• Title/Summary/Keyword: Multi-users

Search Result 1,454, Processing Time 0.031 seconds

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

Secure Broadcasting Using Multiple Antennas

  • Ekrem, Ersen;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.411-432
    • /
    • 2010
  • We consider three different secure broadcasting scenarios: i) Broadcast channels with common and confidential messages (BCC), ii) multi-receiver wiretap channels with public and confidential messages, and iii) compound wiretap channels. The BCC is a broadcast channel with two users, where in addition to the common message sent to both users, a private message, which needs to be kept hidden as much as possible from the other user, is sent to each user. In this model, each user treats the other user as an eavesdropper. The multi-receiver wiretap channel is a broadcast channel with two legitimate users and an external eavesdropper, where the transmitter sends a pair of public and confidential messages to each legitimate user. Although there is no secrecy concern about the public messages, the confidential messages need to be kept perfectly secret from the eavesdropper. The compound wiretap channel is a compound broadcast channel with a group of legitimate users and a group of eavesdroppers. In this model, the transmitter sends a common confidential message to the legitimate users, and this confidential message needs to be kept perfectly secret from all eavesdroppers. In this paper, we provide a survey of the existing information-theoretic results for these three forms of secure broadcasting problems, with a closer look at the Gaussian multiple-input multiple-output (MIMO) channel models. We also present the existing results for the more general discrete memoryless channel models, as they are often the first step in obtaining the capacity results for the corresponding Gaussian MIMO channel models.

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Kim, Bum-Sik
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.481-486
    • /
    • 2006
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and Implementation the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition its application becomes possible in the system requiring multi-users certifications.

  • PDF

Performance Estimation of Dual Frequency and Multi-Constellation Satellite Based Augmenation System for Korean Region (이중 주파수 및 다중 위성항법 광역보강시스템 한반도 지역 성능 예측)

  • Yun, Ho;Han, Deok-Hwa;Kee, Chang-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.396-403
    • /
    • 2013
  • Recently, GNSS users can utilize various navigation satellite thanks to GPS modernization, renewal of GLONASS, and development of Galileo and Beidou. And availability performance of users is expected to be improved because these new navigation satellites transmit L5 signal as well as L1 signal, and users can directly estimate the ionospheric delays. In accordance with these changes existing Satellite Based Augmentation System (SBAS) which considers only GPS L1 signal is being developed to support dual frequency and multi-constellation GNSS users. This paper describes the main features of dual-frequency, multi-constellation SBAS algorithms and estimates the performance in Korean region by simulation.

Constructing Negative Links from Multi-facet of Social Media

  • Li, Lin;Yan, YunYi;Jia, LiBin;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2484-2498
    • /
    • 2017
  • Various types of social media make the people share their personal experience in different ways. In some social networking sites. Some users post their reviews, some users can support these reviews with comments, and some users just rate the reviews as kind of support or not. Unfortunately, there is rare explicit negative comments towards other reviews. This means if there is a link between two users, it must be positive link. Apparently, the negative link is invisible in these social network. Or in other word, the negative links are redundant to positive links. In this work, we first discuss the feature extraction from social media data and propose new method to compute the distance between each pair of comments or reviews on social media. Then we investigate whether we can predict negative links via regression analysis when only positive links are manifested from social media data. In particular, we provide a principled way to mathematically incorporate multi-facet data in a novel framework, Constructing Negative Links, CsNL to predict negative links for discovering the hidden information. Additionally, we investigate the ways of solution to general negative link predication problems with CsNL and its extension. Experiments are performed on real-world data and results show that negative links is predictable with multi-facet of social media data by the proposed framework CsNL. Essentially, high prediction accuracy suggests that negative links are redundant to positive links. Further experiments are performed to evaluate coefficients on different kernels. The results show that user generated content dominates the prediction performance of CsNL.

Development of Wire-Wireless Integrated Web Messenger for Communication of users in a Multi-Organization (복수조직 구성원들의 상호통신을 위한 유무선 통합 웹 메신저 개발)

  • Cho, Migyung;Kim, Jungin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1181-1186
    • /
    • 2013
  • Mobile network has become an essential tool for mutual communications, so a survey research published that most of the smartphone users use Mobile Instant Messenger every day. In this paper, we developed a wire-wireless integrated web messenger that can be used in various platform of mobile devices and desktop computer for communicating between users of some companies. We defined a multi-organization as several independent companies. Our web messenger was developed for communicating of users of a multi-organization. So one of functions of our web messenger is to restrict access to some particular departments in each company for the security of their company. Developed web messenger worked reliably from variety of web browsers on most of platforms such as android, iOs and desktop computers.

Dynamic Reconfigurability of the aspect of software download in SDR (SDR시스템에서 소프트웨어 다운로드 측면에서의 동적 재구성(Dynamic Reconfigurability))

  • 서정민;이병호
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.422-425
    • /
    • 2003
  • Software reconfigurable radio will give future users a number of benefits like global roaming, multi mode, multi band, and multi standard. It will also offer complete programmability and reconfigurability to both multi mode and multi functional communication terminal and network nodes. This configuration will be implemented by application of different combination of radio configurable software. In this paper, It proposes the algorithm needed for reconfiguration with basic explanation of the software download. A description of an implementation such reconfiguration processes as partial download and full download and critical and non-critical download installation using the registration table in included.

  • PDF

Performance Analysis of the Multi-User Detector Employing a Hybrid Interference Cancellation Scheme in a WCDMA System (WCDMA 시스템에서 Hybrid Interference Cancellation 기법을 적용한 다중사용자 검파기의 성능분석)

  • 서정욱;오창헌;장은영;조성준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.221-227
    • /
    • 2002
  • In this paper, in order to know the effect of the interference, we have analyzed the BER (Bit Error Rate) performance of the MUD(Multi-User Detector) employing HIC(Hybrid Interference Cancellation) scheme for the asynchronous WCDMA system based on 3GPP(3rd Generation Partnership Project) Spec. through the In this paper, in order to know the effect of the interference, we have analyzed the BER (Bit Error Rate) performance of the MUD(Multi-User Detector) employing HIC(Hybrid Interference Cancellation) scheme for the asynchronous WCDMA system based on 3GPP(3rd Generation Partnership Project) Spec. through the computer simulation. we have assumed Rayleigh fading channel. And we have compared its BER performance with SIC's(Successive Interference Cancellation) and with PIC's(Parallel Interference Cancellation), which are the representative schemes in the subtractive interference cancellation. From the results, it is shown that PlC or HIC is effective for high data-rate users and SIC of HIC for low data-rate users to eliminate the interference. Regardless of the data rate, it is reasonable to use the HIC structure for WCDMA system to satisfy all of users' services. The reason is that the SIC scheme in front of HIC can guarantee the performance of low power users to cancel the serious interference caused by the high power users, while PIC in the rear of it can guarantee the performance of high power users to cancel the interference caused by the low power users.

Multi-dimensional Trust Building Process to Explain Customer Satisfaction on e-Commerce

  • Choi, Jae-Won;Sohn, Chang-Soo;Lee, Hong-Joo
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.571-576
    • /
    • 2007
  • Advanced online environment and communication technology have made the e-commerce environments evolved rapidly. In the e-commerce area, one of the most important concepts regarding the relationship between seller and buyer is the "trust." Considering the purpose of purchase and satisfaction of website, the users may face problems such as consumer's transaction security or personal information sharing when they make transactions over web sites. It could be difficult to pursue the goal for the users to purchase product or service over online if the seller or service provider cannot establish trust to the customers. In this paper, through multi-dimensional viewpoints of trust, satisfaction can be accounted for by cue-based trust and experienced trust. The purchase intention mediates the experienced trust when online users purchase products or use online service.

  • PDF