• Title/Summary/Keyword: mutual cooperation

Search Result 492, Processing Time 0.023 seconds

A Secure Protocol for High-Performance RFID Tag using Dynamic ID Allocating (동적 ID 할당을 이용한 고기능 RFID 태그용 보안 프로토콜)

  • Park Jin-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.642-648
    • /
    • 2006
  • In this paper, I have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

  • PDF

Technical Trends of Ubiquitous Home in Korea and Japan (국내 및 일본의 유비쿼터스 홈 기술 동향)

  • Lim Shin-Young;Huh Jae-Doo
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.1
    • /
    • pp.102-115
    • /
    • 2004
  • Recently, the cooperation among Korea, Japan, and China for the standardization of information technology is very well done due to the mutual countries' interests. Especially, in the field of digital home, that is consisted of next generation digital home technology and service based on the ubiquitous computing, the Korea and Japan have endeavored for several years, and now they are in good will competition in technology and the mutual cooperation for the standardization. In this article, the current trends of Japanese and Korean technology and service in ubiquitous home are discussed. From this discussion, the comparison between Japan and Korea will be used for the industrialization based on the best aspects from the view points of each other's technology and approach.

  • PDF

Fisheries Education and Research System in P.R.China (중국(中國)의 수산업분야(水産業分野) 교육(敎育) 및 연구체제(硏究體制))

  • Kang, Il-Kweon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.5 no.2
    • /
    • pp.80-89
    • /
    • 1993
  • Notwithstanding Korea and P. R.China are located in the neighborhood each other geographically, the break of diplomatic relations of them continued a long term, and the difference of ideology and social structure of two countries was acting as a barrier to understand each other in many fields. Two countries established formal diplomatic relation in 1992, and then the interchange and mutual cooperation between both countries are being performed rapidly, but the field of fisheries education and research system is continuing in the early stage yet. It can be easily expected that the interchange and mutual cooperation in the field of fisheries through the ocean contribute not only to the international friendship, but to the rational management of fisheries resources. In accordence with the necessity mentioned above, the author considered the general situation of fisheries education and research system in P. R. China. P. R. China runs two kinds of fisheries education system which are regular and irregular system. The regular education system is the principal means of cultivating fisheries scientists and technicians. And there are three grade levels in regular education : the tasks of which are undertaken by the fisheries universities, fisheries colleges and fisheries high schools. Adult education system in fisheries are of the following types : fishery cadet training courses, evening schools, correspondence courses and broadcasting or TV programs. The fisheries research in P. R. China is undertaken by the research institutes under the Bureau of Aquatic Products, and the basic research of oceanography is undertaken by the oceanographic institutes under the Chinese Academy of Science.

  • PDF

A study of SSO design based SAML for public library clustering (공공도서관 클러스터링을 위해 SAML 기반의 사용자통합인증 설계에 관한 연구)

  • Byeon, Hoi Kyun;Ko, Il Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.55-67
    • /
    • 2008
  • The user has to subscribe to the library so that user use the library service. User has to register at that in order to use of the nearby another library. Moreover, service such as the inter-library loan and returning my loan book to other library in which the mutual cooperation between the library is needed necessity. But it services due to the constraint condition because of the administrative or technical problems. In this paper excludes the administrative element. The web service model is forming the cluster based on the mutual cooperation between the technologically adjacent public library and provides the technologically necessary single sign-on (SSO) in order to support the additional service. The single sign-on of the library which is concluded by this model using the security information exchange standard (Security Assertion Markup Language : SAML), it is processed by XML base. In using this model, the loan information is confirmed in the attribution in return service library and the model can utilize for the return of loan book in other library. It designs the single sign-on about it.

The Conversion factor for Allocation of Interconnection Charge Between Fixed and Mobile Networks (유무선망 상호접속료 배부를 위한 서비스간 환산계수 연구)

  • Kim, Jae-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3275-3279
    • /
    • 2011
  • The matter of the calculation of the mutual access fee has become one of the hottest issues among service providers and attracted concerns from concerned regulatory authorities. It is essential to conclude a rational and systematic procedure for interconnection costs and charge between fixed and mobile networks. In this paper, I proposed the conversion factor scheme between circuit switched voice and packet switched data service in the domestic CDMA mobile system based on analysis of the rational GSM allocation method of common cost.

A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments (센서네트워크 환경에서 경량화된 키 교환 및 상호인증 라우팅 프로토콜)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung;Min, So-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7541-7548
    • /
    • 2015
  • Wireless Sensor Networks is the technology which is used in explore role for military purposes, as well as various fields such as industrial equipment management, process management, and leverage available technologies by distributing node into various areas. but there are some limitations about energy, processing power, and memory storage capacity in wireless sensor networks environment, because of tiny hardware, so various routing protocols are proposed to overcome it. however existing routing protocols are very vulnerable in the intercommunication, because they focus on energy efficiency, and they can't use existing encryption for it, Because of sensor's limitations such like processing power and memory. Therefore, this paper propose mutual authentication scheme that prevent various security threats by using mutual authentication techniques and, Key generation and updating system as taking into account energy efficiency.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

Semiotics Approach to Win-win Cooperation of Large and Small Business (대·중소기업 상생협력의 기호학적 분석)

  • Lee, Ji-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.377-386
    • /
    • 2016
  • This study analyzed symbolically the win-win cooperation(or win-win growth) policies and laws of large and small business to Roland Barthes and Greimas's semiotics model, and suggested that the company win-win ecosystem(cooperation) and sanggeuk(competition) shoule from a mutual harmony and balance rather than being separated from eace other like yin(-) and yang(+) theory. The results of these studies, unlike the coexistence cooperation Promotion Law of large and small business is the original intent in the ecosystem of companies, there will also be acting as a regulatory rather to officials of large and small business. In this study, because it is limited to the analysis of large and small business win-win cooperation policies and laws, it must be supported in the future of the specific empirical research.

An Explorative Study on Using the Method of Natural Family Planning (자연적 가족계획방법 사용에 대한 탐색적 연구)

  • Choi, Hee-Chung;Park, Shin-Ae
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.1
    • /
    • pp.226-238
    • /
    • 2001
  • This study was attempted to understand experiences of the users of natural family planning(NFP) by applying Q-methodology. 37 statements were used to Q population through literature research and interviews. For the P sample. I interviewed personally 30 people who had taken a lesson in NFP for over 6 months and had been using and experiencing it autonomously for more than 2 years so far, and asked them to Q-classify the statement cards in order of the degree of approval, from the one they most approved to the one they least approved. Data were coded and input into a computer and were analyzed using QUANL PC Program. In this study, I discovered 4 types of experiences by the users of NFP and named them each according to their features: the first, a type of mutual control with morality, the second, a type of the pursuit of mutual -cooperation, the third. a type of the pursuit of conviction. and the fourth, a type of the perception of health management. The first type said that NFP was a good contraceptive way in which no drug or devices are used, that the husband's cooperation was needed, and that they became able to control sexual desire with morality. The second type perceived that continuous efforts were required to put NFP in practice, that the, husband's cooperation was essential, and that dialogues between husband and wife were also necessary to use it, and as such they regarded mutual cooperation between husband and wife as highly important. On the other hand. the third type perceived that one's conviction played a big part, that knowledge of physiological changes was useful and the ability to sense physical changes improved. and that one's willpower was important. and thus they regarded one's own willpower as most important. The fourth type reported that this method was a good way to control pregnancy and should be taught about at the beginning of sex education. and thus they were emphasizing the importance of NFP as a helpful way to manage one's health. 1. therefore, intend to provide the following suggestions based on the result of this study. 1) It is necessary to develop a program that allows NFP to be applied to sex education program. 2) It is necessary to analyze factors that affect the execution of NFP. 3) It is necessary to analyze causes of failure of those who fail to execute NFP.

  • PDF

Analysis of Food Industry Cluster and Value-chain Network in the Northern Area of the Korean Peninsula (한반도 북방지역의 식량산업 클러스터 및 가치사슬 네트워크 분석)

  • Moon, Seung-Woon;Kim, Euijune
    • Journal of Korean Society of Rural Planning
    • /
    • v.23 no.3
    • /
    • pp.147-161
    • /
    • 2017
  • Climate changes from global warming and reduction in agricultural land result in volatility of prices of agricultural products, causing a imbalance of food market in Korea. It is necessary to develop a transnational food industry cooperation system among Korea, China and Russia that directly or indirectly affect food industry in terms of the whole industrial network. This study analyzes the value chain and linkage in the agriculture, forestry and fisheries industries in three nations. The unit structure and the industrial patterns of three nations were derived using the World Input-output Table (WIOT) from 2004 to 2014 every five years. This paper is expected to contribute to develop food security cooperation in the northern part of the Korean peninsula and to promote the mutual growth of food industry through industry linkage and cooperation.