http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이덕규,이임영 순천향대학교 부설 산업기술연구소 2004 순천향 산업기술연구소논문집 Vol.10 No.2
The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriver. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.
A DRM Model for Copyrights Protection based on Hiding Information
Deok Gyu Lee,Jianhua Ma 보안공학연구지원센터 2006 International Journal of Multimedia and Ubiquitous Vol.1 No.4
There have been researches into digital watermarking technology or Fingerprinting vigorously to safeguard 'Protective rights for knowledge and poverty' for digital contents. DRM, Digital Rights Management, is not only 'Protective rights for knowledge and poverty', but also management and systems that are necessary to put out, circulate and use for contents. This technology, DRM, encrypts contents to protect digital contents and they are sold users on. Sellers transmit contents with 'Usage Right' and a license including a key of encryption. The key of encryption decodes encoded files. The right of usage restricts users' application of contents. Even if digital contents that are applied the DRM are coped illegally and circulated, contents will be protected from that because a player of DRM checks existence of licenses and allows contents to be restored. However, this method might cause users to feel inconvenient since the users can only restore contents through the licenses offered by a player or a Smartcard. If radio as well as cable is used popularly in the future, there will be a lot of limits to use those kinds of players. In the method of that, the method using players need different players in order to work successfully in wired and wireless environment. In the case of using Smartcards, there might be a dangerous situation when the Smartcards disappeared. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.
Lee Deok-Gyu,Lim Hye-Jin,Lee Ha-Yeong,김동명,Lee Kyung-Ho,Byun Ju-Young,Shin Yong-Beom 한국바이오칩학회 2023 BioChip Journal Vol.17 No.4
In this study, we introduced a simple method for detecting nucleoside triphosphates (NTPs) using controlled transcription- driven light-up aptamer amplifi cation. Based on the concentration of target NTP, the light-up aptamer was amplifi ed using a DNA template encoding the Broccoli aptamer sequence through an incomplete transcription mixture (without each NTP). The Broccoli aptamer associated with DFHBI-1T produced signifi cantly enhanced fl uorescence signals that could sensitively detect NTPs in a label-free manner. In addition, the proposed assay was useful for quantitatively detecting NTPs in serum. Thus, we expect that this method has great potential for NTP analysis in bioassays and biological researches.
Software Engineering for Security : Towards Secure Software Architecture
Deok Gyu Lee,Rosslin John Robles,Dong-Ju Kang,Jong Wook Han 한국멀티미디어학회 2008 한국멀티미디어학회 학술발표논문집 Vol.2008 No.1
Most software systems today are related to distributed systems. And because of it, security has been an issue of immense concern. As practiced before, security is incorporated in a software system after all functional requirements have been finished. This paper discusses the need of incorporating security concerns in the software development life cycle. We survey different research areas that are concerned in the merging of software engineering and security. The paper focuses on the use of software architecture to solve problems regarding engineering of secure systems.
Deok Jea Cha,Ju Il Kim,Min Kwon,Yong Gyu Lee 한국응용곤충학회 2014 한국응용곤충학회 학술대회논문집 Vol.2014 No.10
PVY (Potyviridae: potyvirus) is one of the most important potato virus affecting seed potato production and also it is transmitted non-persistently via aphids. For healthy seed potato production, a virus detection system is highly important in addition to aphid monitoring and control. To achieve this detection method, it need to fast and easy to use. About two decades ago RT-PCR based PVY detection method was developed. However that was very time consuming and has low sensitivity. Here, we developed an advanced PVY detection method which a uses the boiling extraction of the viral RNA from aphid stylet and amplification by specific primers located in the viral capsid protein gene. Therefore, it could directly synthesize cDNA of PVY viral capsid gene from extracted RNA of PVY using one-step RT-PCR method in very short time compared to previous methods due to the omission of RNA extraction step. We confirmed this PVY detection method using the two aphid species (Macrosiphum euphorbiae and Aphis gossypii) that known as PVY vectors. The efficiency of this PVY detection method was 60% to 80% from two the aphid species. Hence, this method could be potentially applied to virus free seed potato production programs.
이덕규(Deok-Gyu Lee),오형근(Hyung-Gn Oh),이임영(Im-Yeong Lee) 한국정보과학회 2002 한국정보과학회 학술발표논문집 Vol.29 No.2Ⅰ
전자상거래에서 중요한 지불 수단으로서 전자화폐 시스템이 있다. 이러한 전자화폐의 요구사항을 살펴보면 독립성, 양도성, 분할성 등이 요구된다. 각각은 컨텐츠를 제공하는데 있어 DRM에서 필요한 요구사항이 된다. 컨텐츠 자체가 금전적 개념으로 볼 수 있기 때문이다. 컨텐츠 자체에 대한 복제 및 복사, 익명사용자등 여러 관계에서 동일하게 적용시킬 수 있다. 본 논문에서는 이러한 의미를 가지고 전자화폐의 요구사항과 DRM의 요구사항을 살펴본 뒤 이를 통해 전자화폐의 개념을 적용하여 DRM 모델을 제시하고자 한다. 본 논문에서 사용되는 개념은 계층적 트리구조를 이용하여 복사 사용 권한을 두었으며 익명 사용자를 위해 컨텐츠에 대한 익명성과 사용자에 대한 익명성을 부여하였다. 또한 사용자로 하여금 원하는 복사의 수만큼 복사할 수 있는 권한을 제공함으로써 사용하기에 편리하도록 하였다.