• Title/Summary/Keyword: authenticated data structure

Search Result 9, Processing Time 0.026 seconds

A Study on Standard and Tendency of Landscape Housing -Focused on the Rural Landscape Authenticated Housing of Chuncheon City, Gangwon Province- (경관주택의 선정기준과 성향에 관한 연구 -강원도 춘천시 농촌경관인증주택을 중심으로-)

  • Sim, Jae-Hack;Yoon, Young-Hwal;Choi, Jang-Soon
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.11 no.3
    • /
    • pp.19-28
    • /
    • 2009
  • This research aimed at showing an improvement direction in the future by analyzing the tendency to select a rural landscape housing and the characteristics centering around the data of the landscape-authenticated housing executed in Chuncheon City from 2005 to 2008. For 4 years, 25 houses in all were authenticated by Chuncheon City after being selected as landscape housing. As the result of analyzing the authenticated 25 housing, lots of landscape houses were located in natural green areas, and small-scale houses of $99m^2$ or less in the house size were preferred. The structures introducing the nature-friendly materials such as wood, yellow earth and clay continued to increase in the house structure. And in the selection of the authenticated houses, the landscape architecture and the harmony with the surrounding environment had a big effect on the selection.

  • PDF

Design of Home Network Security System (홈 네트워크 보안시스템 설계)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.193-194
    • /
    • 2006
  • In this paper, the SPINS, a sensor network security mechanism, was researched to design a system to be applied to home network structure and check the security of which degree was ensured by a virtual network of home networking middleware. Sensor Network security mechanism SPINS provides data confidentiality and authentication by SNEP, and provides authenticated broadcast by ${\mu}TESLA$. We designed the system that applied SPINS to home networking middleware basic structure.

  • PDF

A SAML based SSO method in RIA environment (RIA환경에서 SAML을 이용한 SSO에 관한 연구)

  • Cho, Dong-Il;Rhew, Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.809-816
    • /
    • 2009
  • Current SSO has focused on authenticated integration between inter systems in a domain.On the contrary, becasuse SSO using SAML can support integration between different domains, once it is used in RIA, we can expect highly synergic effect. However, because researches on SSO using SAML are mainly those on authenticated information exchange between servers, a special research is needed in order to be applied in RIA environment, which conducts numerous managements in client. This study proposes architecture and explain a practice structure in order to apply SAML to RIA. Also, this study has embodied the proposed architecture and applied it on DWR, which is used mostly as Data communication framework of RIA, and verified the useablity of this architecture.

A Design of XML Structure for Digital Signature (디지털 서명을 위한 XML 구조 설계)

  • 표성배
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.66-74
    • /
    • 2002
  • Circulation of documents and data has two serious problems in this web-based system. The first of the problems is standardization problem which the flowing documents and data are not always standardized. the other is security problem which secret data can be hacked or cracked, and non-authenticated Person can access and change the contents with malicious intent. Therefore two issues come out on the web-based system, the first is how we can standardize the documents and data and the second is how we can assure safe flowing of them. One way of the standardizing methods is Mark-UP language which uses XML which is extended from SGML to redefine and use documents. And to ensure security of flowing documents we adopt digital signature system using public key and private key The focus of this study is to specify procedures for digital signature on the XML base. and to design XML components for the digital signature to assure information security in circulation of documents and data.

  • PDF

Policy-Based Identity Authentication and Transmission Architecture for Highly Reliable Emergency Bio-Data Management in Wireless Mesh Network for U-Healthcare (U-헬스케어를 위한 무선 매쉬 네트워크에서 고 신뢰성 있는 응급 생체 데이터 관리를 위한 정책기반의 신원 인증 및 전송 구조)

  • Chun, Seung-Man;Woo, Yeung-Kyung;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.21-29
    • /
    • 2013
  • This paper proposed the architecture of the authentication and the transmission for high reliable emergency data management based on U-healthcare wireless mesh networks. In U-healthcare monitoring service, the high reliable bio data management as well as the data transmission are required because the monitoring emergency bio data is related linked to life. More specifically, the technologies of the identity authentication of the measuring bio data, the personalized emergency status diagnosis who is authenticated the bio data and the emergency data transmission are important first of all. To do this, this paper presents the structure and protocol of the identity authentication management with using the extended IEEE 11073 PHD, the structure of policy-based management of the emergency bio data for the highly reliable management and the resilient routing protocol based on wireless mesh network for the reliable data transmission.

Effect of Mo-doped LiFePO4 Positive Electrode Material for Lithium Batteries

  • Oh, Seung-Min;Sun, Yang-Kook
    • Journal of Electrochemical Science and Technology
    • /
    • v.3 no.4
    • /
    • pp.172-177
    • /
    • 2012
  • Mo-doped $LiFePO_4$ was synthesized via co-precipitation method using sucrose as the carbon source. Structure, surface morphology, and the electrochemical properties of the synthesized olivine compounds were investigated using Rietveld refinement of X-ray diffraction data (XRD), scanning electron microscopy (SEM), and electrochemical charge-ischarge tests. Spherical morphology with the particle size of ${\sim}8{\mu}m$ authenticated the enhanced tap density and volumetric energy density of the synthesized materials. Charge-discharge behavior of $LiFePO_4$ and Mo-doped $LiFePO_4$ cells demonstrated a specific capacity of 130 and 145 mAh $g^{-1}$, respectively. Mo-doped $LiFePO_4$ cells exhibited an excellent discharge capacity at 96 mAh $g^{-1}$ at 7 C-rate.

Efficient Authentication of Aggregation Queries for Outsourced Databases (아웃소싱 데이터베이스에서 집계 질의를 위한 효율적인 인증 기법)

  • Shin, Jongmin;Shim, Kyuseok
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.703-709
    • /
    • 2017
  • Outsourcing databases is to offload storage and computationally intensive tasks to the third party server. Therefore, data owners can manage big data, and handle queries from clients, without building a costly infrastructure. However, because of the insecurity of network systems, the third-party server may be untrusted, thus the query results from the server may be tampered with. This problem has motivated significant research efforts on authenticating various queries such as range query, kNN query, function query, etc. Although aggregation queries play a key role in analyzing big data, authenticating aggregation queries has not been extensively studied, and the previous works are not efficient for data with high dimension or a large number of distinct values. In this paper, we propose the AMR-tree that is a data structure, applied to authenticate aggregation queries. We also propose an efficient proof construction method and a verification method with the AMR-tree. Furthermore, we validate the performance of the proposed algorithm by conducting various experiments through changing parameters such as the number of distinct values, the number of records, and the dimension of data.

Authenticated Handoff with Low Latency and Traffic Management in WLAN (무선랜에서 낮은 지연 특성을 가지는 인증유지 핸드오프 기법과 트래픽 관리 기법)

  • Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.81-94
    • /
    • 2005
  • Recently, wireless LAN circumstance is being widely deployed in Public spots. Many People use Portable equipments such as PDA and laptop computer for multimedia applications, and also demand of mobility support is increasing. However, handoff latency is inevitably occurred between both APs when clients move from one AP to another. To reduce handoff latency. in this paper, we suggest WFH(Weighted Frequent Handoff) using effective data structure. WFH improves cache hit ratio using a new cache replacement algorithm considering the movement pattern of users. It also reduces unessential duplicate traffics. Our algorithm uses FHR(Frequent Handoff Region) that can change pre-authentication lesion according to QoS based user level, movement Pattern and Neighbor Graph that dynamically captures network movement topology.

Improved Tree-Based ${\mu}TESLA$ Broadcast Authentication Protocol Based on XOR Chain for Data-Loss Tolerant and Gigh-Efficiency (데이터 손실에 강하고 효율적 연산을 지원하는 XOR 체인을 이용한 트리기반 ${\mu}TESLA$ 프로토콜 개선)

  • Yeo, Don-Gu;Jang, Jae-Hoon;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.43-55
    • /
    • 2010
  • ${\mu}TESLA$ broadcast authentication protocol have been developed by many researchers for providing authenticated broadcasting message between receiver and sender in sensor networks. Those cause authentication delay Tree-based ${\mu}TESLA$[3] solves the problem of authentication delay. But, it has new problems from Merkel hash tree certificate structure. Such as an increase in quantity of data transmission and computation according to the number of sender or parameter of ${\mu}TESLA$ chain. ${\mu}TPCT$-based ${\mu}TESLA$[4] has an advantages, such as a fixed computation cost by altered Low-level Merkel has tree to hash chain. However, it only use the sequential values of Hash chain to authenticate ${\mu}TESLA$ parameters. So, It can't ensure the success of authentication in lossy sensor network. This paper is to propose the improved method for Tree-based ${\mu}TESLA$ by using XOR-based chain. The proposed scheme provide advantages such as a fixed computation cost with ${\mu}$TPCT-based ${\mu}TESLA$ and a message loss-tolerant with Tree-based ${\mu}TESLA$.