• Title/Summary/Keyword: signature generation

Search Result 108, Processing Time 0.026 seconds

Design and Implementation of Digital Contract System on the Mobile Environment : M-XContract (모바일 환경에서 전자 계약 시스템의 설계 및 구현 : M-XContract)

  • Hwang, Ki-Tae;Kim, Nam-Yun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.575-584
    • /
    • 2003
  • Due to hardware resource limit and system incompatibility of the mobile device, and low bandwidth of wireless communication, there are a few difficulties in introducing the digital contract system based on wired communication to M-Commerce. To get over the difficulties, this paper defines a digital contract based upon XML and then addresses the design and implementation of M-XContract, a digital contract system for the mobile environment. M-XContract system has been constructed with the digital contract server, M-ESign module which contracts with the customer on the PDA and transfers the contract digitally signed to the server, M-EDecoder module which shows the contract to the customer from the server, and X-Auth which is a contract authoring tool. To evaluate the run-time performance of the M-XContract, we measured the digital signature generation time and transfer time to the server. The evaluation results show that the M-Xcontract is an efficient model for the mobile contract system.

Genome-wide scans for detecting the selection signature of the Jeju-island native pig in Korea

  • Lee, Young-Sup;Shin, Donghyun;Won, Kyeong-Hye;Kim, Dae Cheol;Lee, Sang Chul;Song, Ki-Duk
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.33 no.4
    • /
    • pp.539-546
    • /
    • 2020
  • Objective: The Jeju native pig (JNP) found on the Jeju Island of Korea is a unique black pig known for high-quality meat. To investigate the genetic uniqueness of JNP, we analyzed the selection signature of the JNP in comparison to commercial pigs such as Berkshire and Yorkshire pigs. Methods: We surveyed the genetic diversity to identify the genetic stability of the JNP, using the linkage disequilibrium method. A selective sweep of the JNP was performed to identify the selection signatures. To do so, the population differentiation measure, Weir-Cockerham's Fst was utilized. This statistic directly measures the population differentiation at the variant level. Additionally, we investigated the gene ontologies (GOs) and genetic features. Results: Compared to the Berkshire and Yorkshire pigs, the JNP had lower genetic diversity in terms of linkage disequilibrium decays. We summarized the selection signatures of the JNP as GO. In the JNP and Berkshire pigs, the most enriched GO terms were epithelium development and neuron-related. Considering the JNP and Yorkshire pigs, cellular response to oxygen-containing compound and generation of neurons were the most enriched GO. Conclusion: The selection signatures of the JNP were identified through the population differentiation statistic. The genes with possible selection signatures are expected to play a role in JNP's unique pork quality.

Identity and Archive Inheritance of Fashion Brand -Focusing on Donatella Versace Milano Collection from 2018 to 2021- (도나텔라 베르사체 컬렉션 분석을 통한 패션 브랜드 <베르사체>의 디자인 아이덴티티와 아카이브 계승연구 -2018년~2021년 밀라노 컬렉션을 중심으로-)

  • Shin, Sungmi;Park, Hyewon
    • Journal of Fashion Business
    • /
    • v.25 no.4
    • /
    • pp.61-78
    • /
    • 2021
  • Gianni Versace is one of the most influential Italian designers between the 1980s and 1990s and a representative person to add sexiness and splendour to Italian fashion. This study aimed to analyze the design identity that resulted in the successful handover to Donatella Versace and to review how effectively differentiated and unique heritage elements of Versace were transferred and operated. Literature reviews were performed to find Gianni Versace's design identity and archive. The scope of this study was Donatella's collection from 2018 to 2020. In particular, Signature, the most remarkable design identity of luxury brands with a visual identity that includes the mark, logo and symbol and design elements such as the item, colour, materials, details, etc., were the special focus. In this study, the elements of the visual identity of the signature were classified with the logo, icon, silhouette, materials, patterns, colours, and changes in details that were applied with the uniqueness and philosophy of the differentiated brand. Donatella Versace empathized with Versace's heritage as the brand heritage recalling Versace's honour in the 1990s and reproduced his honour again by reinterpretation of Versace's design images. Donatella is considered an excellent creative director who leads the brand by keeping the heritage and applying the trends of the times. This study as a case study of Versace has the meaning that Versace has maintained the brand identity starting from Gianni Versace as the first generation and successful takeover after the change of directors upon recreation to meet the modern times.

The Trend of System Level Thermal Management Technology Development for Aero-Vehicles (항공기 시스템 레벨 열관리 기술개발 동향)

  • Kim, Youngjin;Son, Changmin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.1
    • /
    • pp.35-42
    • /
    • 2016
  • Modern aircraft is facing the increase of power demands and thermal challenges. In accordance with the application of more electric technology and advanced mission requirement, aircraft system requires increase of power generation and it cause increase of internal heat generation. Simultaneously, restrictions have significantly been imposed to the thermal management system. Modern aircraft must maintain low radar observability and infra-red signature. In addition, new composite aircraft skins have reduced the amount of heat that can be rejected to the environment. The combination of these characteristics has increased the challenges faced by thermal management. In order to mitigate the thermal challenges, the concept of system level thermal management should be applied and new modeling and simulation tools need to be developed. To develop and utilize system level thermal management technology, three key points are considered. Firstly, the performance changes of subsystems and components must be assessed at an integrated thermal system. It is because that each subsystem and component interacts with other subsystems or components and it can directly effects on overall system performance. Secondly, system level thermal management requirements and solutions must be evaluated early in conceptual design process as vehicle and propulsion system configuration decisions are being made. Finally, new component level thermal management technologies must focus on reducing heat generation and increasing the availability of heat sinks.

ECoMOT : An Efficient Content-based Multimedia Information Retrieval System Using Moving Objects' Trajectories in Video Data (ECoMOT : 비디오 데이터내의 이동체의 제적을 이용한 효율적인 내용 기반 멀티미디어 정보검색 시스템)

  • Shim Choon-Bo;Chang Jae-Woo;Shin Yong-Won;Park Byung-Rae
    • The KIPS Transactions:PartB
    • /
    • v.12B no.1 s.97
    • /
    • pp.47-56
    • /
    • 2005
  • A moving object has a various features that its spatial location, shape, and size are changed as time goes. In addition, the moving object has both temporal feature and spatial feature. It is one of the highly interested feature information in video data. In this paper, we propose an efficient content-based multimedia information retrieval system, so tailed ECoMOT which enables user to retrieve video data by using a trajectory information of moving objects in video data. The ECoMOT includes several novel techniques to achieve content-based retrieval using moving objects' trajectories : (1) Muitiple trajectory modeling technique to model the multiple trajectories composed of several moving objects; (2) Multiple similar trajectory retrieval technique to retrieve more similar trajectories by measuring similarity between a given two trajectories composed of several moving objects; (3) Superimposed signature-based trajectory indexing technique to effectively search corresponding trajectories from a large trajectory databases; (4) convenient trajectory extraction, query generation, and retrieval interface based on graphic user interface

Design of Wind Turbines for Reducing Interference to Radar Signals (레이더 신호 간섭의 최소화를 위한 풍력 발전기 설계)

  • Park, Kang-Kook;Chin, Hui-Cheol;Kim, Kyung-Tae;Kim, Hyo-Tae;Kim, Jin-Bong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.4
    • /
    • pp.533-540
    • /
    • 2012
  • The use of wind energy is gaining importance because of its many advantages. Nations worldwide are promoting the installation of wind farms to produce electricity in an attempt to tackle climate change and increasing oil costs. But, wind turbines can generate undesired signals which disturb the performance of military radar systems. Because the current generation of on and off-shore three bladed wind turbines have radar signatures consistent with their very large physical size. So this study considers the options available for the reduction of wind turbine radar signature and presents solutions for each of the main external turbine components. The radar signature reduction approaches are based on existing technologies developed for aerospaces stealth applications. However, the realization of these for the purposes of reduction wind turbine radar signatures is a novel development, particularly in the solutions proposed. This paper is presented techniques which reduce radar signatures of wind turbine. We know that radar signatures of wind turbine reduce by using these techniques.

Implementation of the Large-scale Data Signature System Using Hash Tree Replication Approach (해시 트리 기반의 대규모 데이터 서명 시스템 구현)

  • Park, Seung Kyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.19-31
    • /
    • 2018
  • As the ICT technologies advance, the unprecedently large amount of digital data is created, transferred, stored, and utilized in every industry. With the data scale extension and the applying technologies advancement, the new services emerging from the use of large scale data make our living more convenient and useful. But the cybercrimes such as data forgery and/or change of data generation time are also increasing. For the data security against the cybercrimes, the technology for data integrity and the time verification are necessary. Today, public key based signature technology is the most commonly used. But a lot of costly system resources and the additional infra to manage the certificates and keys for using it make it impractical to use in the large-scale data environment. In this research, a new and far less system resources consuming signature technology for large scale data, based on the Hash Function and Merkle tree, is introduced. An improved method for processing the distributed hash trees is also suggested to mitigate the disruptions by server failures. The prototype system was implemented, and its performance was evaluated. The results show that the technology can be effectively used in a variety of areas like cloud computing, IoT, big data, fin-tech, etc., which produce a large-scale data.

  • PDF

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.

LOTOS Protocol Conformance Testing for Formal Description Specifications (형식 기술 기법에 의한 LOTOS 프로토콜 적합성 시험)

  • Chin, Byoung-Moon;Kim, Sung-Un;Ryu, Young-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1821-1841
    • /
    • 1997
  • This paper presents an automated protocol conformance test sequence generation based on formal methods for LOTOS specification by using and applying many existing related algorithms and technique, such as the testing framework, Rural Chinese Postman tour concepts. We use the state-transition graphs obtained from LOTOS specifications by means of the CAESAR tool. This tool compiles a specification written in LOTOS into an extended Petri net, from which a transition graph of a event finite-state machine(EvFSM) including data is generated. A new characterizing sequence(CS), called Unique Event sequence(UE sequence) is defined. An UE sequence for a state is a sequence of accepted gate events that is unique for this state. Some experiences about UE sequence, partial UE sequence and signature are also explained. These sequences are combined with the concept of the Rural Chinese Postman Tour to obtain an optimal test sequence which is a minimum cost tour of the reference transition graph of the EvFSM. This paper also presents a fault coverage estimation experience of an automated method for optimized test sequences generation and the translation of the test sequence obtained by using our tool to TTCN notation are also given. A prototype of the proposed framework has been built with special attention to real application in order to generated the executable test cases in an automatic way. This formal method on conformance testing can be applied to the protocols related to IN, PCS and ATM for the purpose of verifying the correctness of implementation with respect to the given specification.

  • PDF

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.