• Title/Summary/Keyword: Key Uniqueness

Search Result 62, Processing Time 0.026 seconds

LOCAL EXISTENCE AND GLOBAL UNIQUENESS IN ONE DIMENSIONAL NONLINEAR HYPERBOLIC INVERSE PROBLEMS

  • Choi, Jong-Sung
    • Communications of the Korean Mathematical Society
    • /
    • v.17 no.4
    • /
    • pp.593-606
    • /
    • 2002
  • We prove local existence and global uniqueness in one dimensional nonlinear hyperbolic inverse problems. The basic key for showing the local existence of inverse solution is the principle of contracted mapping. As an application, we consider a hyperbolic inverse problem with damping term.

3D Content Model Hashing Based on Object Feature Vector (객체별 특징 벡터 기반 3D 콘텐츠 모델 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.75-85
    • /
    • 2010
  • This paper presents a robust 3D model hashing based on object feature vector for 3D content authentication. The proposed 3D model hashing selects the feature objects with highest area in a 3D model with various objects and groups the distances of the normalized vertices in the feature objects. Then we permute groups in each objects by using a permutation key and generate the final binary hash through the binary process with the group coefficients and a random key. Therefore, the hash robustness can be improved by the group coefficient from the distance distribution of vertices in each object group and th hash uniqueness can be improved by the binary process with a permutation key and a random key. From experimental results, we verified that the proposed hashing has both the robustness against various mesh and geometric editing and the uniqueness.

An Improved Protocol for Establishing A Session Key in Sensor Networks (센서 네트워크의 노드간 세션키 생성을 위한 개선된 프로토콜)

  • Kim Jong-Eun;Cho Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.137-146
    • /
    • 2006
  • Because the traditional public key-based cryptosystems are unsuitable for the sensor node with limited computational and communication capability, a secure communication between two neighbor sensor nodes becomes an important challenging research in sensor network security. Therefore several session key establishment protocols have been proposed for that purpose. In this paper, we analyzed and compared the existing session key establishment protocols based on the criterions of generation strategy and uniqueness of the session key, connectivity, overhead of communication and computation, and vulnerability to attacks. Based on the analysis results, we specify the requirements for the secure and efficient protocols for establishing session keys. Then, we propose an advanced protocol to satisfy the specified requirements and verify the superiority of our protocol over the existing protocols through the detailed analysis.

The Eum-Yang Body-Function Perspective(陰陽體用觀) in the Saenggitongcheonron Chapter of the "Hwangjenaegyeong"(${\ll}$黃帝內經素問.生氣通天論${\gg}$) (${\ll}$ 제내경소문(黃帝內經素問).생기통천론(黃帝內經素問)${\gg}$의 음양체용관(陰陽體用觀)에 대한 시론(試論))

  • Jang, Woo-Chang
    • Journal of Korean Medical classics
    • /
    • v.23 no.6
    • /
    • pp.73-85
    • /
    • 2010
  • The chapter holds great importance in understanding the fundamental aspect of disease occurrence, for it contains key concepts of disease of Naegyeong medicine. For this reason, prominent doctors from Jang Gyeong-ak(張景岳) of Ming to Lee Gyujun (李奎晙) of late Josun have based their Yang Gi-centered medical theories on this chapter. However, doctors such as Ju Jinhyeong(朱震亨) who have stressed the importance of Eum, also used the contents of this chapter to support their perspective on disease, which means that the main voice of this chapter is still unclear. Based on the previous chapter, it is valid to say that uses the Eum-Yang Body-Function Perspective(陰陽體用觀) to establish the fundamentals of life and parallels the uniqueness of each kind of Gi, Eum and Yang, in leading Gi activity in mankind. This philosophy based on the uniqueness of the activity of Eum/Yang Gi expands its target from human to disease in general, becoming actualized as a theory of external/internal body-function perspective. Cultivation methods based on this uniqueness is also being suggested.

Error Correction Codes for Biometric Cryptosystem: An Overview

  • Teoh, Andrew Beng Jin;Kim, Jaihie
    • Information and Communications Magazine
    • /
    • v.32 no.6
    • /
    • pp.39-49
    • /
    • 2015
  • In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By incorporating biometrics technologies which utilize the uniqueness of personal characteristics, the security of cryptosystems could be strengthened as authentication now requires the presence of the user. Biometric Cryptosystem (BC) encompasses the design of cryptographic keys protection methods by incorporating biometrics. BC involves either key-biometrics binding or direct key generation from biometrics. However, the wide acceptance and deployment of BC solutions are constrained by the fuzziness related with biometric data. Hence, error correction codes (ECCs) should be adopted to ensure that fuzziness of biometric data can be alleviated. In this overview paper, we present such ECC solutions used in various BCs. We also delineate on the important facts to be considered when choosing appropriate ECCs for a particular biometric based solution from accuracy performance and security perspectives.

SOLUTIONS OF A CLASS OF COUPLED SYSTEMS OF FUZZY DELAY DIFFERENTIAL EQUATIONS

  • Wu, Yu-ting;Lan, Heng-you;Zhang, Fan
    • Nonlinear Functional Analysis and Applications
    • /
    • v.26 no.3
    • /
    • pp.513-530
    • /
    • 2021
  • The purpose of this paper is to introduce and study a class of coupled systems of fuzzy delay differential equations involving fuzzy initial values and fuzzy source functions of triangular type. We assume that these initial values and source functions are triangular fuzzy functions and define solutions of the coupled systems as a triangular fuzzy function matrix consisting of real functional matrices. The method of triangular fuzzy function, fractional steps and fuzzy terms separation are used to solve the problems. Furthermore, we prove existence and uniqueness of solution for the considered systems, and then a solution algorithm is proposed. Finally, we present an example to illustrate our main results and give some work that can be done later.

Analyzing the Impact of Value Satisfaction on Behavioral Intention to Use E-Resources

  • Kumar, Vinod;Garg, Ruchi Jain;Vandana, Vandana;Zia, Adil
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.3
    • /
    • pp.1-14
    • /
    • 2022
  • The present study investigates the impact of perceived value metrics in driving satisfaction and behavioral intention to use e-resource among its users. Utilitarian, hedonic, uniqueness, epistemic, and economic are key values selected for the purpose of investigation in the study. This empirical study is carried out through a survey and responses have been analyzed using structural equation modelling. The target group is selected by means of simple random sampling (users of e-resources in selected business schools). Findings of the study reveal that utilitarian values, hedonic values, epistemic values, and uniqueness values have a significant impact on the usage intention of e-resources; however, economic values reflect an insignificant relationship to intention to use e-resources. The study is a distinctive piece of work on investigating the most and the least significant value(s) associated with satisfaction and usage intentions of e-resources.

𝓗-SIMULATION FUNCTIONS AND Ωb-DISTANCE MAPPINGS IN THE SETTING OF Gb-METRIC SPACES AND APPLICATION

  • Tariq Qawasmeh
    • Nonlinear Functional Analysis and Applications
    • /
    • v.28 no.2
    • /
    • pp.557-570
    • /
    • 2023
  • The conceptions of generalized b-metric spaces or Gb-metric spaces and a generalized Ω-distance mappings play a key role in proving many important theorems in existence and uniqueness of fixed point theory. In this manuscript, we establish a new type of contraction namely, Ωb(𝓗, 𝜃, s)-contraction, this contraction based on the concept of a generalized Ω-distance mappings which established by Abodayeh et.al. in 2017 together with the concept of 𝓗-simulation functions which established by Bataihah et.al [10] in 2020. By utilizing this new notion we prove new results in existence and uniqueness of fixed point. On the other hand, examples and application were established to show the importance of our results.

THE NEUMANN PROBLEM FOR A CLASS OF COMPLEX HESSIAN QUOTIENT EQUATIONS

  • Yuying Qian;Qiang Tu;Chenyue Xue
    • Bulletin of the Korean Mathematical Society
    • /
    • v.61 no.4
    • /
    • pp.999-1017
    • /
    • 2024
  • In this paper, we study the Neumann problem for the complex Hessian quotient equation ${\frac{{\sigma}_k({\tau}{\Delta}uI+{\partial}{\bar{\partial}u)}}{{\sigma}_l({\tau}{\Delta}uI+{\partial}{\bar{\partial}u)}}}={\psi}$ with 0 ≤ 𝑙 < k ≤ n. We prove a priori estimate and global C1 estimates, in particular, we use the double normal second derivatives on the boundary to establish the global C2 estimates and prove the existence and the uniqueness for the Neumann problem of the above complex Hessian quotient equation.

SoC Virtual Platform with Secure Key Generation Module for Embedded Secure Devices

  • Seung-Ho Lim;Hyeok-Jin Lim;Seong-Cheon Park
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.116-130
    • /
    • 2024
  • In the Internet-of-Things (IoT) or blockchain-based network systems, secure keys may be stored in individual devices; thus, individual devices should protect data by performing secure operations on the data transmitted and received over networks. Typically, secure functions, such as a physical unclonable function (PUF) and fully homomorphic encryption (FHE), are useful for generating safe keys and distributing data in a network. However, to provide these functions in embedded devices for IoT or blockchain systems, proper inspection is required for designing and implementing embedded system-on-chip (SoC) modules through overhead and performance analysis. In this paper, a virtual platform (SoC VP) was developed that includes a secure key generation module with a PUF and FHE. The SoC VP platform was implemented using SystemC, which enables the execution and verification of various aspects of the secure key generation module at the electronic system level and analyzes the system-level execution time, memory footprint, and performance, such as randomness and uniqueness. We experimentally verified the secure key generation module, and estimated the execution of the PUF key and FHE encryption based on the unit time of each module.