이정은;박병화;신동일;신동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.132-134
    • /
    • 2000
  • 무선 인터넷의 급속한 발전과 더불어 모바일 인터넷에서 요구되는 기능이 점점 다양화되어 가고 있다. 특히 WAP)Wireless Application Protocol)상에서 지원되는 Push 서비스의 요구가 늘어나고 있다. 본 논문에서는 WAP상에서 사용하는 Push message의 보다 쉬운 구현을 위해 Push 서비스의 구조와 동작 원리를 이해하고 Push Content Generator의 설계에 대해 기술한다.

  • PDF

Design and Implementation of a Generic Interface Adaptor for Network Management based on TINA (TINA 체계의 망관리를 위한 Generic Interface Adaptor의 설계 및 구현)

  • 이계환;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.10A
    • /
    • pp.1717-1726
    • /
    • 2001
  • 본 논문에서는 CORBA(Common Object Request Architecture)기반의 TINA(Telecommunications Information Networking Architecture) 분산체계에서 통신망 하부 장비들이 SNMP(Simple Network Management Protocol) 혹은 TMN(Telecommunications Management Network) 체계로 혼재되어 관리되는 네트워크의 NE(Network Element)들을 효율적으로 통합 관리할 수 있는 Generic Interface Adaptor(GIA)를 제안하고 이를 설계 및 구현하였다. GIA는 message mapping, protocol conversion 및 DBMS를 이용한 Object Abstract Translation(OAT)을 통해서 각 관리체계에 맞도록 관리정보를 변환시키며, 이를 통해 TINA EML(Element Management Layer) component와 SNMP NE agent 간의 상호연동을 가능하게 한다.

  • PDF

A Multi-path Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks (이동 애드 혹 네트워크를 위한 다중경로 동적 소스 라우팅 프로토콜)

  • Lim Hwa-Jung;Tscha Yeong-hwan
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.111-120
    • /
    • 2005
  • A mobile ad-hoc network is an autonomous system of mobile nodes which are free to move around randomly and organize themselves arbitrarily, hence a routing protocol that handles the dynamic network topology changes is required for the network. In this paper we present a multi -Path on-demand routing protocol called R-DSR (Robust Dynamic Source Routing), an extension to the existing IETF protocol DSR. The proposed protocol has it that every pair of 2-hop away nodes on the single route is additionally connected via an alternative node. Throughout mathematical analysis we show the proposed protocol reveals higher message delivery rate than that of the Das's multi-path protocol, currently known as one of the most typical approaches related to DSR.

An NSIS based Resource Reservation Protocol for Hose model VPN Service (Hose 모델 VPN 서비스를 위한 NSIS 기반 자원 예약 프로토콜)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.559-570
    • /
    • 2007
  • In this paper, we define a Hose-NSIS-QoSM, which reserves and manages resources according to the hose based resource provisioning mechanisms for supporting the VPN QoS(Quality of Service) using the NSIS(Next Step in Signaling) signaling protocol. Specifically, we specify the NSIS message objects, the structures of QoS NSLP(NSIS Signaling Layer Protocol)/NTLP(NSIS Transport Layer Protocol)/RMF(Resource Management Function) state tables and the processing of the signaling messages in NSIS nodes. Also, we compare the Hose-NSIS-QoSM with the Hose-RSVP-TE-QoSM that supports the hose based VPN QoS in the MPLS networks using the extended RSVP-TE mechanism.

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.