• Title/Summary/Keyword: Email transmission

Search Result 6, Processing Time 0.02 seconds

Public Key Encryption with Keyword Search in Multi-Receiver Setting (다중 수신자 환경에서 키워드 검색 가능한 공개키 암호시스템)

  • Rhee, Hyun-Sook;Park, Jong-Hwan;Rhee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.31-38
    • /
    • 2009
  • To provide the privacy of a keyword, a public key encryption with keyword search(PEKS) firstly was propsed by Boneh et al. The PEKS scheme enables that an email sender sends an encrypted email with receiver's public key to an email server and a server can obtain the relation between the given encrypted email and an encrypted query generated by a receiver. In this email system, we easily consider the situation that a user sends the one identical encrypted email to multi-receiver like as group e-mail. Hwang and Lee proposed a searchable public key encryption considering multi-receivers. To reduce the size of transmission data and the server's computation is important issue in multi-receiver setting. In this paper, we propose an efficient searchable public key encryption for multi-receiver (mPEKS) which is more efficient and reduces the server's pairing computation.

A Novel Resource Allocation Algorithm in Multi-media Heterogeneous Cognitive OFDM System

  • Sun, Dawei;Zheng, Baoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.691-708
    • /
    • 2010
  • An important issue of supporting multi-users with diverse quality-of-service (QoS) requirements over wireless networks is how to optimize the systematic scheduling by intelligently utilizing the available network resource while, at the same time, to meet each communication service QoS requirement. In this work, we study the problem of a variety of communication services over multi-media heterogeneous cognitive OFDM system. We first divide the communication services into two parts. Multimedia applications such as broadband voice transmission and real-time video streaming are very delay-sensitive (DS) and need guaranteed throughput. On the other side, services like file transmission and email service are relatively delay tolerant (DT) so varying-rate transmission is acceptable. Then, we formulate the scheduling as a convex optimization problem, and propose low complexity distributed solutions by jointly considering channel assignment, bit allocation, and power allocation. Unlike prior works that do not care computational complexity. Furthermore, we propose the FAASA (Fairness Assured Adaptive Sub-carrier Allocation) algorithm for both DS and DT users, which is a dynamic sub-carrier allocation algorithm in order to maximize throughput while taking into account fairness. We provide extensive simulation results which demonstrate the effectiveness of our proposed schemes.

Blocking and investigation of child pornography using child pornography profiling system of National Police Agency (경찰청 아동음란물프로파일링 시스템을 이용한 아동음란물 차단 및 수사 방안)

  • Lee, Sang Duk
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2018
  • Computer technology and Internet advances enable easy massive file transfer by messenger, email, and web hard service users this means that a child pornography file owner who is illegally possessing itself can quickly transfer that to other users However there are currently no specific ways to prevent or block the distribution of child pornography between messenger, email, and web hard service users. in this paper, we propose a method to prevent the distribution of child pornography using the MD5, SHA-1 hash value stored in the 'police Child pornography Profiling system' and to identify the child pornography suspects using the subscriber information. the user extracts the hash value of the file before distributing the file, compared it with police system, and if it has the same value, blocks the transmission of the file and sends warning to the owner. the service provider sends the subscriber information to investigation agency child pornography owners can conduct a quick and accurate investigation.

A Mobile Phone? Yes, I Want One! A Royal City? Yes, I Want One! How International Technology Met Local Demand in the Construction of Myanmar's First Cities, 1800 Years Ago.

  • Bob, Hudson
    • SUVANNABHUMI
    • /
    • v.6 no.1
    • /
    • pp.3-26
    • /
    • 2014
  • In the modern world, we can share information and new products as quickly as an email can be sent, or a parcel can be loaded onto an aircraft. But the brick-walled urban centres that sprung up in Myanmar around 150 CE suggest that ancient people could be just as excited about new information and products, even though the transmission of data and cultural objects followed a different path. These huge resource-intensive cities, inspired by the walled cities of India, were not built in sequence, as has been generally assumed, but in the same period. Once the Royal City arrived, the chiefly families of early First Millennium Upper Myanmar just had to have one.

  • PDF

A Design and Implementation of Mobile E-mail Transmission System Using PC Remote Control Technique (PC 원격 제어 기법을 사용한 모바일 이메일 전송 시스템 설계 및 구현)

  • Song, Hye-Ju;Kim, Hyun-Ju;You, Hyun-Jung;Lee, Jong-Woo
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.17-25
    • /
    • 2007
  • Recently, the ubiquitous computing environment being able to connect all kinds of computing elements at anytime anywhere becomes widespread in human life. In this paper, we focus on a PC remote control system using cellular phones. Especially, we design and implement an mobile e-mail transmission system using PC remote control technique. By using our remote controller, cellular phone users can login into their own PC, and then send any file to others by e-mail attachment. To show the correct running of our system, real demonstration results are presented. We are sure that by opening our source code to the public our results can play an important role to encourage development of the various mobile remote control functionalities.

  • PDF

Message Forwarding System based on User's Context (사용자의 컨텍스트에 기반한 메시지 전달 시스템)

  • Kim, Namyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.35-40
    • /
    • 2013
  • The messages on mobile terminal may contain context information such as user's location, time and preference. This paper proposes message forwarding system based on user's context. The server stores the predefined target addresses which may be mobile phone number, web server address and email address. On request for message transmission, the server tries to find a target address matching a user's context. Thus, a sender transmits messages to a representative address without knowing various receiver's addresses and a receiver can retrieve classified messages according to subject/location.