• Title/Summary/Keyword: Private key

Search Result 686, Processing Time 0.029 seconds

A Study of Suppliers' Participation in Private Exchanges: Focusing on MRO Markets (MRO 시장에서의 공급자의 전용마켓 참여에 관한 연구)

  • Lim, Seong-bae;Kim, Sung-Kwan;Mitchell, Robert B.;Hong, Soon-Goo
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.4
    • /
    • pp.37-51
    • /
    • 2004
  • Many B2B electronic markets (EMs) are struggling to survive because they failed to attract enough participants. Thus reaching critical mass of participants is one of the key success factors for various types of EMs. The main purpose of this study is to investigate factors that lead MRO (maintenance, repair, and operating) suppliers to participate in private exchanges (PE), the buy-side EM. This paper introduces the characteristics of the PE according to the classification schemes introduced in previous studies about EM types. Literature is reviewed on suppliers' adoption of inter-organizational information systems focusing on EDI adoptions issues. Data analysis based on incomplete contract theory and the social exchange theory is then presented. The results of this study show that the number of suppliers and subsidy are factors that influence suppliers' participation in PEs. Nonsignificant results relating to trust imply that suppliers who are invited to participate in a PE do not expect their off-line relationships with the buyer to be transferred to the PE.

  • PDF

Characteristics of Spatial Environment in Psychiatric Wards through the Analysis by Patient's Preferred Healing Environment in Observational Ward Structure Dividing Staff Area and Patient Area (정신요양 병동에서의 관리영역과 환자의 요양 공간영역의 관찰적 시선에 따른 병동구조와 요양 공간환경의 특성에 관한 연구)

  • Joo, Yongsun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.27 no.2
    • /
    • pp.57-64
    • /
    • 2021
  • Purpose: The relationship between the staff area and the patient's private area is the key factor in designing the structure and the environmental characteristics of ward spaces in a psychiatric hospital. Recent research has found that for the purpose of treatment and securing privacy, psychiatric patients need to be in an open space of relief rather than closed confined environment and under the watch of nursing staffs. Methods: A survey at three kinds of wards in a private psychiatric hospital in Japan was conducted in October 2002. These wards include an acute ward, a psychiatric convalescence ward, and a stress care ward. All three kinds of wards have the same structure. At each ward, spatial preferences of the 145 psychiatric inpatients were surveyed and data concerning the patient's diagnostic category, symptoms, and activities of daily living were recorded. Results: The patients in the stress care ward prefer to stay in private spaces than public spaces. On the other hand, in the acute ward the patients seem to have a preference between managed public spaces where are monitored by nursing staffs and their private rooms where the nurse station is close. In addition, the patients in the psychiatric convalescence ward spend most of their time in the public space, such as the hallways or the day room. Implications: Base on this research, the spaces at the acute ward that could be monitored by the nursing station serves effectively as a safety space for patients was concluded. However, in the stress care ward, the patients may perceive the monitoring by the nursing staff as interruption or nuisance to their relaxation. In order to design an ideal healing environment for psychiatric patients in psychiatric ward, it is important to consider how environmental characteristics of space affect the environmental sense of patients in each ward.

Construction of an Asymmetric Traitor Tracing Schemes with Anonymity (익명성을 보장하는 비대칭 공모자 추적 기법의 설계)

  • Lee, Moonsik;Kang, SunBu;Lee, Juhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1231-1242
    • /
    • 2012
  • Traitor tracing schemes deter traitors from sharing their private keys by tracing at least one of the subscribers who were implicated in the construction of a pirate decoder. In general, it is assumed that the system manager in the scheme generates and distributes the subscribers' private key. But if the system manager knows the subscribers' private keys, he cannot convince a third party of a certain subscriber's piracy. To solve this problem, the system manager should not know the whole parts of subscribers' private keys and this leads to researches of asymmetric schemes. Moreover for the purpose of enhancing subscribers' privacy, there were two proposals of introducing anonymity onto asymmetric traitor tracing schemes, but one of them turned out to be a failure. In this paper, we point out that the other proposal also has flaws. We consider how to introduce anonymity to traitor tracing schemes, as a result, we suggest a new framework which is practical. We also construct a scheme by using an anonymous credential system and an asymmetric traitor tracing scheme. We prove the security of our scheme and consider the typical applications.

Development of China's water public-private partnership and the growth of Chinese water players (중국 물산업 민관협력사업(PPP) 발전과정과 중국 물기업의 성장요인 분석에 관한 연구)

  • Oh, Jihye
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.3
    • /
    • pp.217-227
    • /
    • 2022
  • Since China adopted Public-Private Partnerships (PPPs) in the water sector in the early 1990s, PPPs have played a key role in improving infrastructure development in China. As the Chinese water market became one of the most enormous and potential existing in the world, once a water player settles down in the market, the company tends to be the world-leading water player on the basis of the number of people served from water infrastructure. Unlike the early PPP period overwhelmed by several water transnational corporations, local water players began to dominate the domestic market and have recently expanded their influence overseas. The Chinese government has continuously intervened to promote private sector participation of local water players in the PPP development process in legal and institutional aspects. Thus this article examined the development of water PPPs in China and analyzed the successful elements of local water players' growth related to the government policy.

Analysis of Public-private Governance Based on the Cooperative Governance Model: A Case of Urban Parks in Cheongju (협력적 거버넌스 모형을 통한 민관거버넌스의 성과 분석: 청주시 도시공원 사례를 중심으로)

  • Kim, Young Bae
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.403-415
    • /
    • 2022
  • This study aims to analyze the performance of public-private governance of urban parks in Cheongju-city, focusing on the 'cooperative governance' model of Ansell & Gash(2007) and find implications. The performance and limitations of the governance were analyzed using 13 success factors suggested by this model. According to the results of the analysis, four categories are satisfied: initial conditions, institutional design, leadership, and cooperation process. 8 out of 13 factors were analyzed at a 'good' level and thus this governance can be evaluated as successful one. Building trust and committed collaboration can be seen as key elements of successful governance. On the other hand, 5 factors were evaluated as 'average' because some limitations were revealed. The results of this analysis suggests that in order to improve cooperative governance, a post-implementation management system should prepared, and the inclusiveness of participation should further strengthened, and also regulations that ensure a regular forum for indirect participants and the public from the institutional design stage should be established. Although this study was analyzed based on the evaluation category of the objectively verified model, there is a limitation in that the evaluation was based on subjective judgment.

The Influence of Manufacturer and Retailer Trust on the Private Brand Purchase (유통업체와 제조업체에 대한 신뢰가 유통업체 브랜드의 구매의도에 미치는 영향에 관한 연구)

  • Yoo, Hyeon-Mi;Park, Jong-Chul;Kim, Jae-Wook
    • Journal of Distribution Research
    • /
    • v.13 no.2
    • /
    • pp.97-123
    • /
    • 2008
  • Recently, there has been a growing trend toward private brand. Although much has been written about the determinants of attitude and purchase intention on PB, little is known about the influence of manufacturer and retailer trust on private brand purchase. This research addresses three questions:(1) what impact do manufacturer and retailer trust have on private brand purchase?(2) What is a key mediating variable in the relationship retailer between trust(on retailer/manufacture) and purchase intention?(3) Are the impacts of these factors differ depending on the level of customer knowledge? The findings indicate that retailer trust directly influence on the perceived quality, attitude toward private brand, and purchase intention. Manufacturer trust affects on attitude and purchase intention, however, only when it is through perceived quality. In addition, the relative impact of theses two factors differs to some extent, depending on the level of consumer knowledge. When customer knowledge is relatively high, retailer trust is a very important factor influencing perceived quality, attitude and purchase intention. On the other hand, both retailer trust and manufacturer trust are considered when customer knowledge on private brand is low.

  • PDF

A design of Giga-bit security module using Fully pipe-lined CTR-AES (Full-pipelined CTR-AES를 이용한 Giga-bit 보안모듈 설계)

  • Vinh, T.Q.;Park, Ju-Hyun;Kim, Young-Chul;Kim, Kwang-Ok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1026-1031
    • /
    • 2008
  • Nowdays, homes and small businesses rely more and more PON(Passive Optical Networks) for financial transactions, private communications and even telemedicine. Thus, encryption for these data transactions is very essential due to the multicast nature of the PON In this parer, we presented our implementation of a counter mode AES based on Virtex4 FPGA. Our design exploits three advanced features; 1) Composite field arithmetic SubByte, 2) efficient MixColumn transformation 3) and on-the-fly key-scheduling for fully pipelined architecture. By pipeling the composite field implementation of the S-box, the area cost is reduced to average 17 percent. By designing the on-the-fly key-scheduling, we implemented an efficient key-expander module which is specialized for a pipelined architecture.

A Post-Quantum Multi-Signature Scheme (양자 컴퓨팅 환경에서 안전한 다중 서명 기법)

  • Ko, Chanyoung;Lee, Youngkyung;Lee, Kwangsu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.517-526
    • /
    • 2021
  • Recently, the acceleration of the development of quantum computers has raised the issue of the safety of factorization and discrete logarithm based digital signature schemes used in existing Internet environments. To solve the issue, several digital signature schemes are presented that are safe in post-quantum computing environments, including standardization work by the National Institute of Standards and Technology(NIST). In this paper, we design and present a multi-signature scheme based on the TACHYON announced by Behnia et al. in 2018 CCS conference, and prove the security. Multi-signature schemes are key techniques that can distribute the dependence of cryptocurrency-wallet on private keys in the cryptocurrency field, which has recently received much attention as an digital signature application, and many researchers and developers have recently been interested. The multi-signature scheme presented in this paper enables public key aggregation in a plain public key model, which does not require additional zero-knowledge proof, and can construct an effective scheme with only an aggregated public key.

Design and Implementation of Certification Protocol Considered on Security of Private Key (비밀키 안전성을 고려한 인증 프로토콜 설계 및 구현)

  • 박소희;김춘길;김순자
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.67-82
    • /
    • 1998
  • 컴퓨터 통신망과 인터넷의 발달로 등장한 전자상거래는 안전성과 신뢰성이 보장되어야 한다. 이를 위해, 본 논문에서는 기존의 인증기관과 전자지갑을 기능별 구조로 고찰한뒤 비밀키의 안전도를 개선할 수 있는 전자상거래에서의 인증 프로토콜을 제안하고 구현한다. 제안한 인증 프로토콜은 사용자의 공개키/비밀키 쌍을 전자지갑이 직접 생성하고 인증기관은 사용자의 공개키만을 전자서명하도록 함으로써 전자상거래 시스템에서 사용자 비밀키에 더 높은 안전성과 신뢰성을 제공한다. 또한, 공개키 암호시스템으로는 키 길이와 메모리 면에서 효율적인 타원곡선 암호시스템을 사용한다.

  • PDF

Implementation of SEED Using Java Card API (자바 카드 API를 이용한 SEED 알고리즘 구현)

  • 채철주;이성현;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.283-288
    • /
    • 2004
  • Authentication and digital signature make secured existing contract in remote spot. But, It required method of storing and managing secret, such as private key password. For this method, we make efforts solution of security with smart cart, such as java card. This paper implement SEED algorithm based on Java Card

  • PDF