• Title/Summary/Keyword: User Distribution

Search Result 1,125, Processing Time 0.024 seconds

A Secure Quantum-Resistant Authentication and Key Distribution Protocol for NFC Payment Environments (NFC 결제 환경에서 양자 컴퓨팅에 안전한 인증 및 키 분배 프로토콜)

  • Kim, JongHyun;Park, KiSung;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.4
    • /
    • pp.485-492
    • /
    • 2018
  • Recently, the numerous authentication and key distribution protocol for NFC payment environment have been proposed using public key cryptosystems. However, these protocol are vulnerable to quantum computing attack because quantum computing can solve factoring and discrete logarithm problem effectively using Grover and Shor's algorithm. For these reason, the secure authentication and key distribution have become a very important security issue in order to prevent quantum computing attacks. Therefore, to ensure user's payment information and privacy, we propose a secure quantum resistant authentication and key distribution protocol for NFC payment environments.

A Study on Computer Application Program to an Efficient Supervisory Control of the Power Distribution System (효율적인 배전관리를 위한 컴퓨터 응용 프로그램 연구)

  • Lee, B.C.;Seo, Y.R.;Lee, J.H.;Chung, C.H.
    • Proceedings of the KIEE Conference
    • /
    • 1993.07a
    • /
    • pp.96-98
    • /
    • 1993
  • In accordance with increase of electrical power demanded, more efficient supervisory control of distribution system is required. This study contains development of MMI(man-machine-interface) system with GUI(graphic-user-interface), for the automatic power distribution system. The main function of MMI system are to edit network of power distribution, to view network, to warnning a breakdown and to management of data base for network. The GUI function of MMI system enables more efficient management of power distribution system.

  • PDF

Optimizing Distribution Channels: How Digital Marketing Communication Enhances Trust and Loyalty in Indonesian Banking

  • Muhammad Diast REYHANRAFIF;La MANI;Astika Prima NITULAR;Hendra CRISWANTO;Irmawan RAHYADI
    • Journal of Distribution Science
    • /
    • v.22 no.8
    • /
    • pp.1-15
    • /
    • 2024
  • Purpose: This study explored how Indonesian banks utilize digital marketing communication strategies to optimize their distribution channels, leading to enhanced customer trust and brand loyalty. It examined specific methods such as sponsorships, social media, institutional partnerships, and mobile banking application features as key components of this digital distribution strategy. Research Design, Data, and Methodology: This study employed mixed methods design to assess digital distribution impacts. It involved 385 Jakarta bank customers. The sample size was determined using the Lemeshow formula. Results: The findings indicate that effective digital distribution strategies, including sponsorships, social media engagement, and user-friendly mobile banking applications, significantly enhance customer trust and loyalty. However, overly complex features may negatively impact loyalty. Conclusion: Thisstudy demonstrates a clear connection between the strategic use of digital marketing channels, such as sponsorships, social media, institutional partnerships, and mobile banking features, and the development of customer trust and loyalty. The results provide valuable insights to Indonesian banks in designing digital distribution strategies that prioritize building trust and fostering integrated customer interactions. Tailored digital marketing approachesthat optimize distribution can significantly enhance both trust and loyalty among Indonesian bank customers.

The Design and Implementation of Intranet Administrator and User Application (인트라넷 관리자 및 사용자 응용의 설계 및 구현)

  • Shin, Myung-Ki;Hahm, Jin-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.1005-1013
    • /
    • 1998
  • In this paper, we describe technologies of Intranet administrator and user application used in the PEC(Protocol Engineering Center) Office Intranet system which provides platform independent application framework using Internet/Intranet standard technologies for distribution of Web documents and real-time multimedia information. The PEC Office is composed of administrator applications to support environments for administration of all applications including group/user add, update, and delete facilities and construction of user directory and user applications to support schedule sharing, virtual library, job report, output management, budget management, and real-time audio/video broadcasting services. These applications allow differentiation and customization services according to department and title employed per users.

  • PDF

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

Factors Influencing Customers to Use Digital Banking Application in Yogyakarta, Indonesia

  • MUFARIH, Muhammad;JAYADI, Riyanto;SUGANDI, Yovin
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.897-907
    • /
    • 2020
  • The development of information technology and the demands of society on an application in an operating system, as well as increasing the specifications and sophistication of smartphones, require banks to make changes to their mobile banking applications. The transformation of the mobile banking application into a digital banking application conducted by banks has made users re-evaluate based on their preferences. This study presents the behavior of users of digital banking applications in Yogyakarta, Indonesia. The hypothesis model is based on Technology Acceptance Model (TAM) with additional factors of the social image, perceived risk and perceived trust adopted from Muñoz-Leiva et al. (2017). The methodology in this study includes data collection through questionnaires distributed online and data analysis using the Structural Equation Model. The results of this study illustrate that the perceived trust and perceived risk have a more dominant part in influencing user attitude and user intention to use digital banking. Meanwhile, social image, perceived ease-of-use and perceived usefulness are not significant in influencing user attitude and user intention to use digital banking. The implication of this research helps to determine the right communication and strategy so that more users with more benefits can utilize this digital banking application.

A Study of the Influencing Factors on the User Satisfaction for the UCI Digital Identifier System (UCI 디지털식별체계시스템의 사용자만족에 영향을 미치는 요인에 관한 연구)

  • Lim, Gyoo-Gun;Kim, Jae-Hun;Baek, Seung-Ik;Park, Seung-Bum
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.197-218
    • /
    • 2010
  • Korean Government has invested a lot of efforts on digital contents industry. It believes that the digital contents industry enables Korea to regain the reputation of the most powerful IT country. Among its various efforts to promote the digital contents industry, a Digital Contents Identifier System, called UCI(Universal Contents Identifier), has been developed and deployed. UCI has provided a critical infrastructure for digital contents production and distribution. Thanks to Korean Government's efforts, users (companies and individuals) have currently registered 3.8 million digital contents through 25 RA organizations. Although the number of registered contents has been increased rapidly, many organizations hesitate to adopt the UCI system due to the lack of visible and short-term returns from the UCI system. Thus, this research tries to explore factors which affect UCI user satisfaction. This research finds that user's awareness, information quality, and service quality are the critical influencing factors toward UCI user satisfaction. In addition, this research finds that the critical influencing factors in public organizations are different from the critical influencing factors in private organizations. These findings hopefully provide useful guidelines for disseminating the UCI system widely.

A study on Real-time Graphic User Interface for Hidden Target Segmentation (은닉표적의 분할을 위한 실시간 Graphic User Interface 구현에 관한 연구)

  • Yeom, Seokwon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.2
    • /
    • pp.67-70
    • /
    • 2016
  • This paper discusses a graphic user interface(GUI) for the concealed target segmentation. The human subject hiding a metal gun is captured by the passive millimeter wave(MMW) imaging system. The imaging system operates on the regime of 8 mm wavelength. The MMW image is analyzed by the multi-level segmentation to segment and identify a concealed weapon under clothing. The histogram of the passive MMW image is modeled with the Gaussian mixture distribution. LBG vector quantization(VQ) and expectation and maximization(EM) algorithms are sequentially applied to segment the body and the object area. In the experiment, the GUI is implemented by the MFC(Microsoft Foundation Class) and the OpenCV(Computer Vision) libraries and tested in real-time showing the efficiency of the system.

A Study on Personalized Recommendation Method Based on Contents Using Activity and Location Information (이용자 이용행위 및 콘텐츠 위치정보에 기반한 개인화 추천방법에 관한 연구)

  • Kim, Yong;Kim, Mun-Seok;Kim, Yoon-Beom;Park, Jae-Hong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.81-105
    • /
    • 2009
  • In this paper, we propose user contents using behavior and location information on contents on various channels, such as web, IPTV, for contents distribution. With methods to build user and contents profiles, contents using behavior as an implicit user feedback was applied into machine learning procedure for updating user profiles and contents preference. In machine learning procedure, contents-based and collaborative filtering methods were used to analyze user's contents preference. This study proposes contents location information on web sites for final recommendation contents as well. Finally, we refer to a generalized recommender system for personalization. With those methods, more effective and accurate recommendation service can be possible.

A Study on USIM Card Based User and Device Authentication Scheme in the Smartwork (USIM을 활용한 스마트워크 사용자 및 디바이스 인증 기술 연구)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.309-317
    • /
    • 2013
  • As the distribution rate of smart device increases, users of smartwork are increasingly able to work without constraints imposed by time and space. However, there are many security threats in smartwork environment. Security threats is illegal information for an unauthenticated device. Especially, smartwork environment is approach to users. Therefore, there are other matters concerning justifiable user and device authentication. However, the studies of smartwork are still in early stage of development, and the studies of user and device authentication also not enough to apply smartwork environment. In this paper, we proposed USIM based user and device authentication scheme in the smartwork environment.