• Title/Summary/Keyword: full-information

Search Result 3,671, Processing Time 0.028 seconds

A Study on Implementation of XML-based Digital Library (XML에 의한 디지털라이브러리 구현에 관한 연구)

  • Park Jae-Yong
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.1-20
    • /
    • 2001
  • KORMARC used in library bibliographic information, had been pointed several weaknesses such as inflexibility lack of link information and compatibility. In addition, a sudden increase in digital information associated with development of internet is demanding an integration of web resources metadata as the resource of library information. This study mentioned XML/KORMARC system or adaption of XML standard format turned out to be the most efficient way to use KORMARC formats and to expand the range of those information service such as bibliographic information, factual information, referral information and full-text.

  • PDF

Real Time Related Key Attack on Hummingbird-2

  • Zhang, Kai;Ding, Lin;Li, Junzhi;Guan, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.8
    • /
    • pp.1946-1963
    • /
    • 2012
  • Hummingbird is a lightweight encryption and message authentication primitive published in RISC'09 and WLC'10. In FSE'11, Markku-Juhani O.Saarinen presented a differential divide-and-conquer method which has complexity upper bounded by $2^{64}$ operations and requires processing of few megabytes of chosen messages under two related nonces (IVs). The improved version, Hummingbird-2, was presented in RFIDSec 2011. Based on the idea of differential collision, this paper discovers some weaknesses of the round function WD16. Combining with the simple key loading algorithm, a related-key chosen-IV attack which can recover the full secret key is proposed. Under 15 pairs of related keys, the 128 bit initial key can be recovered, requiring $2^{27}$ chosen IV and the computational complexity is $O(2^{27})$. In average, the attack needs several minutes to recover the full 128-bit secret key on a PC. The experimental result corroborates our attack. The result shows that the Hummingbird-2 cipher can't resist related key attack.

Topology Aggregation Schemes for Asymmetric Link State Information

  • Yoo, Young-Hwan;Ahn, Sang-Hyun;Kim, Chong-Sang
    • Journal of Communications and Networks
    • /
    • v.6 no.1
    • /
    • pp.46-59
    • /
    • 2004
  • In this paper, we present two algorithms for efficiently aggregating link state information needed for quality-of-service (QoS) routing. In these algorithms, each edge node in a group is mapped onto a node of a shufflenet or a node of a de Bruijn graph. By this mapping, the number of links for which state information is maintained becomes aN (a is an integer, N is the number of edge nodes) which is significantly smaller than N2 in the full-mesh approach. Our algorithms also can support asymmetric link state parameters which are common in practice, while many previous algorithms such as the spanning tree approach can be applied only to networks with symmetric link state parameters. Experimental results show that the performance of our shufflenet algorithm is close to that of the full-mesh approach in terms of the accuracy of bandwidth and delay information, with only a much smaller amount of information. On the other hand, although it is not as good as the shufflenet approach, the de Bruijn algorithm also performs far better than the star approach which is one of the most widely accepted schemes. The de Bruijn algorithm needs smaller computational complexity than most previous algorithms for asymmetric networks, including the shufflenet algorithm.

Implementation of One-Stop Service System on Domestic & Foreign Technology Information (국내외 기술정보의 연계 서비스 체제 구축)

  • Seo, Jin-Ny;Noh, Kyung-Ran
    • Journal of Information Management
    • /
    • v.32 no.1
    • /
    • pp.1-22
    • /
    • 2001
  • In traditional environment, user must search each journal OPAC, bibliographic DB, and full-text DB and E-Journal separately until user finds scientific and technology informations that he needs. The purpose of this study is to build one-click service system of Journals that supports integrating search. This system provides various functions, such as, journal browsing, journal search, article search, alert function, my library, document delivery service by integrating databases and electronic journals. Users search all information sources through journal OPAC and acquire journal full-text by single interface.

  • PDF

Design of a HMAC for a IPsec's Message Authentication Module (IPsec의 Message Authentication Module을 위한 HMAC의 설계)

  • 하진석;이광엽;곽재창
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.117-120
    • /
    • 2002
  • In this paper, we construct cryptographic accelerators using hardware Implementations of HMACS based on a hash algorithm such as MD5.It is basically a secure version of his previous algorithm, MD4 which is a little faster than MD5 The algorithm takes as Input a message of arbitrary length and produces as output a 128-blt message digest The input is processed In 512-bit blocks In this paper, new architectures, Iterative and full loop, of MD5 have been implemented using Field Programmable Gate Arrays(FPGAS). For the full-loop design, the performance Is about 500Mbps @ 100MHz

  • PDF

Design methodology of digital circuits for an audio-signal-processing DAC (오디오 신호처리용 DAC디지털 단의 설계기법)

  • 김선호;손영철;김상호;이지행;김대정;김동명
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.157-160
    • /
    • 2002
  • This paper proposed a guideline for selecting the arithmetic circuit architecture. The guideline incorpo-rates the new concept of PDSP (power-delay-size product) and the weighting method. HSPICE simulations havc been performed to several full adders in order to prove the validity of the proposed guideline. We applied this guideline to select an optimized FA (full adder) architecture and successfully implemented the DAC's digital blocks.

  • PDF

A Technique for Full Wave Rectification using a Single Transistor (Single Transistor에 의한 전파정류 Technique)

  • 이주근;이동근
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.15 no.3
    • /
    • pp.7-10
    • /
    • 1978
  • A method of full wave rectification is proposed which is accomplished by an inverter circuit including R-feed back. Both halves of the input cycle can be presented in the out put by composing a conductive half cycle and an inactive half cycle substituted by feed back in the cut off state.

  • PDF