• Title/Summary/Keyword: New Address Information

Search Result 682, Processing Time 0.034 seconds

Hyper-encryption Scheme for Data Confidentiality in Wireless Broadband (WiBro) Networks

  • Hamid, Abdul;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1096-1097
    • /
    • 2007
  • We address the data confidentiality for wireless broadband (WiBro) networks. In WiBro, as the channel is wireless in nature, it suffers from passive and active attack. Passive attack, for example is to decrypt traffic based on statistical analysis and active attack is to modify traffic or inject new traffic from unauthorized mobile stations. Due to high mobility, frequent session key distribution is a bottleneck for the mobile stations. In aspect of WiBro, there is a communication between mobile station to base station, and also in mobile station to mobile station. It is expected to ensure data confidentiality while maintaining minimum overhead for the resource constrained mobile stations. In this paper, we proposed a security framework based on the concept of hyper-encryption to provide data confidentiality for wireless broadband networks.

  • PDF

Client Technology on a Server for Mobile Cloud

  • Nguyen, Tien-Dung;Biao, Song;Wei, Tang;Lee, Jun-Hyung;Huh, Eui-Nam
    • Information and Communications Magazine
    • /
    • v.28 no.10
    • /
    • pp.3-10
    • /
    • 2011
  • The increasing ubiquity of wireless networks and decreasing cost of hardware is fueling a proliferation of mobile devices. These devices are enabling a new revolution in mobile technology, not only running locally on them, but running on cloud as a service as well. From web browsing, email, or video conferencing, presentations to movie and music entertainment or games, multimedia applications, mobile cloud enables providing such diverse applications. Many technologies have been designed to address the limited hardware and performance in thin client PC. However, with the assorted network and graphic condition, those proposed technologies is obligated to alter aim to adapt mobile cloud. In this paper, we provide a survey of client technology on a Server that can be sufficed the requirements of Mobile Cloud. We also analyze each technology and classify with its individual difficulties and challenges.

A Single Server-based Secure Electronic Sealed-Bid Auction Method (단일 서버 기반의 안전한 봉인경매 기법)

  • Lee, Keon-Myung;Kim, Dong-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.6
    • /
    • pp.678-686
    • /
    • 2004
  • This paper presents a new method to securely conduct online sealed-bid auctions with a single auctioneer server The sealed-bid auctions have several vulnerable security problems when they are performed on the Internet. One of such problems is the trust establishment between an auctioneer and bidders who participate in an auction. Several online sealed-bid auction methods have been developed to address this trust problem. The proposed method solves the security problems that would happen in the sealed-bid auction using a blind signature scheme and a contract signature protocol. It prevents the auctioneer from illegally manipulating the bidders' bidding information, repudiating the reception of some bid, manipulating the auction period, and illegally adding or deleting bids. In addition, it keeps the bidders from modifying the bidding information after issuing their bid and doing intentional mistake to invalidate their own bid. The method can be easily implemented using the multiagent architecture.

Probabilistic real-time updating for geotechnical properties evaluation

  • Ng, Iok-Tong;Yuen, Ka-Veng;Dong, Le
    • Structural Engineering and Mechanics
    • /
    • v.54 no.2
    • /
    • pp.363-378
    • /
    • 2015
  • Estimation of geotechnical properties is an essential but challenging task since they are major components governing the safety and reliability of the entire structural system. However, due to time and budget constraints, reliable geotechnical properties estimation using traditional site characterization approach is difficult. In view of this, an alternative efficient and cost effective approach to address the overall uncertainty is necessary to facilitate an economical, safe and reliable geotechnical design. In this paper a probabilistic approach is proposed for real-time updating by incorporating new geotechnical information from the underlying project site. The updated model obtained from the proposed method is advantageous because it incorporates information from both existing database and the site of concern. An application using real data from a site in Hong Kong will be presented to demonstrate the proposed method.

Hybrid DCT/DFflWavelet Architecture Based on Jacket Matrix

  • Chen, Zhu;Lee, Moon-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.281-282
    • /
    • 2007
  • We address a new representation of DCT/DFT/Wavelet matrices via one hybrid architecture. Based on an element inverse matrix factorization algorithm, we show that the OCT, OFT and Wavelet which based on Haar matrix have the similarrecursive computational pattern, all of them can be decomposed to one orthogonal character matrix and a special sparse matrix. The special sparse matrix belongs to Jacket matrix, whose inverse can be from element-wise inverse or block-wise inverse. Based on this trait, we can develop a hybrid architecture.

  • PDF

Series Resonant type Sustain Driver for improving efficiency of PDP (PDP 효율개선을 위한 직렬공진형 Sustain 드라이버)

  • Kang, Feel-Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.250-253
    • /
    • 2007
  • This paper presents a new sustain driver employing energy recovery function to minimize power losses transpired during the operation of plasma display panel. The proposed circuit uses the resonance between the equivalent capacitance of panel and an external inductor to provide/recover energy to/from the panel. The proposed circuit can save the system cost compared with the conventional one, and has high-performance in energy recovery. To verify the validity of the proposed circuit, we implemented experiments based on 7.5 inch AC-PDP.

  • PDF

Design and Implementation of Road Manager System For New Address Grant (새주소 부여를 위한 도로 관리 시스템의 설계 및 구현)

  • 진민식;정민수;김도우;정준영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04b
    • /
    • pp.102-104
    • /
    • 2000
  • 우리나라의 지번체계는 인구증가와 경제발전에 따른 도시의 팽창과 각종 개발사업에 따른 토지의 등록, 분할 및 합병 등이 빈번하게 발생함에 따라서 불규칙하고 불합리하게 지번이 부여되어 왔다. 이에 따라 선진국과 같은 체계적이고, 합리적인 주소체계의 필요성이 꾸준히 대두되어 왔으며 정확성, 일관성, 유통성, 경제성, 검색성 등의 여러 가지 특성을 갖출 수 있는 도로방식에 의한 도로명과 건물번호를 체계적으로 부여하는 새로운 주소체계를 도입하기로 하였다. 이러한 이유로 필요성이 높아지고 있는 새주소 관리 시스템은 크게 4개의 부시스템으로 나누어지는데 본 논문에서는 이러한 4개의 부시스템 중에서 도로 관리 시스템 대하여 새주소 부여 체계와 원칙에 따라 설계하고 MAPINFO 와 MAPBASIC 언어를 이용하여 구현한다.

  • PDF

Realistic Visual Simulation of Water Effects in Response to Human Motion using a Depth Camera

  • Kim, Jong-Hyun;Lee, Jung;Kim, Chang-Hun;Kim, Sun-Jeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1019-1031
    • /
    • 2017
  • In this study, we propose a new method for simulating water responding to human motion. Motion data obtained from motion-capture devices are represented as a jointed skeleton, which interacts with the velocity field in the water simulation. To integrate the motion data into the water simulation space, it is necessary to establish a mapping relationship between two fields with different properties. However, there can be severe numerical instability if the mapping breaks down, with the realism of the human-water interaction being adversely affected. To address this problem, our method extends the joint velocity mapped to each grid point to neighboring nodes. We refine these extended velocities to enable increased robustness in the water solver. Our experimental results demonstrate that water animation can be made to respond to human motions such as walking and jumping.

Cryptographically-Generated Virtual Credit Card Number for Secure Card-Not-Present Transactions

  • Park, Chan-Ho;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1864-1876
    • /
    • 2016
  • Card-Not-Present (CNP) transactions taking place remotely over the Internet are becoming more prevalent. Cardholder authentication should be provided to prevent the CNP fraud resulting from the theft of stored credit card numbers. To address the security problems associated with CNP transactions, the use of a virtual card number derived from the transaction details for the payment has been proposed, instead of the real card number. Since all of the virtual card number schemes proposed so far are based on a password shared between the cardholder and card issuer, transaction disputes due to the malicious behavior of one of the parties involved in the transaction cannot be resolved. In this paper, a new virtual card number scheme is proposed, which is associated with the cardholder's public key for signature verification. It provides strong cardholder authentication and non-repudiation of the transaction without deploying a public-key infrastructure, so that the transaction dispute can be easily resolved. The proposed scheme is analyzed in terms of its security and usability, and compared with the previously proposed schemes.

Review of Vendor Managed Inventory: Investigation on How It Improves Supply Chain Performance

  • Ryu, Chung-Suk
    • Journal of Distribution Science
    • /
    • v.14 no.9
    • /
    • pp.47-64
    • /
    • 2016
  • Purpose - This study reviews the past studies that have researched Vendor Managed Inventory (VMI) as a well-known supply chain collaboration program. The main goals of this study are to figure out how VMI brings significant benefits to the supply chain system and suggest additional areas that future studies would address to discover the true nature of VMI. Research design, data, methodology - This study conducts literature reviews on numerous studies that have researched VMI. The past studies are classified in terms of several main issues that have been commonly addressed by many researchers. This study also identifies three key collaborative features of VMI, which possibly explain why VMI improves the supply chain performance. Results - This study finds out that most past studies focused on a limited research issues about VMI. Many researchers have considered integrated decision making and information sharing to be key features that enables VMI to improve the supply chain performance. Conclusions - Based on the findings from the literature review, this study suggests that future studies on VMI take account of new research issues and pay attention to cost payment that researchers have rarely addressed.