http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
류희수 仁川敎育大學校 科學敎育硏究所 2004 과학교육논총 Vol.17 No.-
cdma2000 system was commercially deployed actively since 2003 last year supported by 3GPP2. IMT-2000 cdma system was strengthened with cryptographic algorithms, information security mechanisms, and additional security services compared to 2nd generation systems. Especially, cdma2000 is characterized by mutual authentication between user and network and by using strong cryptographic algorithms. cdma2000 system uses AKA mechanism suggested by 3GPP as an authentication mechanism and uses SHA-1 for MAC and randomness. This paper analysed the information security algorithms and authentication mechanisms suggested by 3GPP2 and made some remarks on that.
류희수 仁川敎育大學校 科學敎育硏究所 2005 과학교육논총 Vol.18 No.-
This study is to survey the attack methods of RSA public-key cryptosystem which is widely used in internet banking, internet shopping, and e-government, etc. Public-key cryptosystem is usually based on the difficulties of unsolvable mathematics problems, therefore, most of the researchers on this field are mathematicians. RSA public-key cryptosystem is most studied and analysed public-key cryptosystem and frequently used. In this paper, we survey the attacks for RSA public-key cryptosystem and cryptographic protocols using RSA system and analyse proper methods for using secure RSA cryptosystem in real world.
류희수 仁川敎育大學校 科學敎育硏究所 2006 과학교육논총 Vol.19 No.-
The purpose of this paper is to survey security analysis known for publickey cryptosystem. Publickey cryptosystem is widely used in internet banking, online transaction, and electronic commerce, etc. Security of the cryptosystem depends not only on its fundamental structure but also on how we use it. In this sense, we assume many attack scenarios that can break our cryptosystem, which should be trustworthy and useful. In this paper, we introduce many concepts for attacking cryptosystems and examples. Moreover, probabilistic concept is also adopted for defining security. This can help us using these cryptosystems securely.
류희수 仁川敎育大學校 科學敎育硏究所 2008 과학교육논총 Vol.21 No.-
Many cryptographic mechanisms are used for transporting data security and private privacy protection in information technology. These mechanism depend on the security of cryptographic algorithms, the method how we use them, and the management of key. Key management is the fundamental component for securing the system which we use secured or not-secured algorithms. In this paper, we explain the technique for managing the keys which are for key generation, key distribution, key establishment, and key management. Among these, most important thing is the secure distribution which is not revealed to the third party. We'll explain this key establishment protocol, explicitly.
류희수,김기수,Ryoo, Hee-Soo,Kim, Kee-Soo 대한생식의학회 1981 Clinical and Experimental Reproductive Medicine Vol.8 No.2
Vesectomy has been increased as a popular method of birth control because it is simpler than other methods for men. But the vasectomy results in several problems such as relation to effect changes on the structure and function of the reproductive organ. The fate of non-ejaculated spermatozoa is postulated by some authors that those are disappeared by a progress of dissolution and reabsorption in the epididymis, and we have attempted to prove the true state of sperm-acrosome on the fine structure in vasectomized rats. The results were as follows: 1. Apical segments of the acrosome were swollen similar to the shape of club in many spermatozoa. 2. Discontinuities of the outer and inner acrosomal membranes were occasionally noted and there were complete losses of acrosomes in the certain place. 3. There was no evidence of significant changes in the nuclear structure, nor dilatation of the subacrosomal space. 4. Vasectomy might effect destructive changes in the acrosomes of the non-ejaculated spermatozoa in situ.