• Title/Summary/Keyword: Channel management

Search Result 1,335, Processing Time 0.027 seconds

Hydrogen Production by Methanol Steam Reforming over Micro-channel Reactor (마이크로 채널 반응기에서 메탄올의 수증기 개질반응을 통한 수소 제조)

  • Lee, Jin-Woo;Jeon, Hye-Jeong;Hong, Sung-Chang
    • Clean Technology
    • /
    • v.15 no.2
    • /
    • pp.130-136
    • /
    • 2009
  • Commercial catalyst (Cu-Zn/$Al_2O_3$, Johnson Matthey Co., 83-3 Catalyst) was applied to the hydrogen production by steam reforming of methanol in the micro-channel reactor (MCR). The steam reforming of methanol was tested over Cu-Zn catalyst at temperatures in the range of 200 and 300$^{\circ}C$, the catalyst size of 0.05${\sim}$2.2 mm, the space velocity of 3,000${\sim}$10,000 $hr^{-1}$ in a fixed bed continuous flow reactor. The conversion of methanol and the yield $H_2$ preferred high temperatures and low space velocities, and had optimal results with the particle size of 0.35 mm. Based on the results from experiments with fixed bed reactor, two types of MCR, boat bed and stacked bed MCRs, were studied. The stacked bed type MCR showed better methanol conversion compared with the boat type one.

A Self-Recovering Key Management Scheme for Reliable Broadcast Encryption (신뢰성 있는 브로드캐스트 암호화를 위한 자가 키 복구 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.471-480
    • /
    • 2009
  • One of the principal impediments to the achievement of a scalable access control for a large number of subscribers in a public broadcast is to distribute key update messages reliably to all stateless receivers. However, in a public broadcast, the rekeying messages can be dropped or compromised during the transmission over an insecure broadcast channel, or transmitted to the receivers while it was off-line. In this study, we propose a novel group key management scheme that features a mechanism that allows the legitimate receivers to recover the current group key even if they lose key update messages for long-term sessions using short hint messages and member computation. The performance analysis result shows that the proposed scheme has advantages of the scalable and efficient rekeying compared with the previous reliable group key distribution schemes. The proposed key management scheme targets a conditional access system in a media broadcast where there is no feedback channel from receivers to the broadcasting station.

(Design of Group Key Management Protocol for Information Security in Multicast) (멀티캐스트 정보 보호를 위한 그룰 키 관리 프로토콜의 설계)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1235-1244
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. With prosed architect, subgroups for multicast secure group management will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. Each subgroup manager gives a secure key to it's own transmitter md the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepare to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after choking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the data transmition is possible without new key distribution at path change to SPT (Shortest Path Tree) of the router characteristic. Additionally, the whole architecture size is samller than the other multicast secure architecture by using the conventional PIM-SIM routing structure without any additional equipment.

  • PDF

Theorization and Utilization of Smart Tourism Ecosystems (스마트 관광 생태계의 이론화와 활용)

  • Koo, Chulmo;Kim, Jeong Hyeon;Chung, Namho
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.69-87
    • /
    • 2014
  • The integration of Tourism and Information Communication Technology (ICT) has been continued based on a drastic progress of ICT in the entire sectors of tourism industry. A variety of terminologies such as eTourism, Virtual Tourism, Smart Tourism have appeared during the last decades, however, tourism with Smartphones created a new paradigm has not discussed yet in tourism industry and academia. By investigating on the previous literature in the role of ICT in tourism, we have classified five major streams in the past such as end user perspective (tourist behaviour), Community, Multimedia and Web, Intelligent System, and Smart Tourism. At a result, we investigated the concept of smart tourism and extended to research on Smart Tourism Ecosystems. We suggest the concept of smart tourism ecosystems, which may create values by interacting among tourism players (tourist, distribution channel, supply channel, government, and local community). We propose the discussion of meaning of 'creating shared value' through 'Smart Tourism Ecosystems'.

DRM Enabled P2P Model for Contents Protection (콘텐츠 보호를 위한 DRM이 적용된 P2P 모델)

  • Sung Jae-Youn;Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.389-396
    • /
    • 2006
  • P2P(Peer To Peer) system, a most attractive file sharing system, is the largest channel of contents distribution and it takes 50% of network traffic. But P2P systems are infamous for used to illegal contents distribution channel not only in music industry, but also in movie industry. But, DRM(Digital Right Management) enabled P2P models are not suggested until now that interrupting illegal contents distribution and keeping advantage of P2P. So in this paper, we suggest a DRM enabled P2P model that can support distributed processing ability and high scalability with no modification in exist P2P model or architecture.

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.

Efficient Message Authentication Scheme for VANET (차량 애드혹 네트워크 환경에서 효율적인 메시지 인증 기법)

  • Yoo, Young-Jun;Lee, Jun-Ho;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2009
  • In VANET, each vehicle can obtain traffic information from other vehicles or infrastructure, and they frequently exchange life-critical safety message. Therefore, it is necessary among vehicles to establish a secure channel for keeping the driver's safe and protecting the channel against several attack challenges. TSVC is a representative scheme which needs low communication and computation to be performed. But, there is a delay when verifying the messages because it is designed based on TESLA. Thus, it is not acceptable to use TSVC for sending the time-critical messages. In this paper, we propose a novel message authentication scheme which reduces a delay for the verification of messages. Therefore, the proposed scheme can be suitable to transmitting time-critical messages. Furthermore, the scheme supports to privacy preservation and can robust against DoS attacks.

A New Type of Differential Fault Analysis on DES Algorithm (DES 알고리즘에 대한 새로운 차분오류주입공격 방법)

  • So, Hyun-Dong;Kim, Sung-Kyoung;Hong, Seok-Hie;Kang, Eun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.3-13
    • /
    • 2010
  • Differential Fault Analysis (DFA) is widely known for one of the most efficient method analyzing block cipher. In this paper, we propose a new type of DFA on DES (Data Encryption Standard). DFA on DES was first introduced by Biham and Shamir, then Rivain recently introduced DFA on DES middle rounds (9-12 round). However previous attacks on DES can only be applied to the encryption process. Meanwhile, we first propose the DFA on DES key-schedule. In this paper, we proposed a more efficient DFA on DES key schedule with random fault. The proposed DFA method retrieves the key using a more practical fault model and requires fewer faults than the previous DFA on DES.

Longitudinal Pattern of Large Wood Distribution in Mountain Streams (산지계류에 있어서 유목의 종단적 분포특성)

  • Seo, Jung Il;Chun, Kun Woo;Kim, Min Sik;Yeom, Kyu Jin;Lee, Jin Ho;Kimura, Masanobu
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.1
    • /
    • pp.52-61
    • /
    • 2011
  • Whereas recent researches have elucidated the positive ecological roles of large wood (LW) in fishbearing channels, LW is also recognized as a negative factor of log-laden debris flows and floods in densely populated areas. However in Republic of Korea, no study has investigated longitudinal variations of LW distribution and dynamic along the stream corridor. Hence to elucidate 1) physical factors controlling longitudinal distribution of LW and 2) their effect on variation in LW load amount, we surveyed the amount of LW with respect to channel morphology in a mountain stream, originated from Mt. Ki-ryong in Inje, Gangwondo. Model selection in the Generalized Linear Model procedure revealed that number of boulder (greater than or equal to 1.0 m in diameter), bankfull channel width and their interaction were the best predictors explaining LW load volume per unit channel segment area (unit LW load). In general, boulders scattered within small mountain streams influence LW retention as flow obstructions. However, in this study, we found that the effect of the boulders vary with the channel width; that is, whereas the unit LW load in the segment with narrow channel width increased continuously with increasing boulder number, it in the segment with wide channel width did not depend on the boulder number. This should be because that, in two channels having different widths, the rates of channel widths reduced by boulders are different although boulder numbers are same. Our findings on LW load varying with physical factors (i.e., interaction of boulder number and channel width) along the stream corridor suggest understanding for longitudinal continuum of hydrogeomorphic and ecologic characteristics in stream environments, and these should be carefully applied into the erosion control works for systematic watershed management and subsequent disaster prevention.

The Structural Relationships between the Antecedents of Knowledge Sharing and User Performance in Knowledge Management systems (지식관리시스템에서의 지식공유에 대한 영향요인과 성과간의 구조적 관계에 관한 연구)

  • Shin, Seon-Jin;Kong, Hee-Kyoung;Koh, Joon
    • Knowledge Management Research
    • /
    • v.9 no.2
    • /
    • pp.87-107
    • /
    • 2008
  • The knowledge society has come to where the knowledge is the source of wealth contrary to the traditional era that labor and capital were the source of wealth. Thus, corporate is accelerating to introduce the knowledge management and to establish the knowledge management system (KMS) in order to effectively manage the knowledge that can be the source of their competitiveness. The purpose of this paper is to identify the factors which affect knowledge sharing and to prove empirically their relationships with the KMS performance. A survey was conducted and data were collected from 220 respondents of 19 organizations which have adopted KMS. Research model and related hypotheses were tested using PLS Graph 3.0. As a result of data analysis, seven hypotheses out of eleven hypotheses were supported. In particular, knowledge sharing is significantly influenced by those knowledge sharing factors such as openness, trust, training, reward system, perceived usefulness, and communication channel. Also, individual impact is significantly affected by knowledge sharing. This study is expected to provide a sound basis for understanding the importance of knowledge sharing to gain organizational as well as individual competitiveness and exploring ways to effectively share knowledge through enhancing the use of KMS in organizations.

  • PDF