• Title/Summary/Keyword: Key Distribution System

Search Result 668, Processing Time 0.031 seconds

Distribution System and the Environment (환경과 유통시스템)

  • Sejo Oh;Lim, Young-Kyun
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2000.10a
    • /
    • pp.183-185
    • /
    • 2000
  • A proactive approach on environmental issues may be one of critical competitive factors for global business in near future. Especially, distribution systems are very related to the various environmental issues, including development of green products and packaging, selection of the transportation vehicles and pallets, design of retail stores and distribution facilities, participation for solving the local environmental problems, and so on. In order to approach the environmental issues on distribution systems, for the first time managers need to understand the strategic framework for green management and then, to find the key success factors of leading companies in this field. Finally, future directions of strategic green management on distribution systems are discussed and shared.

  • PDF

Efficient Fault Tolerant Key Agreement for Ad-Hoc (Ad-Hoc 네트워크에서 링크 장애를 고려한 효율적인 키 협정 방법)

  • Lee, Young-Jun;Min, Sung-Gi;Lee, Sung-Jun
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.45-53
    • /
    • 2004
  • Ad-Hoc network is wireless network architecture without infrastructure. We encounter new types of security problems in Ad-Hoc networks because such networks have little or no support from infrastructure. Thus, wireless communications need security mechanisms in order to guarantee the integrity and the privacy of the communication, as well as the authentication of the entities involved. Many practical systems have been proposed. The most familiar system is the Diffie-Hellman key distribution system. This algorithm allows the establishment of a cryptographic secret key between two entities. If more than two users want to compute a common key, then a group key agreement system is used. This paper discusses several group key agreement systems and presents two efficient fault tolerant methods to perform successful group key agreement.

  • PDF

Geometric structure and electronic behavior of Rh decorating effect on zigzag CNTs (n=7-12): A DFT study

  • Cui, Hao;Zhang, Xiaoxing;Zhou, Yongjian;Zhang, Jun
    • Carbon letters
    • /
    • v.26
    • /
    • pp.61-65
    • /
    • 2018
  • Comprehensive calculations of the Rh decoration effect on zigzag CNTs with n ranging from 7 to 12 were conducted in this work to understand the effect of Rh doping on geometric structures and electronic behaviors upon metallic and semiconducting CNTs. The obtained results indicated that Rh dopant not only contributes to the deformation of C-C bonds on the sidewall of CNTs, but also transforms the electron distribution of related complexes, thereby leading to a remarkable increase of the conductivity of pure CNTs given the emerged novel state within the energy gap for metallic CNTs and the narrowed energy gap for semiconducting CNTs. Our calculations will be meaningful for exploiting novel CNT-based materials with better sensitivity to electrons and higher electrical conductivity compared with pure CNTs.

Hybrid Cryptosystem providing Implicit Authentication for sender (송신자에 대한 묵시적 인증을 제공하는 하이브리드 암호 시스템)

  • Oh, Soo-Hyun;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.71-80
    • /
    • 2002
  • To provide the confidentiality of messages transmitted over the network, the use of cryptographic system is increasing gradually and the hybrid cryptosystem, which combines the advantages of the symmetric cryptosystem and the public key cryptosystem is widely used. In this paper, we proposes a new hybrid cryptosystem capable of providing implicit authentication for the sender of the ciphertext by means of the 1-pass key distribution protocol that offers implicit key authentication, hash function and symmetric cryptosystem. Also, we describe some examples such as the Diffie-Hellman based system and the Nyberg-Ruppel based system. The proposed hybrid cryptosystem is an efficient more than general public key cryptosystems in the aspect of computation work and provides implicit authentication for the sender without additional increase of the communication overhead.

Quorum-based Key Management Scheme in Wireless Sensor Networks

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Chang, Chia-Ming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2442-2454
    • /
    • 2012
  • To ensure the security of wireless sensor networks, it is important to have a robust key management scheme. In this paper, we propose a Quorum-based key management scheme. A specific sensor, called as key distribution server (KDS), generates a key matrix and establishes a quorum system from the key matrix. The quorum system is a set system of subsets that the intersection of any two subsets is non-empty. In our scheme, each sensor is assigned a subset of the quorum system as its pre-distributed keys. Whenever any two sensors need a shared key, they exchange their IDs, and then each sensor by itself finds a common key from its assigned subset. A shared key is then generated by the two sensors individually based on the common key. By our scheme, no key is needed to be refreshed as a sensor leaves the network. Upon a sensor joining the network, the KDS broadcasts a message containing the joining sensor ID. After receiving the broadcast message, each sensor updates the key which is in common with the new joining one. Only XOR and hash operations are required to be executed during key update process, and each sensor needs to update one key only. Furthermore, if multiple sensors would like to have a secure group communication, the KDS broadcasts a message containing the partial information of a group key, and then each sensor in the group by itself is able to restore the group key by using the secret sharing technique without cooperating with other sensors in the group.

Crosstalk evaluation in multiview autostereoscopic three-dimensional displays with an optimized diaphragm applied

  • Peng, Yi-Fan;Li, Hai-Feng;Zheng, Zhen-Rong;Xia, Xin-Xing;Yao, Zhi;Liu, Xu
    • Journal of Information Display
    • /
    • v.13 no.2
    • /
    • pp.83-89
    • /
    • 2012
  • The crosstalk evaluation of multiview autostereoscopic three-dimensional (3D) displays is discussed, with both the human and technical factors investigated via image quality assessment. In the imaging performance measurements and analysis for a multiview autostereoscopic display prototype equipment, it was inferred that crosstalk would have both a positive and a negative effect on the imaging performance of the equipment. The importance of the attached diaphragm in the crosstalk evaluation was proposed and then experimentally verified, using the developed prototype equipment. The luminance distribution and crosstalk situation were given, with two different diaphragm arrays applied. The analysis results showed that the imaging performance of this 3D display system can be improved with minimum changes to the system structure.

A Study on the Development of an Agent Communication Module for a Multi-Agent Based Power Distribution Network Protection System Using DNP 3.0 Protocols (DNP3.0 프로토콜을 이용한 배전계통 멀티 에이전트 보호시스템의 통신 모듈 개발에 관한 연구)

  • 최면송;이한웅;민병운;정광호;이승재;현승호
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.9
    • /
    • pp.506-512
    • /
    • 2003
  • In this paper, a communication module between Relay agents in a multi-agent system based power distribution network protection system is realized using DNP3.0(Distributed Network Protocol), which is the standard communication protocol of distribution automation system in KEPCO. The key words for agent communication in the multi-agent based protection system are defined and represented by use of DNP application function code. The communication module developed based on the proposed communication scheme is tested by use of the Communication Test Harness, a test tool for DNP protocol, then used to the multi-agent system based power distribution net work protection system.

Key Distribution for Heterogeneous Public-Key Cryptosystems

  • Lv, Xixiang;Yi, Mu;Hui, Li
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.464-468
    • /
    • 2013
  • The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.

System RBDO of truss structures considering interval distribution parameters

  • Zaeimi, Mohammad;Ghoddosian, Ali
    • Structural Engineering and Mechanics
    • /
    • v.70 no.1
    • /
    • pp.81-96
    • /
    • 2019
  • In this paper, a hybrid uncertain model is applied to system reliability based design optimization (RBDO) of trusses. All random variables are described by random distributions but some key distribution parameters of them which lack information are defined by variation intervals. For system RBDO of trusses, the first order reliability method, as well as monotonicity analysis and the branch and bound method, are utilized to determine the system failure probability; and Improved (${\mu}+{\lambda}$) constrained differential evolution (ICDE) is employed for the optimization process. System reliability assessment of several numerical examples and system RBDO of different truss structures are proposed to verify our results. Moreover, the effect of different classes of interval distribution parameters on the optimum weight of the structure and the reliability index are also investigated. The results indicate that the weight of the structure is increased by increasing the uncertainty level. Moreover, it is shown that for a certain random variable, the optimum weight is more increased by the translation interval parameters than the rotation ones.

Performance of privacy Amplification in Quantum Key Distribution Systems (양자 키 분배 시스템에서 보안성 증폭의 성능 분석)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.111-116
    • /
    • 2018
  • This paper introduces the concept of a random universal hash function to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition, the approach in terms of security amplification shows that phase error correction offers better security. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD(Quantum Key Distribution). Finally, we show that the BB84 protocol using random privacy amplification is safe at higher key rates than Mayers' performance at the same error rate.